System restore: How stressed security bosses unwind from the daily grind

Nothing will take your mind off work like reading about humanity’s possible extinction. Just ask Jim Motes. As the chief information security officer for video game retailer GameStop, Motes spends most of his daylight hours thinking about new security training techniques, which emerging technologies offer the best return on investment and how to automate as many tasks as possible. When it’s time to decompress after a long day, though, Motes chills out by reading books like “Our Final Invention.” The nonfiction book by James Barrat examines quantum computing, artificial intelligence and the possible implications for mankind should the singularity become a reality. “The assessment is that if a quantum computer becomes sentient, it would take about 30 days before it decided it didn’t need humans anymore,” Motes said. “It’s interesting, but maybe I’m weird.” Not weird at all. Cybersecurity professionals are saddled with stress, thanks to a desperate shortage of […]

The post System restore: How stressed security bosses unwind from the daily grind appeared first on CyberScoop.

Continue reading System restore: How stressed security bosses unwind from the daily grind

Security Boulevard Chats: BitDiscovery, A Revolutionary Way to Track Your Digital Assets

In this Security Boulevard Chat I speak with two of my heroes from the InfoSec/AppSec world: Jeremiah Grossman and Robert “RSnake” Hansen. Jeremiah and Robert just announced the launch of their new company, BitDiscovery, which is emerging … Continue reading Security Boulevard Chats: BitDiscovery, A Revolutionary Way to Track Your Digital Assets

DoD Opens .Mil to Legal Hacking, Within Limits

Hackers of all stripes looking to test their mettle can now legally hone their cyber skills, tools and weaponry against any Web property operated by the U.S. Department of Defense, according to a new military-wide policy for reporting and fixing security vulnerabilities.

Security researchers are often reluctant to report programming flaws or security holes they’ve stumbled upon for fear that the vulnerable organization might instead decide to shoot the messenger and pursue hacking charges. But on Nov. 21, the DoD aimed to clear up any ambiguity on that front for the military’s substantial online presence, creating both a centralized place to report cybersecurity flaws across the dot-mil space as well as a legal safe harbor (and the prospect of public recognition) for researchers who abide by a few ground rules. Continue reading DoD Opens .Mil to Legal Hacking, Within Limits

Ransomware success creates apathy towards traditional antivirus software

In the last 12 months, 48 percent of organizations across the globe have fallen victim to a ransomware campaign, with 80 percent indicating that they’ve suffered from three or more attacks, according to a global survey conducted by Vanson Bourne. In response to ransomware attacks, 67 percent of businesses globally have increased IT security spending, and 52 percent reported that they are changing their security strategies to focus on mitigation. Fifty-four percent also agreed that … More Continue reading Ransomware success creates apathy towards traditional antivirus software