Golden Networking's Cyber Security World Conference 2014 New York City
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Education, Finance, Government, IT Security, Security, Technology

State Department Computers Hacked, Email Shut Down while Repairing Possible Damage from Suspected Hacker Attack

The State Department has taken the unprecedented step of shutting down its entire unclassified email system as technicians repair possible damage from a suspected hacker attack.

A senior department official said Sunday that “activity of concern” was detected in the system around the same time as a previously reported incident that targeted the White House computer network.

That incident was made public in late October, but there was no indication then that the State Department had been affected. Since then, a number of agencies, including the U.S. Postal Service and the National Weather Service, have reported attacks.

Read more

Advertisements
Standard
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Government, IT Security, Security, Technology

Sony’s conundrum: Whether to release ‘The Interview’ online

After deciding against premiering the film to theaters, the movie studio could make it available online. Here are a few possibilities (and a few counterarguments).

Seth Rogen and James Franco’s cancelled comedy film The Interview has caused Sony Pictures one of the biggest headaches this side of the DMZ.

Having pulled the film in the face of terrorist threats, the movie studio could still recoup its investment if it chooses to by releasing it online through YouTube, iTunes or though the file sharing service BitTorrent. Sony also owns the little known streaming service, Crackle, which would get a bit publicity boost by showcasing a high-profile Hollywood premiere.

Read More

Standard
Business, Cloud Computing, Cyber Security, cyber security legislation, Defense, E commerce, Finance, Government, IT Security, Security, Technology

“The last time Australian authorities looked at cybersecurity was 2008… six years is a very, very long time in this fast changing technology landscape.”

“The last time Australian authorities looked at cybersecurity was 2008… six years is a very, very long time in this fast changing technology landscape.”

At a time when public discussion about the role of our security services has never been greater, it makes sense that the Australian Prime Minister Tony Abbott should order a review of the nation’s cybersecurity strategy.

The last time Australian authorities looked at cybersecurity was 2008, and anyone who works in the security sector will tell you that six years is a very, very long time in this fast changing technology landscape.

It is a reality that the global cybersecurity environment has changed dramatically in this time. The sophistication of cyber-attacks has grown with the technology, just as it has grown with the financial rewards that these nefarious attacks can bring.

Read More

Standard
Business, Cyber Security, Cybersecurity, Defense, E commerce, Finance, Government, Healthcare, IT Security, Security, Technology

5 Challenges To Cybersecurity In The New Year

It’s been a tough year for those battling cybersecurity threats and data breaches. From Target and Home Depot to JP Morgan Chase and Sony Pictures Entertainment, 2014 reminded business executives and consumers that nobody is invincible when it comes to cybercrimes. So, as 2015 approaches, one thing is certain: cybercriminals are becoming more elite, and a defensive approach is going to lose every time.

Read More

Standard
Business, Cybersecurity, Defense, Finance, Government, IT Security, Security, Technology

National Cybersecurity Center of Excellence improving security in US, Israel

What An American Government expert in cyber security for US infrastructure-related companies doing at a conference in Israel? Nathan Lesser, deputy director of the relatively new US National Cybersecurity Center of Excellence (NCCoE), is all about security and efficiency.

Read More

Standard
Business, Cloud Computing, Cyber Security, cyber security legislation, Cybersecurity, Defense, Finance, Security, Technology

Rapid7 gets $30M to invest in new cybersecurity initiatives and expand global reach

Rapid7, a Boston-based cybersecurity firm, announced Wednesday it has secured $30 million in new equity funding for expansion.

The new investment brings total funding to date for the company to $90 million since its founding in 2000, and investors include Bain Capital and Technology Crossover Ventures.

Rapid7 CEO Corey Thomas said the investment is good validation for the company, and it’ll allow the business to double-down on product development and global reach.

Read More

Standard
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Finance, IT Security, Security, Technology

opic: IT Security in the Snowden Era Follow via: RSSEmail Alert Bluster, bravado and breaches: Today’s ‘terrorist’ players in cybersecurity

An emailed threat can send companies to their knees and propel individuals without so much as a parking ticket straight to a holding cell. The problem is, today’s puffed-up chest hacktivists know it, and Sony has borne the brunt.

For good or ill, technology has evolved and has become part of our daily lives in the West. With the correct skill set, a hacker can launch their political agenda onto the global stage by selecting targets based on maximum impact.

Our identities are no longer purely physical; instead, our digital footprint and behavior online is now connected to the world around us. Political movements can be organized online, ideas shared, and communication networks are more based more on digital networks than ever before.

Read More

Standard