Menu
Cimetrics
0
  • Home
  • Products
    • BACnet Routers
    • BACstac
    • Secured by Cimetrics™
    • BACnet Modules
    • BACnet Metering Gateways
    • BACnet Web Services
    • BACnet MODBUS Gateways
    • All BACnet Products
    • Request Product Information
  • Services
    • For Building Owners
    • For Product Developers
    • For Facility Managers
    • Request Technical Support
  • About
    • About Cimetrics Video
    • Management
    • Vision
    • History
    • Our Technology
    • Our Customers
    • Case Studies
    • Career Opportunities
    • Terms & Conditions
    • Privacy Policy
  • Contact Us
    • Contact Us
    • Request Product Information
    • Request Technical Support
    • Security Center
    • Do not sell my personal information
    • Product Return Policy
    • Limited Hardware Warranty
  • Blog
  • Sign in
  • Your Cart is Empty
Cimetrics
  • Home
  • Products
    • BACnet Routers
    • BACstac
    • Secured by Cimetrics™
    • BACnet Modules
    • BACnet Metering Gateways
    • BACnet Web Services
    • BACnet MODBUS Gateways
    • All BACnet Products
    • Request Product Information
  • Services
    • For Building Owners
    • For Product Developers
    • For Facility Managers
    • Request Technical Support
  • About
    • About Cimetrics Video
    • Management
    • Vision
    • History
    • Our Technology
    • Our Customers
    • Case Studies
    • Career Opportunities
    • Terms & Conditions
    • Privacy Policy
  • Contact Us
    • Contact Us
    • Request Product Information
    • Request Technical Support
    • Security Center
    • Do not sell my personal information
    • Product Return Policy
    • Limited Hardware Warranty
  • Blog
  • 0 0

Bi-Weekly CyberSecurity Recap June 2019

June 07, 2019

Curated bi-weekly cybersecurity news summary for facility management professional, building owners and IT professionals who are interested in building security and Facility IT.

 

ARTIFICIAL INTELLIGENCE FOR A SMARTER KIND OF CYBER SECURITY

As IBM Security vice president of strategy and design Kevin Skapinetz stated, cybercrime has evolved to a point that it is completely different from how we used to visualize hackers. The days where hackers are isolated individuals are long gone. The threats we are dealing with now are highly organized, elaborate, and constantly changing.

State Department proposes new $20.8 million cybersecurity bureau

The State Department has sent to Congress a long-awaited plan to reestablish a cybersecurity-focused bureau it says is key to supporting U.S. diplomatic efforts in cyberspace.

The State Department’s new plan, obtained by CyberScoop, would create the Bureau of Cyberspace Security and Emerging Technologies (CSET) to “lead U.S. government diplomatic efforts to secure cyberspace and its technologies, reduce the likelihood of cyber conflict, and prevail in strategic cyber competition.”

The good, better, and best of smart building cybersecurity, according to Intel

To minimize cybersecurity risks in smart buildings, the global chip-making company Intel has provided a set of guidelines. A white paper from the company has outlined certain steps for good, better, and best protection against hackers.

Yes, Virginia, You Can Calculate ROI For Cybersecurity Budgets

While assisting the White House in developing the NIST Cybersecurity Framework in 2013, Michael Coden - Head of the Cybersecurity Practice at BCG Platinion, a company of Boston Consulting Group met hundreds of chief information security officers (CISOs). Many of these professionals constantly worried about how to answer the same question from their CFOs: What is the return on investment (ROI) on this cybersecurity project?. 

Zero Trust Architecture and its Relevance in Cybersecurity.

This article discusses a rather new technology that has replaced the widely used and much popular Default Allow approach to cybersecurity. The new technology, the Zero Trust architecture is now turning quite popular among modern day enterprises. The article examines different aspects of this development and also discuss the relevance of the rapidly evolving Zero Trust architecture.

A Weak VPN Could Be More Destructive Than No VPN

In the present era, an individual’s privacy solely depends on internet security. Your banking details, your pictures, and other sensitive information are available on different channels such as social media accounts, websites, and other online platforms. Therefore, the usage of VPN has increased drastically. But are you sure your VPN is working correctly?

If not, then you might be at risk. If you are using a weak or vulnerable VPN, then you are directly putting your data into a much worse condition.

It’s time for cybersecurity to go pro bono

As asylum seekers and other vulnerable people are required to give up more and more of their personal information to agencies charged with protecting them, the human rights organizations that work to help such populations become targets of cyberattacks themselves.

Cyber abusers see them as a portal to get to their victims. The recent discovery of a significant messaging app vulnerability used to target human rights groups is just one example of these malicious efforts, but provides significant cause for alarm.

  • Share:

Leave a comment

Comments will be approved before showing up.


Also in Cimetrics News

AHR Show sessions with Cimetrics CEO James Lee
AHR Show sessions with Cimetrics CEO James Lee

February 01, 2023

Educational Sessions at AHR show with Cimetrics CEO Jim Lee.

Read More

January 2023 Newsletter
January 2023 Newsletter

January 30, 2023

Read More

January 2023 Cybersecurity News
January 2023 Cybersecurity News

January 22, 2023

Top 5 AI-powered Cybersecurity threats in 2023, Cybersecurity Market Report, NIST updates to cybersecurity framework and more...

Read More

Follow

Sign up to get the latest on sales, new releases and more…

© 2023 Cimetrics.
Powered by Shopify

American Express Apple Pay Diners Club Discover Google Pay Mastercard Shop Pay Visa