Read Jason Soroko article about how to protect yourself against accidental Internet of Things insider threats on IoT for All : When considering insider threats faced by the Internet of Things (IoT) systems, few will be surprised to learn that protecting a network with a growing number of connected devices from a maliciously motivated insider is becoming increasingly … [Read more...] about Defending Against IoT “Accidental” Insider Threats
CTOvision Provides Cyberwar Context From Recognized Experts
Cyber War Is Not A Traditional Violent Clash On A Battlefield. But It Is A Conflict On A Broad Scale And You Are A Target.
|The study of cyberwar is more important now than it has ever been. Over the last 20 years we have witnessed cyberwar evolve from an obtuse but prescient concept to a theoretical possibility to a world of constant cyber attacks to today, where all war has cyber components. All war today is cyber war, and all conflict is cyber conflict.|
Cyberwar is a state of conflict. It is related to the technological environment and to cybersecurity, but cyber conflict comprehends those and many other topics into a greater national security construct. Today our nation faces constant adversary action and conflict in cyberspace. Meeting the challenges this adversary action causes requires an understanding of what people and companies and governments can proactively do to bring the fight to adversaries. It also involves deep understanding of adversary tactics and capabilities so we can really understand The Cyber Threat.
|We track the the history of cyber conflict, the cutting edge concept being implemented in government, the technological dimensions of cyber war, and, most importantly, the key actions you should take to help protect your personal and business information in cyber conflict. We do that by capturing the thoughts of national security experts and cyber warriors with direct experience in this very serious domain. Our thought leaders take positions, but provide you with the insights you need to evaluate whether or not you support those positions. For example, see: What If This Is The Most Important Thing The Government Can Do To Enhance Our Cybersecurity? where we advocate for the intelligence community to provide compelling insights on the cyber threat to the American people. We also encourage everyone to consider that: Now That You Are A Soldier In The Cyber War You Must Know Your Cognitive Biases For a primer on strategic topics associated with cyberwar see: Twelve Principles of DoD Cyber Conflict|
Read Chris Wilder list three things about cybersecurity in 2019 on Forbes : Every year, it seems, pundits and egg-heads (like me) write down our predictions. Most of the time they are self-serving. However, looking into my crystal ball, I think 2019 is going to be a defining year at the intersection of physical and cybersecurity. The Internet of Things (IoT) and advances in … [Read more...] about Three Things To Know About Cybersecurity In 2019
The average ransomware payment is growing as criminals become more sophisticated in their attacks, according to a report released by ransomware incident response company Coveware. According to Coveware’s Q4 2018 Global Ransomware Marketplace Report, the average ransom increased by 13% to $6733 in Q4 2018 compared to Q3’s $5973. It's difficult to judge the statistical margin of … [Read more...] about The Average Ransomware Payment Is Rising
The number of publicly known data breaches decreased last year compared to 2017, despite harsher breach notification rules going into effect in Europe. The number of compromised sensitive records also went down by more than a third, from 7.9 billion records to around 5 billion. According to a new report from security intelligence vendor Risk Based Security (RBS), over 6,500 … [Read more...] about Data breaches exposed 5 billion records in 2018
Read Philip James explain how companies can start using the zero trust model to prevent phishing on SC Magazine : Currently, the majority of all cyber attacks can be traced back to phishing. It’s become THE most common way for breaches to happen — both to businesses and individuals. In fact, nearly 60 percent of email today is spam, and three-quarters of organizations say … [Read more...] about Using the zero trust model to prevent phishing