Curated bi-weekly cybersecurity news summary for facility management professional, building owners and IT professionals who are interested in building security and Facility IT.
As IBM Security vice president of strategy and design Kevin Skapinetz stated, cybercrime has evolved to a point that it is completely different from how we used to visualize hackers. The days where hackers are isolated individuals are long gone. The threats we are dealing with now are highly organized, elaborate, and constantly changing.
The State Department has sent to Congress a long-awaited plan to reestablish a cybersecurity-focused bureau it says is key to supporting U.S. diplomatic efforts in cyberspace.
The State Department’s new plan, obtained by CyberScoop, would create the Bureau of Cyberspace Security and Emerging Technologies (CSET) to “lead U.S. government diplomatic efforts to secure cyberspace and its technologies, reduce the likelihood of cyber conflict, and prevail in strategic cyber competition.”
To minimize cybersecurity risks in smart buildings, the global chip-making company Intel has provided a set of guidelines. A white paper from the company has outlined certain steps for good, better, and best protection against hackers.While assisting the White House in developing the NIST Cybersecurity Framework in 2013, Michael Coden - Head of the Cybersecurity Practice at BCG Platinion, a company of Boston Consulting Group met hundreds of chief information security officers (CISOs). Many of these professionals constantly worried about how to answer the same question from their CFOs: What is the return on investment (ROI) on this cybersecurity project?.
This article discusses a rather new technology that has replaced the widely used and much popular Default Allow approach to cybersecurity. The new technology, the Zero Trust architecture is now turning quite popular among modern day enterprises. The article examines different aspects of this development and also discuss the relevance of the rapidly evolving Zero Trust architecture.
In the present era, an individual’s privacy solely depends on internet security. Your banking details, your pictures, and other sensitive information are available on different channels such as social media accounts, websites, and other online platforms. Therefore, the usage of VPN has increased drastically. But are you sure your VPN is working correctly?
If not, then you might be at risk. If you are using a weak or vulnerable VPN, then you are directly putting your data into a much worse condition.
As asylum seekers and other vulnerable people are required to give up more and more of their personal information to agencies charged with protecting them, the human rights organizations that work to help such populations become targets of cyberattacks themselves.
Cyber abusers see them as a portal to get to their victims. The recent discovery of a significant messaging app vulnerability used to target human rights groups is just one example of these malicious efforts, but provides significant cause for alarm.
Comments will be approved before showing up.