Cybersecurity Q&A with Dave Elfering, VP information security at Werner Enterprises

Sailpoint

Dave Elfering, currently Vice President of information security has also witnessed a considerable amount of growth and change over his career when it comes to information security. In 1997, Elfering began working at Werner as a project manager to help the company build its online presence and secure its data. Tell us how you got interested and eventually started in information security? It connects us to the internet,” they replied.

Netflix Information Security: Preventing Credential Compromise in AWS

Netflix TechBlog

Today, we would like to share two additional layers of security: API enforcement and metadata protection. For more information on how the AWS services mentioned work, see the Background section at the end of this post. This is because AWS API calls go directly to the internet.

AWS 108

Triaging modern medicine’s cybersecurity issues

The Parallax

Hackers often talk about practicing good “cybersecurity hygiene” : making sure that basic standards, such as using unique passwords for each log-in, are met. ”—Jacki Monson, chief privacy and information security officer, Sutter Health. READ MORE ON MEDICAL SECURITY.

Why health care cybersecurity is in ‘critical condition’

The Parallax

government-sponsored Health Care Industry Cybersecurity Task Force delivered more than 100 recommendations to the Department of Homeland Security to make medical technology more resistant to hackers. READ MORE FROM ‘NO PANACEA FOR MEDICAL CYBERSECURITY’.

Q&A with John Masserini, Chief Information Security Officer at Millicom

Sailpoint

In this Q&A we spoke with John Masserini, chief information security officer at international telecommunications provider Millicom. Masserini talks with us about his interesting career path in information security, cloud security, and identity management.

Georgia bill could stifle the state’s booming cybersecurity community

The Parallax

A new bill winding its way through the Georgia state senate has cybersecurity experts on alert. As Senate Bill 315 is currently written, academics and independent security researchers alike could be subject to prosecution in Georgia alongside malicious hackers.

6 cybersecurity trends we’re thankful for

The Parallax

You might think of cybersecurity professionals as tech’s collective “ watchers on the wall ”—the guardians who let you know when doom is coming. Here are six things on the cybersecurity and privacy front we’re glad that organizations are helping consumers become more aware of than ever before.

Trends 179

Cybersecurity Style Guide helps you write like a hacker

The Parallax

The Bishop Fox Cybersecurity Style Guide , published last week , was developed over the last year and a half to fill a vacuum, says its lead editor, Brianne Hughes. My real goal was to bridge the gap between people who are writing in security, and the people who have to read that.”.

Cybersecurity On Call: Balancing Connectivity and Cybersecurity with Paul Roberts

Cloudera

LockState learned a hard lesson around cyber and IoT security –as well as customer trust. To learn more about how the industry is balancing connectivity with cybersecurity, we have invited Paul Roberts to join us. Paul is the founder and Editor in Chief of The Security Ledger, an independent security news website that explores the intersection of cyber security with the Internet of Things.

Applications and innovations in the Internet of Things (IoT)

Hacker Earth Developers Blog

The Internet of Things (IoT) is a system of interrelated devices that have unique identifiers and can autonomously transfer data over a network. IoT ecosystems consist of internet-enabled smart devices that have integrated sensors, processors, and communication hardware to capture, analyze, and send data from their immediate environments. This information is used to analyze customer behavior and plan retail layouts better. Innovation Management Internet of Things

Cybersecurity on Call: Nation-State Cyber Operations with Patrick Tucker

Cloudera

If you enjoyed this podcast, click here to hear other cybersecurity industry influencers on their take on the latest trends. Like us on SoundCloud and follow us so you’re always up on current events in the world of cybersecurity. The post Cybersecurity on Call: Nation-State Cyber Operations with Patrick Tucker appeared first on Cloudera Blog.

The state of IoT security: OWASP Top Ten highlights challenges

TechBeacon

How has the security of the Internet of Things evolved in recent years? Security, Information Security, Internet of Things (IoT), Information Security (Info Sec TechBeacon last visited the topic in 2017 and found the picture to be troubling at best. Now, for the first time since 2014, OWASP has updated its own Top Ten list of IoT Vulnerabilities.

IoT 73

How to secure ‘Internet exposed’ Apache Hadoop

Cloudera Engineering

From what we know, an unknown number of hackers scanned for internet-accessible installations that had been set up using the default, non-secure configuration. The post How to secureInternet exposed’ Apache Hadoop appeared first on Cloudera Engineering Blog.

Importance of Internet Security

Strategy Driven

Internet security has never been more important. If you have poor internet security, then you are leaving yourself open to all kinds of issues. With that in mind, here are three reasons why internet security is so important.

How the Internet of Things is Influencing a New Cybersecurity Era

CTOvision

Cybersecurity is the new chief concern for every organization. Most companies have thus resulted in the internet of things, and it's cybersecurity features to help keep their digital assets safe. Artificial Intelligence Cyber Security NewsRecent global attacks like Wannacry and NotPetya have proved that hackers aren’t sparing any institution in their latest show of might.

IoT 88

Mueller’s indictment of election hackers a cybersecurity ‘wake-up call’

The Parallax

As Dave Aitel, former NSA cybersecurity analyst and the current chief security technical officer of cybersecurity company Cyxtera tells The Parallax, the details of the indictment indicate the high level of confidence the Justice Department has in its charges. Regardless of U.S.

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

One of the many topics coved at the event was software defined perimeter and cloud security alliance. Some of the issues discussed include the Internet of things, hacktivists and cyber attacks. Next Steps for the Cybersecurity Framework (vormetric.com).

Internet Two Seeks Chief Cyberinfrastructure Security Officer

CTOvision

Chief Cyberinfrastructure Security Officer. Position Summary: The Internet2 Chief Cyberinfrastructure Security Officer (CCSO) is the leader responsible for establishing the cyberinfrastructure security strategy and direction for Internet2′s global infrastructure programs. The CCSO provides leadership for the Internet2 cyber security program through strong working relationships and collaboration across the staff and community, including policy and operational areas.

Will blockchain revolutionize the Internet of Things?

CTOvision

Read why Megan Ray Nichols says that blockchain technology can be used to revolutionize the Internet of Things on Euro Scientist : Here is an interesting convergence no one is talking about – blockchain technology and Internet of Things. Blockchain technology is essentially a secure, distributed ledger that can serve as the foundation for many systems. […]. Blockchain and Cryptocurrency CTO Internet of Things News

The Internet of (Secure) Things – Embedding Security in the IoT

CTOvision

We’re seeing a glimmer of the future – the Internet of Things (IoT) – where anything and everything is or contains a sensor that can communicate over the network/Internet. With these burgeoning capabilities, there needs to be some focus on cyber security. By George Romas.

Scale and Speed with Cyber Security

CTOvision

Dealing with the scale that the internet can deliver, has unfortunately left us with a series of other non-optimal cyber security approaches and solutions. In cybersecurity we’re have a hard time dealing with scale. Out of all the problems to deal with subverting bureaucracy to enable security scaling is the hardest. All three when synchronized create strong feedback loops and learning curves for the enterprise leading to a strengthened cyber security posture.

FBI: Internet-fueled theft, fraud, and exploitation reaches cost of $2.7 billion

DXC

The FBI’s Internet Crime Complaint Center (IC3) published its fifth annual Internet Crime Report last month. The report, based on information gleaned from 351,936 complaints of suspected Internet crime, found more than $2.7 billion in Internet-fueled theft, fraud and exploitation for 2018. Security cybersecurity fraudAccording to the report, email scams wrought the highest level of financial losses […].

The state of cybersecurity in the physical security industry

Synopsys

The challenges of video surveillance cybersecurity highlight some of the many issues that plague the use of connected devices in physical security systems. The post The state of cybersecurity in the physical security industry appeared first on Software Integrity Blog.

Video 56

2017 in cybersecurity and privacy news

The Parallax

From rampant ransomware to the Equifax breach to geopolitical machinations, it’s hard not to be a cynic about the past 12 months of security and privacy news. The Spanish government, on the other hand, seems to have figured out how to use the Internet against its citizens.

IT/OT Cybersecurity Convergence: Start Strong with These Six Controls

Tenable

As IT and OT teams converge, industrial businesses need to create better cybersecurity plans and strategies to confront modern threats. Try these six cybersecurity controls. . Having responsibility for overall company security, CISOs must find a way to bridge the gap between IT and OT.

LAN 65

The Internet of Things on the Edge

The New Stack

Edge computing has become an important trend for the Internet of Things (IoT). Security and privacy requirements for industrial IoT use cases are also driving the need for edge computing. The post The Internet of Things on the Edge appeared first on The New Stack.

CIOs Need To Understand The Risk Of Internet Connected Devices

The Accidental Successful CIO

CIOs need to ask the right questions before connecting everything to the internet Image Credit: Ryan. Just in case you’ve been living under a rock for a while, you may not be aware of this thing that is being called the “internet of things” (IOT). How Can CIOs Stay Secure With IOT?

What You Need To Know About The Administration’s Cybersecurity National Action Plan

CTOvision

The Whitehouse released a plan on 9 Feb 2016 that should be read and understood by cybersecurity professionals everywhere. As for the plan, here are the key points, taken from the Factsheet titled " Cybersecurity National Action Plan ": The plan calls for establishing a "Commission on Enhancing National Cybersecurity." The plans calls for the creation of a federal chief information security officer. Bob Gourley.

Net Threats: Internet Openness in Danger

CTOvision

Reflecting the increasing attention paid to information security by many Americans, Pew Research recently conducted a large study, “ Net Threats ”, to identify important trends among technology experts’ opinions and predictions regarding the future of digital security.

.Net 90

6 cybersecurity revelations from the redacted Mueller report

The Parallax

The report also contains several important new cybersecurity revelations regarding interference by Russia in the 2016 election, and by the Trump administration in the ensuing investigation. Mueller’s indictment of election hackers a cybersecurity ‘wake-up call’.

Report 180

Pick a Side; Make Some Noise

Haft of the Spear

If you don’t know what I’m referring to check out these two posts on so-called security ratings companies and their services. That there are people who think such a service is worth buying; their desperation to address third-party risk overcoming their good sense , or their sheer ignorance at how the software and the Internet works illustrating how woefully intellectually inadequate they are. It’s a whole lot of fundamental sys-admin-y grunt work, not sexy security fun time.

Stuff The Internet Says On Scalability For February 22nd, 2019

High Scalability

In the face of this reality, we have shifted the security model of the Chrome web browser and V8 to process isolation. Wake up! It's HighScalability time: Isn't inetd a better comp? link ). Do you like this sort of Stuff? I'd greatly appreciate your support on Patreon.

The Internet Has A New Problem: Repeating Random Numbers!

CTOvision

Digital Certificates are a foundational building block of the Internet. CTO Cyber Security News china cyberattackThey are used to verify the identity of e-commerce sites, the authenticity of software and encrypt data. Not surprisingly, cyberattackers try to create fake Certificates or get the Private Keys for real ones to steal data or intercept communications. No one really worried about the […].

Panera Bread’s feckless security puts consumers at risk

The Parallax

Security researcher Dylan Houlihan says he notified Panera Bread, a chain of more than 2,000 stores in the United States, of a website vulnerability in August 2017. How to attack security issues like Google and Microsoft just did.

Update On The Megatrend of the Internet of Things

CTOvision

In this post we dive deeper into the Internet of Things. Today's Internet connects people, governments, academia and business. The already emerging Internet of Things goes far beyond that. Bob Gourley. There are seven key megatrends driving the future of enterprise IT.