When It Comes to Cyber Risks, 2018 Is No Time to Play Games

While some organizations have spent decades fine-tuning their ability to respond to and manage cyber risks, far too many are still playing games with their security strategy. From a cybersecurity perspective, 2017 will go down as a record year for data breaches. The Identity Theft Resource Center (ITRC) reported 1,579 breaches, up 45 percent from 2016. By…

Hackers Tried to Cause Saudi Petrochemical Plant Blast: NYT

Cyber-attackers tried to trigger a deadly explosion at a petrochemical plant in Saudi Arabia in August and failed only because of a code glitch, The New York Times reported. Investigators declined to identify the suspected attackers, but people interviewed by the newspaper unanimously said that it most likely aimed to cause a blast that would have guaranteed…

The Future of Tech is Female

This month, in honor of Women’s History Month, we spotlight Symantec Cyber Career Connection (Symantec C3) alumna Layla Gardner. Symantec C3 partner NPower recently launched their campaign “The Future of Tech Has a Name” to launch 15,000 digital careers by 2022.  Today we are excited to feature the second part of our three-part series, “The Future of Cybersecurity Has a Name”,…

Olympic Destroyer: who hacked the Olympics?

Long ago, during the Olympic Games, the participating countries halted their wars and put aside their political disputes. Today, the opposite is increasingly likely. The PyeongChang Winter Olympic Games started with a scandal: unknown hackers attacked the servers just before the opening ceremonies and many spectators were unable to attend the ceremonies as they were unable…

Road Trip or Road Rash? Compliance, Meet Security

I’ve been on the road a lot lately. Literally, I’ve been in the car, traveling along every kind of road, alongside virtually every type of vehicle you can imagine. And I sometimes found myself noticing things about the people who were driving all those cars, trucks and motorcycles. The motorcyclists were the ones I found…

Virtual Private Networks: Why Their Days Are Numbered

As companies move to the cloud and depend less on physical servers and network connections, their reliance on VPNs for security will eventually evolve, if not disappear altogether. Virtual private networks (VPNs) have for a generation been viewed as the connectivity solution for the distributed enterprise, enabling secure remote access for mobile workers and branch offices…

A view of the global threat landscape: Cybercrime and intrusion trends

Established and well-resourced cyber operations will continue to innovate, developing new methods of distributing crimeware and incorporating advanced tactics to infiltrate, disrupt and destroy systems, according to a new report by CrowdStrike. “We’ve already seen cyber adversaries launch massive, destructive attacks that render organizations inoperable for days or weeks. Looking ahead, security teams will be under…

U.K. Officially Blames Russia for NotPetya Attack

The United Kingdom on Thursday officially accused the Russian government of launching the destructive NotPetya attack, which had a significant financial impact on several major companies. British Foreign Office Minister for Cyber Security Lord Tariq Ahmad said the June 2017 NotPetya attack was launched by the Russian military and it “showed a continued disregard for…

Most CIOs plan to deploy artificial Iintelligence

Meaningful artificial intelligence (AI) deployments are just beginning to take place. Gartner’s 2018 CIO Agenda Survey shows that four percent of CIOs have implemented AI, while a further 46 percent have developed plans to do so. “Despite huge levels of interest in AI technologies, current implementations remain at quite low levels,” said Whit Andrews, research vice president…