DHS Cyber Agency Seeks Subpoena Authority to Obtain Cyber ‘Victim’ Info

On Dec. 12, senators Ron Johnson (R. Wis.) and Maggie Hassan (D. N.H.) introduced legislation that would grant DHS’ Cybersecurity and Infrastructure Security Agency (CISA) the authority to issue subpoenas to force ISPs to tell them the true identities… Continue reading DHS Cyber Agency Seeks Subpoena Authority to Obtain Cyber ‘Victim’ Info

Cybersecurity: Chernobyl and its Cyber Lessons

Looking at cybersecurity through the lens of a nuclear disaster can help your organization be more prepared when emergencies arise HBO’s recent “Chernobyl” series, which re-told the story of the nuclear accident that threatened much of Eur… Continue reading Cybersecurity: Chernobyl and its Cyber Lessons

Countdown to Zero: Why Zero Trust is in the Spotlight

In today’s expanding threat landscape, a zero-trust architecture is critical to protecting the enterprise “The best offense is a good defense” is a common adage in the sports world. After all, no championship has ever been won solely on the back… Continue reading Countdown to Zero: Why Zero Trust is in the Spotlight

Ransomware, Phishing and Endpoint Attacks: The Top 3 Cyberthreats

Cyberthreats have been prevalent on the internet for decades now. Unfortunately, malware has been evolving more rapidly than the anti-malware software needed to combat it. The three most active cyberthreat categories worldwide are currently ransomware… Continue reading Ransomware, Phishing and Endpoint Attacks: The Top 3 Cyberthreats

U.S. Army, Towson University Aim to Advance Intrusion Detection

Researchers at the Army Research Lab (ARL) within the U.S. Army Combat Capabilities Development Command and Towson University are collaborating on an effort to make intrusion detection alerts more useful to cybersecurity teams by making it possible to … Continue reading U.S. Army, Towson University Aim to Advance Intrusion Detection

IBM Warns Retailers of Trojan Threat

IBM has issued a cybersecurity advisory warning about an attack method originally developed for defraud banks that now is being applied to the retail sector. Limor Kessem, global executive security advisor for IBM Security, said the two-step IcedID Tr… Continue reading IBM Warns Retailers of Trojan Threat

Know Your Enemy: The Art and Science of Cyberthreat Hunting

By conducting regular and comprehensive cyberthreat hunting, organizations can stay one step ahead of malicious actors and soften the blow of a data breach.

The post Know Your Enemy: The Art and Science of Cyberthreat Hunting appeared first on Security Intelligence.

Continue reading Know Your Enemy: The Art and Science of Cyberthreat Hunting

The Rise of Fileless Malware

Fileless malware that can evade traditional anti-virus programs means organizations must employ additional measures to monitor and secure their networks. From crypto-ransomware and destructive malware to advanced persistent threats that exploit zero-da… Continue reading The Rise of Fileless Malware

Are You Prepared for a Malicious Insider Threat?

Earlier this month, Tesla became the poster child of the damage a single malicious insider can do to your company. Tesla CEO Elon Musk sent an email to employees about an employee who allegedly “conducted quite extensive and damaging sabotage” to corp… Continue reading Are You Prepared for a Malicious Insider Threat?

Why agencies are shifting from cyberdefense to digital resilience

A growing cadre of federal IT leaders recognize that fortifying their defenses is no longer enough to protect their agencies amid the rising tide of cyberthreats. The reality is that cybersecurity threats are evolving quicker than most agencies can respond. Nearly 7 in 10 federal civilian agency IT leaders — and more than half (55 percent) of their defense and intelligence agency counterparts — say their agencies aren’t keeping pace with evolving threats, according to a recent study from CyberScoop and underwritten by RedSeal. That statistic is leading agencies, including the U.S. Army’s Program Executive Office for Enterprise Information Systems, to look for more effective ways to contain breaches, improve resilience and sustain critical operations unimpaired during attacks, according to a separate report released by RedSeal. According to the report, the agency is in the process of acquiring automated network mapping and modeling tools to improve cyber resilience, including tools […]

The post Why agencies are shifting from cyberdefense to digital resilience appeared first on Cyberscoop.

Continue reading Why agencies are shifting from cyberdefense to digital resilience