A new NSA guide contains valuable information on how to detect and prevent web shell malware from affecting web servers, including detection, prevention and response strategies.
The U.S. National Security Agency (NSA) has released cybersecurity guidance, containing a snapshot of current, commercially-available collaboration tools available for telework use, along with a list of security criteria to consider when selecting which capability to leverage.
The McLean Group announced that Marc Gruzenski has joined the firm as Senior Managing Director. Gruzenski will lead the firm’s Security Practice focused on the cybersecurity, physical security and security risk management sectors.
The four individuals who were identified and indicted by the Trump Administration in relation to the Equifax breach from 2017 is yet another example of the overt collection efforts by the Chinese government to steal Americans’ sensitive personal information. The openness of the U.S. government to share these examples should help bring the reality of cyber threats to the forefront in corporate board rooms and research universities. I would like to highlight that these particular attacks were conducted for a different goal – espionage.
As China forges its role as one of the great world powers, it relies upon a blast furnace of espionage operations to acquire foreign technologies and intellectual property, better position itself against competing international powers and control its own image both at home and abroad.
While the COVID-19 pandemic has resulted in an upshot of all types of scams, no one is talking about vishing and how cybercriminals can use vishing to further scam the public?
As a result of the COVID-19 pandemic, more people than ever are working remotely. Because of this recent and rapid transition, users are accessing corporate resources from their homes and generating unprecedented amounts of network traffic. IT departments face increased pressure to ensure business continuity by providing remote users with access to essential corporate applications and services through Virtual Private Networks (VPNs), which are designed to provide access to private networks through shared or public networks.
The International Compliance Association (ICA), a professional body for the global regulatory and financial crime compliance community, has partnered with the International Cyber Threat Task Force (ICTTF) to offer a new program in cyber risk management.
A new survey that looks at consumer sentiment and habits around online security in light of the shift to remote work due to COVID-19 has found that the lines between our personal and professional lives are blurring now more than ever.
A John Jay College of Criminal Justice project on cyber-terrorism is one of 13 selected by the Department of Homeland Security as part of the National Counterterrorism Innovation, Technology, and Education (NCITE) Center, a new DHS Center of Excellence. The project will be housed at the University of Nebraska at Omaha.