Cyber Security Strategies that Won’t Break the Bank

Throughout my career, I have seen first-hand the real world impacts that a breach in cyber security can have on customers, businesses and communities. With cyber attacks growing in number and sophistication, today security is a requirement of “doing business”, however, many companies and organizations lack the knowledge and resources to secure their platforms, products…

Why phishers love HTTPS

As more and more sites switch to HTTPS, the number of phishing sites hosted on HTTPS domains is also increasing. “In the third quarter of 2017, we observed nearly a quarter of all phishing sites hosted on HTTPS domains, nearly double the percentage we saw in the second quarter. A year ago, less than three…

Five Emerging Threats That Worry Global Security Professionals

Over the next year, five separate threats will have one major effect: the current rate of security breaches will increase and worsen. This is the view of the Information Security Forum (ISF), an international network of more than 10,000 security professionals. The five primary threats to cyber security are the continuing evolution of crime-as-a-service; the…

Cybersecurity skills shortage creating recruitment chaos

Because of the global cybersecurity skills shortage, nearly half of all cybersecurity professionals are solicited to consider other jobs at least once per week. Here’s a quick review of some of the cybersecurity skills shortage data I’ve cited about in recent blogs: 1. According to ESG research from early 2017, 45 percent of organizations claim…

Facebook Flaw Allowed Removal of Any Photo

A researcher says he received a $10,000 bounty from Facebook after finding a critical vulnerability that could have been exploited to delete any photo from the social media network. In early November, Facebook announced a new feature for posting polls that include images and GIF animations. Iran-based security researcher and web developer Pouya Darabi analyzed…

‘Advanced’ Cyber Attack Targets Saudi Arabia

Saudi authorities said Monday they had detected an “advanced” cyber attack targeting the kingdom, in a fresh attempt by hackers to disrupt government computers. The government’s National Cyber Security Centre said the attack involved the use of “Powershell”, but it did not comment on the source of the attack or which government bodies were targeted.

White House Cyber Chief Provides Transparency Into Zero-Day Disclosure Process

The U.S. government Wednesday introduced greater transparency into its Vulnerabilities Equities Policy (VEP) program. This is the process by which government agencies decide whether to disclose or stockpile the cyber vulnerabilities they discover. In a lengthy statement, White House Cybersecurity Coordinator Rob Joyce explained why not all discoveries are disclosed. That will not change; but in introducing greater transparency into…