The AlphaBay Takedown Sends Dark Web Markets Reeling (Wired, Jul 14 2017)
But law enforcement’s raid on AlphaBay won’t end the darknet’s vibrant drug trade….
Is MDM your solution to GDPR? (Gartner Blog, Jul 11 2017)
There is much hype around the GDPR due to the fast approaching deadline of 25 May 2018. As a result organizations are looking for solutions, and many vendors have seen……
Cisco continues its network-based security strategy by moving to acquire Observable Networks (Network World Security, Jul 13 2017)
Over the past few years Cisco has changed the face of its security business. What was once a struggling concern is now the fastest-growing part of Cisco. How did the company do this? Part of the rebirth of Cisco security can be traced to a change in focus, away from point products to a more data-driven model. Big data, analytics and machine learning have been hot topics in IT, and Cisco has gotten religion in this area and applied it masterfully to its security business.Today, Cisco added to that when it announced its intent to acquire privately held Observable Networks. The St. Louis-based company provides dynamic network behavior monitoring to help security teams find anomalies that could indicate a breach….
Australia Considering New Law Weakening Encryption (Schneier on Security, Jul 17 2017)
News from Australia: Under the law, internet companies would have the same obligations telephone companies do to help law enforcement agencies, Prime Minister Malcolm Turnbull said. Law enforcement agencies would need warrants to access the communications. “We’ve got a real problem in that the law enforcement agencies are increasingly unable to find out what terrorists and drug traffickers and pedophile……
6 Reasons Israel Became A Cybersecurity Powerhouse Leading The $82 Billion Industry (Forbes, Jul 18 2017)
6 Reasons Israel Became A Cybersecurity Powerhouse Leading The $82 Billion IndustryForbes“Cyber is a great business. It’s growing geometrically because there is never a permanent solution, it’s a never-ending business,” said Benjamin Netanyahu, Israel’s Prime Minister, at Tel-Aviv University’s 7 Annual Cybersecurity Conference….
Four ways to use open data sources to find cybersecurity candidates (ITworld, Jul 18 2017)
The ongoing cyber skills shortage isn’t helping matters. By 2021, 3.5 million cybersecurity jobs will go unfilled, up from 1 million openings last year, according to Cybersecurity Ventures. To find new talent, OneLogin considered moving some of its ……
The Cybersecurity Canon – How to Measure Anything: Finding the Value of ‘Intangibles’ in Business (Palo Alto Networks Blog, Jul 19 2017)
Hubbard explains two math tricks that, after reading, seem impossible to be true, but when used by a Bayesian proponents, greatly simplify measurement-taking for difficult problems: The Power of Small Samples: The Rule of Five and The Single Sample Majority Rule (i.e., The Urn of Mystery Rule): …
Are Bug Bounties a True Safe Harbor? (The State of Security, Jul 20 2017)
Security vulnerabilities are becoming the new oil, and the bug bounty economy is booming. As news of cyberattacks and data breaches continue to consume the press, never before has the market for vulnerabilities been so dynamic. …
Information Risk Management Tips from Industry Experts (AccessData’s Blog Posts, Jul 19 2017)
As a former editor with Compliance Week, Kelly adeptly facilitated the discussion while panelists addressed pressing topics around risk:
– Defining information risk throughout the enterprise.
– Companies’ understanding of information risk.
– How to assign ownership of information risk.
– The technological changes making information risk complicated….
Microsoft’s secret weapon in ongoing struggle against Fancy Bear? Trademark law (Risk Assessment – Ars Technica, Jul 21 2017)
The idea…to use various federal laws—including the Computer Fraud and Abuse Act (CFAA), the Electronic Communications Privacy Act (ECPA), and American trademark law—as a way to seize command-and-control domain names……