Companies rush the deployment of mobile apps despite security concerns, and most businesses haven't done anything to protect themselves against mobile threats, a survey from Ponemon Institute, Arxan and IBM Security has found. The internet of things also is an area for concern, with 58% of respondents expressing worry over IoT security, while 44% said their companies haven't taken any steps to prevent such attacks.
Threat modeling during the application design process can help identify potential threats to security and can save organizations money and time, says Archie Agarwal of ThreatModeler. Threat modeling can and should be used for cybersecurity, Agarwal says, and organizations that want to get started should begin by clearly defining a clear path to measurable goals.
Rick Perry, during his confirmation hearing Thursday, said that he regrets statements he made during his presidential campaign about eliminating the Energy Department. Perry said he will be an advocate for technologies coming out of the DOE, including research on emerging threats to cybersecurity.
Hackers of the Total oil company website said that the attack was prompted by the company's support of the African Cup of Nations soccer tournament. The hackers say they took the Total website down Sunday and the African Cup website down Saturday because of the violent way in which President Ali Bongo Ondimba was re-elected last year.
The average data breach costs $4 million, and to avoid a potentially devastating security situation, Christopher Roach writes that companies should be prepared to use the three R's to bounce back: recognizing the source of the incident, reacting efficiently to the breach and recovering by implementing security changes.
Data breaches rose into the thousands in 2016, with high-profile attacks against the Democratic National Committee making headlines and bringing awareness to the growing epidemic of cybersecurity breaches. While the year also brought more advanced security solutions, awareness and concerns brought by these attacks could prove to be the most effective tools in battling security breaches.
The Senate Armed Services Committee has created the Cybersecurity Subcommittee to establish policies, implement strategies and provide resources for US defense on cyberattacks. Mike Rounds, R-S.D., has been named chairman of the subcommittee, while Bill Nelson, D-Fla., is the ranking member.
The Vivo V5 Plus phone has been developed with a front-facing 20-megapixel image sensor along with an 8-megapixel sensor. Currently, the phone is expected to go on sale in India and Asia; it's uncertain if there will be a wider release.
Cybersecurity needs a public service awareness campaign, according to Michael Kaiser, the National Cyber Security Alliance's executive director. Specifically, Kaiser noted, "We haven't made the same investments that we've made in Smokey Bear or 'Click It or Ticket.' At a societal level, we do those [large-scale campaigns] because there's a common risk to everyone."
The Defense Advance Research Projects Agency is backing several blockchain startups to use the technology created for cybersecurity. Both Guardtime Federal and MGT Capital Investments are attempting to use blockchain as a means of spotting potential cyberattacks.
- Page 1