Tel: +1-617-350-7550

Bi-Weekly CyberSecurity Recap June 2019

June 07, 2019

Curated bi-weekly cybersecurity news summary for facility management professional, building owners and IT professionals who are interested in building security and Facility IT.



As IBM Security vice president of strategy and design Kevin Skapinetz stated, cybercrime has evolved to a point that it is completely different from how we used to visualize hackers. The days where hackers are isolated individuals are long gone. The threats we are dealing with now are highly organized, elaborate, and constantly changing.

State Department proposes new $20.8 million cybersecurity bureau

The State Department has sent to Congress a long-awaited plan to reestablish a cybersecurity-focused bureau it says is key to supporting U.S. diplomatic efforts in cyberspace.

The State Department’s new plan, obtained by CyberScoop, would create the Bureau of Cyberspace Security and Emerging Technologies (CSET) to “lead U.S. government diplomatic efforts to secure cyberspace and its technologies, reduce the likelihood of cyber conflict, and prevail in strategic cyber competition.”

The good, better, and best of smart building cybersecurity, according to Intel

To minimize cybersecurity risks in smart buildings, the global chip-making company Intel has provided a set of guidelines. A white paper from the company has outlined certain steps for good, better, and best protection against hackers.

Yes, Virginia, You Can Calculate ROI For Cybersecurity Budgets

While assisting the White House in developing the NIST Cybersecurity Framework in 2013, Michael Coden - Head of the Cybersecurity Practice at BCG Platinion, a company of Boston Consulting Group met hundreds of chief information security officers (CISOs). Many of these professionals constantly worried about how to answer the same question from their CFOs: What is the return on investment (ROI) on this cybersecurity project?

Zero Trust Architecture and its Relevance in Cybersecurity.

This article discusses a rather new technology that has replaced the widely used and much popular Default Allow approach to cybersecurity. The new technology, the Zero Trust architecture is now turning quite popular among modern day enterprises. The article examines different aspects of this development and also discuss the relevance of the rapidly evolving Zero Trust architecture.

A Weak VPN Could Be More Destructive Than No VPN

In the present era, an individual’s privacy solely depends on internet security. Your banking details, your pictures, and other sensitive information are available on different channels such as social media accounts, websites, and other online platforms. Therefore, the usage of VPN has increased drastically. But are you sure your VPN is working correctly?

If not, then you might be at risk. If you are using a weak or vulnerable VPN, then you are directly putting your data into a much worse condition.

It’s time for cybersecurity to go pro bono

As asylum seekers and other vulnerable people are required to give up more and more of their personal information to agencies charged with protecting them, the human rights organizations that work to help such populations become targets of cyberattacks themselves.

Cyber abusers see them as a portal to get to their victims. The recent discovery of a significant messaging app vulnerability used to target human rights groups is just one example of these malicious efforts, but provides significant cause for alarm.

Leave a comment

Comments will be approved before showing up.

Also in Cimetrics News

September 2021 Newsletter
September 2021 Newsletter

September 30, 2021

BACstac with BACnet/SC support, Analytika Users Forum, Retrocommissioning, Monitoring-Based Commissioning (MBCx), The Plan to Stop Every Respiratory Virus at Once and more...

Read More

Cybersecurity Recap September 2021
Cybersecurity Recap September 2021

September 29, 2021

NIST Starts Consumer Labeling Program for IoT Cybersecurity, OWASP top 10: The most serious web application security risks, Rethink the current cybersecurity landscape, Trends in Artificial Intelligence (AI) in Cybersecurity, China is building of a cybersecurity safeguard system and more... and more.

Read More

Press Release: SbC BACstac 7.5 with BACnet/SC support
Press Release: SbC BACstac 7.5 with BACnet/SC support

September 28, 2021

Press Release: SbC Cimerics BACnet Stack BACstac 7.5 with BACnet/SC support

Read More