Threat actors launched a cyberattack against the Texas Office of Court Administration, the IT provider for many Texas courts, and encrypted their computer systems with ransomware, leaving those systems useless. Cognizant, which has a large presence in Dallas-Fort Worth and is one of the world’s largest and most sophisticated providers of information technology services for other companies, was hit with ransomware with losses currently estimated between $50 million and $70 million.
MITRE’s Center for Technology & National Security (CTNS), created to enhance MITRE’s engagement with senior government leadership, named five highly esteemed national security officials to its newly established advisory board.
There is a trade-off between technology innovation and security. The adoption of emerging technologies like 5G will fuel the proliferation of Internet of Things (IoT) which are often built with basic security controls, creating a larger attack surface. At the same time, reliance on data means that data breaches can cause greater damage.
The University of Arkansas at Little Rock is introducing a new four-year degree program in cybersecurity in the fall 2021 semester to help meet the rising demand for cybersecurity professionals.
CenturyLink, Inc. announced that Hugo Teufel has joined the technology company as its new chief privacy officer. As a noted expert in the field, he will advise the company on privacy and security issues and will work closely with CenturyLink’s sales, IT and security teams to help design, implement and refine strategic privacy initiatives throughout the company.
The new NIST standards for IAST and RASP are a testament that outside-in AppSec approaches are antiquated, inefficient, and ineffective. Security instrumentation is more than a paradigm shift of the future—it is an opportunity for today.
Although it is tempting to think of breaches as being exclusively caused by malicious cybercriminals hacking corporate networks, the truth is that a significant portion are caused—or least facilitated—by insiders.
Outsourcing has become a vital part of most business strategies. Not only is it a way to save money, but it’s a simple way to take advantage of expertise you might not currently have in house. But outsourcing can also leave companies vulnerable if the third-party doesn’t have proper cybersecurity procedures.