Cybercriminals are taking notice of the seemingly endless vulnerabilities schools face. Take the explosive ransomware attack on the University of Utah from earlier this summer, or the malware attack on the Rialto school district in California, for example. Even with a rapidly increasing attack surface, schools aren’t exactly able to drain their already-limited funding on transforming their IT infrastructure in the midst of a global pandemic. However, it is possible for schools to reduce risk by understanding where they are most vulnerable, taking the time to educate teachers, parents and students, and adopting certain tools and strategies to prevent targeted attacks on remote learning networks.
The Government Blockchain Association (GBA) announced that the European Commission’s TITANIUM former Project Lead, Dr. Ross King, will be speaking at the Legal, Law Enforcement and Cybersecurity Forum during Government Blockchain Week in May 2021. This weeklong blockchain event will bring together policy makers in government, finance, and law enforcement from around the world to the US Capitol in Washington DC.
The University of West Florida will lead a coalition of 10 institutions designated as National Centers of Academic Excellence in Cybersecurity in establishing a program to address the critical national shortage of qualified cybersecurity professionals in the U.S. The National Security Agency selected UWF to oversee the program, which will launch in the spring and be funded by a two-year, $6 million grant.
It’s the season of ghouls, ghosts and outrageous costumes. But for CISOs and cybersecurity professionals, a bump in the night on Halloween is more likely to be a notification warning them of data breach than a spooky ghostly visitation. In the COVID-19 era, spookiness-as-a-service providers who rent out costumes or sell party products are likely to have a difficult time as lockdowns and home-working play havoc with businesses focused on in-person interaction. Yet for hackers, the dawn of a socially-distanced new normal has opened up vast numbers of attack vectors and given them new opportunities to target businesses or individuals. So what should you be worried about this Halloween? To help you work out the answer to that question, here are some of the scariest cybersecurity stories and trends of 2020:
Digital Shadows, throughout the years, has tracked SandWorm, and has now revisited the tactics, techniques and procedures (TTPs) behind the SandWorm APT.
Rigorous training as to how hackers are able to get into systems and access sensitive data and how to defend against an onslaught of cyberattacks has given rise to a specific type of training and competition for cybersecurity professionals: Capture the Flag (CTF).
To find out more about these competitions, we talk to Dr. David Brumley, CEO of ForAllSecure, Inc. and Professor of Electrical and Computer Engineering and Computer Science at Carnegie Mellon University.
The Republican Party of Wisconsin recently confirmed that fraudsters used phishing emails and doctored invoices to steal $2.3 million earmarked for President Donald Trump's reelection campaign.
Healthcare providers remain firmly focused on dealing with the global pandemic, juggling the often-conflicting demands of providing care while keeping patients and staff safe. The financial impact of the pandemic has left many providers on the brink of bankruptcy amid falling patient visits deferred elective surgeries, and insufficient government aid to “fill the gap.”
A new examination of the top 10 fastest-growing cybersecurity skills shows employers are ready to pay more for workers who can prevent attacks before they occur by building a secure digital ecosystem from the ground up, according to data from Burning Glass Technologies.
It’s easy to see how network tool sprawl gets started. The needs and challenges facing security and networking groups are immense. Network speeds have steadily increased, and there are always new demands and uses. Network conditions and requirements change weekly, if not daily. Security threats increase in number and approach. At the same time, technological advancement rapidly brings new solutions to the market that are beneficial in addressing networking and security needs.