Red Hat, OpenShift, Atos, and Trustwave – Enterprise Security Weekly #81

In the news, Atos unveils new managed service built on Red Hat OpenShift platform, Trustwave launches proactive Threat Hunting service, Phantom Cyber fetches $350 million in acquisition by Splunk, and more on this episode of Enterprise Security Weekly!… Continue reading Red Hat, OpenShift, Atos, and Trustwave – Enterprise Security Weekly #81

Red Hat, OpenShift, Atos, and Trustwave – Enterprise Security Weekly #81

In the news, Atos unveils new managed service built on Red Hat OpenShift platform, Trustwave launches proactive Threat Hunting service, Phantom Cyber fetches $350 million in acquisition by Splunk, and more on this episode of Enterprise Security Weekly!… Continue reading Red Hat, OpenShift, Atos, and Trustwave – Enterprise Security Weekly #81

Is your IoT strategy creating security holes?

Although most organizations plan to increase adoption of IoT into operations, only 28 percent consider security strategies specific to IoT as “very important.” Anticipated timeframe for an IoT security-related incident in the future Osterman Research c… Continue reading Is your IoT strategy creating security holes?

Microsoft, Adobe February 2018 security updates: An overview

The Microsoft February 2018 security updates are for Internet Explorer, Edge, Windows, Office, Office Services and Web Apps, Adobe Flash, and ChakraCore (the core part of the Chakra Javascript engine that powers Microsoft Edge). Jimmy Graham, director … Continue reading Microsoft, Adobe February 2018 security updates: An overview

Examining attitudes towards confidential data

Industry analyst firm Quocirca surveyed 500 IT decision makers in the United States, Canada, United Kingdom, Australia and Japan, examining attitudes towards the value of confidential data including: personally identifiable information (PII), payment c… Continue reading Examining attitudes towards confidential data

Risk assessment: The first step in improving cyber security

Despite the proliferation of high profile cyber-attacks over the last 18 months, many organisations are still too disorganised in their approach to security. While it is no longer feasible to guarantee 100% protection against a breach, businesses are setting themselves up for a fall by failing to adequately understand and prepare for the risks facing them. PwC’s 2018 Information Security Survey, which surveyed more than 9,000 business and technology executives around the world, found that … More Continue reading Risk assessment: The first step in improving cyber security

Intrusion detection is speeding up: Is it enough to tackle global cyber threats?

As criminals continue to develop new methods to break or sidestep cyber defences, in many cases the focus is shifting towards the ability to detect and respond to an incident as quickly as possible. Despite the average cost of a data breach soaring to $17.36m in 2016 according to the Ponemon Institute, we have found the security industry’s incident response capabilities have advanced considerably in recent years. The 2017 Trustwave Global Security Report, which examines … More Continue reading Intrusion detection is speeding up: Is it enough to tackle global cyber threats?

This elite cybercrime group is wreaking havoc on the U.S. restaurant industry

A sophisticated hacking group with suspected ties to cybercrime gangs operating in Eastern Europe is now actively targeting and breaching prominent, brand name restaurants in the U.S. A recently disclosed data breach suffered by Mexican fast food restaurant Chipotle was carried out by hackers linked to a group known as FIN7 or Carbanak Group, CyberScoop has learned. In addition to Chipotle, the hackers appears to be targeting national restaurant franchises Baja Fresh and Ruby Tuesday, according to malware samples and other evidence CyberScoop obtained. More than 20 U.S.-based hospitality companies — a combination of hotels and restaurants — have been successfully hacked by FIN7 since the summer of 2016, two cybersecurity researchers told CyberScoop on the condition of anonymity in order to speak freely regarding ongoing investigations. On February 22, a phishing email carrying an attachment titled “Payment overdue.eml” was sent to an email account associated with a Chipotle location […]

The post This elite cybercrime group is wreaking havoc on the U.S. restaurant industry appeared first on Cyberscoop.

Continue reading This elite cybercrime group is wreaking havoc on the U.S. restaurant industry

Tech workers are routinely pressured to roll out products that aren’t secure, report says

The majority of tech professionals are pressured to roll out projects before they’ve undergone necessary security audits and hardening, according to a new security pressures survey from the security firm Trustwave. 65 percent of full-time IT professionals said management prioritized speed over security, according to the survey of 1,600 tech professionals from around the world. Worldwide, security is actually on a major upswing in this fight compared to 77 percent of IT professionals feeling this pressure in the previous two years. In the United States, however, there has been virtually no change: 71 percent of respondents are pushed to get projects out the door without necessary security checks. Only 35 percent of worldwide respondents said they never faced such pressure. What happens to projects that set aside security in favor of speed? The top two consequences tech professionals fear most from a hacker is personal and corporate reputation damage followed by financial damage to the […]

The post Tech workers are routinely pressured to roll out products that aren’t secure, report says appeared first on Cyberscoop.

Continue reading Tech workers are routinely pressured to roll out products that aren’t secure, report says

Shut the Backdoor! More IoT Cybersecurity Problems

We all know that what we mean by hacker around here and what the world at large thinks of as a hacker are often two different things. But as our systems get more and more connected to each other and the public Internet, you can’t afford to ignore the other hackers — the black-hats and the criminals. Even if you think your data isn’t valuable, sometimes your computing resources are, as evidenced by the recent attack launched from unprotected cameras connected to the Internet.

As [Elliot Williams] reported earlier, Trustwave (a cybersecurity company) recently announced they had found a backdoor …read more

Continue reading Shut the Backdoor! More IoT Cybersecurity Problems