Cybersecurity provider NTT Security reports that five countries are the most common sources to 50 percent of global cyberattacks (Figure 2). Akamai states that two-thirds of Distributed Denial of Service (DDoS) cyberattacks originate in ten countries. Symantec, another provider, adds 13 more countries for a total of 23 countries, which are homes to the worst cyber offenders and who are responsible for two-thirds of all malicious internet activity.
Ways to See the Threat Before it Happens
Threat modelling is widely in use, whether knowingly or not, across every walk of life – and has been used since time immemorial to prioritise security defences. The only difference between the well-known risk assessments carried out by everyone and threat modelling in cyber security is the attempt to document and systemise it. I am hoping that this idea of formal threat modelling will be a useful tool for you to use in your future arsenal of available resources as a CP operator.
Leveraging Technology in Industry Hiring
Increased global connectedness through technology is fast becoming the norm these days. Video conferencing and “face to face” meetings are happening daily in real-time across the world. As an industry that prides itself on having the edge over our adversaries, we are falling below our own standards when it comes to utilizing the technological resources at our availability to their fullest potential.
AlertEnterprise Reveals First-Ever Guardian AI Chatbot Powered by OpenAI ChatGPT
AlertEnterprise has unveiled its first-ever Guardian AI Chatbot powered by OpenAI ChatGPT. The chatbot will make its global debut at the ASIS Europe and ISC West trade events. Built on OpenAI’s GPT-3 platform, the Guardian AI Chatbot aims to provide security operators with instant access to critical physical access and security insights through quick questions and prompts.
Cash App Founder Bob Lee Fatally Stabbed in San Francisco
Tech executive Bob Lee, the founder of Cash App and former chief technology officer of Square, was tragically stabbed to death in San Francisco. The 43-year-old was attacked in the early hours of Tuesday morning on Main Street. Despite being rushed to the hospital, Lee succumbed to his life-threatening injuries.
U.S., U.K., and Germany Rank Top in Ransomware Attacks
A recent report by Black Kite analyzed 2,708 ransomware victims from April 2022 to March 2023, revealing a significant resurgence in ransomware attacks. The number of victims in March was nearly double that of last April and 1.6 times higher than the peak month in 2022.
Meta Fires Security Guards for Hijacking User Accounts
Meta Platforms Inc. has fired or disciplined more than two dozen employees and contractors over the last year whom it accused of improperly taking over user accounts, in some cases allegedly for bribes, according to people familiar with the matter and documents viewed by The Wall Street Journal.
YouTube Should be Part of Your Social Media Strategy
YouTube is the number two search engine right behind Google (go figure). Everyday 3 BILLION VIDEOS are viewed on YouTube everyday. Why? For me personally and I’m sure thousands of others would rather find a video on how-to fix a widget then read pages of text on a web page.
Online Health Check for Protectors
As security professionals you may be an attack vector to your client if you do not maintain basic online security controls. At the very least you should be in a position to provide basic advice to your clients in order to help them stay secure.
Social Media Policies
Anyone who works for you and has their work title/position linked to your company represents your brand and is responsible for your reputation. They can also be a liability for you and may become the weak link of your company and their online activities are such that your competitors can use it against you.
Communication Planning – Hardware & Technology
It is inevitable if you work within the security sector that at some point, you will have has a radio thrust in your direction for you to use as your primary form of communication.
Yet many of you will not have received any significant training on it, yet this one tool that may just save your life.
In this article, we’re covering some of the things you might have missed.
Cyber Security Hiring
Whether you’re a seasoned cybersecurity professional or are looking to transition into the industry, it’s hard to know how to grab the attention of hiring managers and ultimately improve your chances of making it to the next stage.
Here are eight top tips from Renana Friedlich-Barsky, Director and Global Head of Cybersecurity Operations at PayPal, a proven leader in this space who’s reviewed more than her fair share of applications over the years.
Crisis Management and Social Media
Effective crisis management invariably involves social media, whether the organization is a large multi-national or a small hometown business. When a crisis erupts, the effective use of social media should be seen as a key priority to counteract the crisis.
Cyber Security
Especially while many people are still remote, technology has become more and more central to people’s lives, and we are talking about ways that things will or will not return to normal. As we hear about more and more cyber security incidents, each supposedly carried out by ‘sophisticated threat actors with unprecedented capabilities’, it’s time to talk about the mystique of cyber security and the problem it has with public perception.
Ransomware, Insurance, and Backups
Most people are not aware of the real impact and threat of ransomware campaigns going on almost constantly. While I’m sure everyone knows of the ransomware attack on the Colonial pipeline and the more recent similar attack on JBS, these are only the latest and most visible in a continuous stream of attacks. These are just the tip of the iceberg. The true scale is hidden not only by the media but also by a reluctance to talk about the problem.
Technology as a Standalone Security Solution – Are We Fooling Ourselves?
Is technology effective as a security solution or is it simply being misused? In this article, Ivor Terret shares his philosophy of the four pillars of effective and practical security and how they can only work together in conjunction – not as silos.
Introduction to Steganography
All the techniques of steganography share one core concept, trying to hide a message. When children draw stick figures as secret messages to each other, they are practicing steganography. Modern steganography is usually a lot more malicious. It is used in malware command and control and the exchange of illicit information and material. If you do not know where to look it is frighteningly hard to detect.
Securing Smart Home Devices
Smart home technology is a rapidly growing consumer and business product. Here are some figures that show projections for the growth of these devices, as well as current numbers
Kidnap & Ransom – Part 1
If you are a security professional with significant high-threat worldwide protective services experience, you know that depending on the client, it may not be a matter of if your client or a family member is kidnapped, but when. You also understand that it is likely that you may not even be directly providing protection for the client at the time it happens and unable to prevent it, especially when they are alone and most vulnerable.