The National Security Agency released a cybersecurity product detailing how to detect and fix out-of-date encryption protocol implementations. Networks and systems that use deprecated forms of Transport Layer Security (TLS) or Secure Sockets Layer (SSL) for traffic sessions are at risk of sensitive data exposure and decryption.
Michael Oberlaender has had cybersecurity leadership positions and CSO/CISO titles at enterprises around the world. He’s recovered companies from data breaches, built cyber-hardening strategies and policies, implemented cybersecurity budgets, forged relationships and communications with the C-suite, analyzed risks, and dealt with privacy laws around the world.
FBI, ODNI, CISA & NSA issued a joint statement saying their investigation indicates an APT actor "likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and non-governmental networks."
As global tensions continue to escalate, the Internet may find itself used as a weapon, something we are already starting to see happen, by nations attempting to exert their influence and enforce greater internal control over digital commerce and communication. Nations must recognize the threat of escalation beyond the point of no return and take steps to ensure that the interconnectivity of the open Internet remains intact long-term. This will prevent a “cyber dark age” in which governments implement national Internet protocols and stop the free flow of data across borders.
Dr. Chase Cunningham, a recipient of Security magazine's Most Influential People in Security, has joined Ericom as its Chief Strategy Officer. In this role, he will shape the company's strategic vision, roadmap and key partnerships. Dr. Cunningham previously served as vice president and principal analyst at Forrester Research, providing strategic guidance on Zero Trust, artificial intelligence, machine learning and security architecture design for security leaders around the globe.
Radware's Vulnerability Research Team explored 2020's top 10 most prevalent exploits targeting web services leveraged in large scale attacks or reconnaissance campaigns as seen by Radware’s Threat Research Center.
It’s within this expanded terrain for cyberattacks that the security trends of 2021 and beyond are taking shape. Workers are engaging with company resources from diverse locations. At the same time, businesses have ramped up their digitalization journeys to be more flexible and agile after COVID-19’s disruption of supply chains. The result is a dynamic tech environment where the continuity of business operations – and ultimately market competitiveness – will rely on robust cyber protections.
As organizations continue to adapt to life in the age of COVID-19, smartphones are set to take on additional responsibilities – even as the security limitations of these devices become ever more evident. Below, I’ve highlighted five key trends that are set to shape mobile security in 2021.
To close out the year, U.S. telecommunications giant T-Mobile announced it had been hacked. In a notice, the company said its cybersecurity team had discovered and shut down malicious, unauthorized access to some information related to T-Mobile accounts.
I have been in the cybersecurity industry for more than 20 years now. I have founded, operated, and exited several cybersecurity startups. I also advised, invested in, and even acquired a handful. Despite successful outcomes, my experience has left me perhaps a little jaded. Are we winning the battle? When I log into my various web accounts, I am so often reminded that my password had been stolen, sometimes alongside with my personal information. Even major financial institutions and government agencies have suffered a similar fate. Cybersecurity is broken, and here is why.