challenges

now browsing by tag

 
 

Addressing security challenges, kidnapping | The Nation | #childabductors | #parenting | #parenting | #kids

Source: National Cyber Security – Produced By Gregory Evans

Almost no day passes without one abduction being recorded on the Kaduna-Abuja highway. In this special report, the News Agency of Nigeria (NAN) speaks to experts on how to address […]

The post Addressing security challenges, kidnapping | The Nation | #childabductors | #parenting | #parenting | #kids appeared first on National Cyber Security.

View full post on National Cyber Security

School Administration Software Market 2020: Potential Growth, Challenges, and Know the Companies List Could Potentially Benefit or Loose out From the Impact of COVID-19 | Key Players: Rediker Software, ThinkWave, PowerVista RollCall, Fedena, RenWeb, etc. | #coronavirus | #kids. | #children | #schools | #parenting | #parenting | #kids

Source: National Cyber Security – Produced By Gregory Evans

School Administration Software Market 2020: Potential Growth, Challenges, and Know the Companies List Could Potentially Benefit or Loose out From the Impact of COVID-19 | Key Players: Rediker Software, ThinkWave, […]

The post School Administration Software Market 2020: Potential Growth, Challenges, and Know the Companies List Could Potentially Benefit or Loose out From the Impact of COVID-19 | Key Players: Rediker Software, ThinkWave, PowerVista RollCall, Fedena, RenWeb, etc. | #coronavirus | #kids. | #children | #schools | #parenting | #parenting | #kids appeared first on National Cyber Security.

View full post on National Cyber Security

Children with disabilities face challenges in, out of detention | #teacher | #children | #kids | #parenting | #parenting | #kids

Beckett Haight, 38, has worked as a special education teacher for 15 years, supporting students in classrooms across the globe. When talking with students about his struggles with attention deficit […] View full post on National Cyber Security

#nationalcybersecuritymonth | New Windows Vulnerabilities Highlight Patch Management Challenges –

Source: National Cyber Security – Produced By Gregory Evans

Microsoft’s monthly “Patch Tuesday” is an important part of the cyber hygiene routine for anyone in IT (including home users). This month’s update proved to be a particularly critical one.

Early in January, the National Security Agency (NSA) alerted Microsoft to a major flaw in Windows 10 that could let hackers pose as legitimate software companies, service providers, websites, or others. “It’s the equivalent of a building security desk checking IDs before permitting a contractor to come up and install new equipment,” Ashkan Soltani, a security expert and former chief technologist for the Federal Trade Commission, told CNN.

Fortunately, Microsoft acted quickly and issued a critical update — CVE-2020-0601 — on January 14.

Despite this quick action, businesses and government have a habit of missing, ignoring, or delaying important patches and updates. They do so at their peril. In 2019, the majority of cybersecurity breaches were a result of unapplied patches. However, the reasons for this oversight are complicated and often unintentional.

Patch management — IT’s nightmare

Getting a handle on patch management is an unending challenge for IT and security teams. Last year, 12,174 common vulnerabilities and exposures (CVEs) were reported — making patching an almost impossible task for any organisation. In fact, it takes the average organisation 38 days to patch a vulnerability. Even then, 25% of software vulnerabilities remain unpatched for more than a year.

One of the biggest obstacles to frequent patching is that security teams struggle to identify everything that needs to be fixed. Understaffed and struggling with alert fatigue, it can be hard to identify the systems that are yet to be updated, prioritise remediation, and apply patches quickly.

To add to their workload, IT and cybersecurity teams must also make certain that the appropriate security policies are in place to ensure that users regularly update their PCs and devices, and don’t delay the inevitable “Windows Update”. Risk also extends beyond the four walls of the business.

Third- and fourth-party cyber risk is a big threat to businesses. 59% of breaches have their origins in vulnerable and unpatched third-party systems. The trouble is that vendor risk assessment questionnaires only offer a point-in-time view into the security posture, including unpatched software of suppliers, partners, and sub-contractors. This leaves IT in the dark.

Windows 7 — a new risk

Microsoft has been focused on closing gaps in its Windows 10 OS. This left Windows 7 users walking into a new cybersecurity landmine on January 14, 2020. Microsoft ended support for the nine-year-old OS and will no longer issue security patches or updates.

This is particularly problematic, since almost 70% of organisations are still using Windows 7 in some capacity. It leaves them susceptible to a security issue, attack, or breach — unless they purchase extended support from Microsoft or upgrade to Windows 10.

Fixing the patch management challenge

Maintaining a frequent patching cadence is critical to mitigating cyber risk, but it doesn’t have to be a nightmare.

With the BitSight Security Ratings platform, your organisation can shine a spotlight on vulnerable, unpatched systems and out-of-date operating systems. It provides insight for both internal systems and across nth parties (partners, vendors, customers, etc.). Using these insights, IT teams can prioritise which patches are most critical and take steps to measurably reduce risk. In addition, security ratings make it easier to share actionable security information with other business functions.

This information allows teams to collaborate with each other on pressing security issues. It also helps reduce risk across your business ecosystem. Furthermore, because patching cadence is indicative of the likelihood of a breach, it has stepped into the spotlight as something the Board and C-suite is interested in. Security ratings mean this conversation becomes much easier. Information about vulnerabilities is provided in a straightforward and non-technical way that is easy for everyone to understand.

Organisations can also share security ratings with partners. This allows third parties to identify and rectify issues and blind spots in their systems and software — continuously and in real-time, without waiting on lengthy audits or assessments.

Time is of the essence

As the recent Windows 10 critical update shows, organisations must do everything they can to stay on top of their patching cadence and that of their vendors.

But there’s no need for organisations to be paralysed by the sheer volume of ongoing patches. Learn more about how BitSight can help.


https://www.bitsighttech.com/BitSight transforms how companies manage third and fourth party risk, underwrite cyber insurance policies, benchmark security performance, and assess aggregate risk with objective, verifiable and actionable Security Ratings.

Source link

The post #nationalcybersecuritymonth | New Windows Vulnerabilities Highlight Patch Management Challenges – appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | #hackerspace | Deepfakes Pose New Security Challenges

Source: National Cyber Security – Produced By Gregory Evans

Expect to hear a lot about deepfakes in 2020. It’s not that manipulating images is anything new, but with technology advantages and the increasing use of biometrics as an authentication tool, deepfakes will impact cybersecurity efforts.

For example, cybercriminals are now perfecting deepfakes to impersonate people to steal money and anything that might be valuable. The technology has been improved to reach a higher level, where it becomes difficult to tell the difference between a fraud and a friend.

According to McAfee researchers, deepfakes will make it more difficult to achieve true facial recognition, just as facial recognition software is increasingly used to unlock smartphones and as airport identification alternatives, to name a few use cases.

“As technologies are adopted over the coming years, a very viable threat vector will emerge, and we predict adversaries will begin to generate deepfakes to bypass facial recognition,” Steve Povolny, head of McAfee Advanced Threat Research, wrote in a McAfee blog post. This is because “enhanced computers can rapidly process numerous biometrics of a face, and mathematically build or classify human features, among many other applications.”

To do this, scammers turn to an analytics technology known as generative adversarial networks (GANs) to create fake but extremely realistic, images, text and video, making it more and more difficult to tell the real thing from a deepfake. This will make it more difficult for those charged with security to tell the difference between legitimate and fake.

Facial Recognition Already Has Flaws

Despite its growing adoption, facial recognition comes saddled with all types of security problems. The Washington Post reported on a recently released federal study showing these systems show biases against people of color and between genders and age groups. “The National Institute of Standards and Technology, the federal laboratory known as NIST that develops standards for new technology, found ‘empirical evidence’ that most of the facial-recognition algorithms exhibit ‘demographic differentials’ that can worsen their accuracy based on a person’s age, gender or race,” the article reported.

Now add deepfakes to the problems that already exist with facial recognition, and any type of criminal will be able to manipulate the analytics to bypass the law. Deepfakes will make law enforcement more difficult, from police on the street to nation-state election fraud. Those tasked with security will be asked to tell the difference between the real and the fake;  deepfakes will make it even more difficult.

So Easy, Even a Novice Can Do It

Some computer savviness will be necessary to create deepfakes, but this is going to be a tool available to novices, one that could raise the stakes for insider threats as well as outside cybercrime.

As an experiment for an Ars Technica article, Timothy Lee did a deep dive into how deepfake software works. It was time-consuming—it took two weeks for him to create a video that replaced Mark Zuckerberg with a character from Star Trek—and it required a lot of computer power, but it wasn’t expensive (a little more than $500). And he developed skills that will make him more proficient if he makes another video.

Now consider if an employee or a contractor wanted to deploy their own deepfake video as a malicious attack against the company or a fellow co-worker.

“Deepfake video or text can be weaponized to enhance information warfare. Freely available video of public comments can be used to train a machine-learning model that can develop a deepfake video depicting one person’s words coming out of another’s mouth,” Steve Grobman, McAfee’s Chief Technology Officer wrote. “Attackers can now create automated, targeted content to increase the probability that an individual or groups fall for a campaign. In this way, AI and machine learning can be combined to create massive chaos.”

Close But Not Quite There

At McAfee’s MPower conference in October, researchers discussed their pre-emptive strike against AI-generated deepfakes and image manipulation. While deepfake-related attacks are imminent, they aren’t yet happening, at least not on a high-scale level. Right now we’re seeing what could happen mostly with examples and experiments. So, the researchers said, this is one cybersecurity attack that security teams are addressing before the fact rather than in reaction to, and hopefully the tools will be in place sooner rather than later.

But the attackers and the technology isn’t quite there yet, either. “While an attacker can use deepfake techniques to convincingly emulate the likeness of an individual, it still difficult to digitally impersonate one’s voice without fairly obvious imperfections,” said Robert Capps, vice president of market innovation for NuData Security, in an email comment.

“Deepfake audio or video cannot currently be rendered in real-time without an attacker having a large volume of computing resources and a lot of high-quality audio and video source material to train computer machine learning algorithms,” Capps continued. “While deepfakes can be convincing to other humans, they are unable to pass physical or passive biometric verification, so coupling strong liveness detection, along with the collection of passive and physical biometric signals to verify a user’s identity, largely mitigate the current risks presented in banking transactions.”

Security challenges with deepfakes are out there, but hopefully, security professionals will have the tools in place to address them before serious damage is done.

Source link

The post #cybersecurity | #hackerspace |<p> Deepfakes Pose New Security Challenges <p> appeared first on National Cyber Security.

View full post on National Cyber Security

Top #global #cybersecurity #challenges and #how to #overcome #them

Imagine the havoc wreaked on your company’s servers if they were infected by a distributed denial of service (DDoS) bot that is bundled with a ransomware payload, or the damage to your brand if a phishing attack targeting your users and customers resulted in the theft of personal information.

Whatever the kind of cyberattack, there can be serious consequences for the company. It could be forced to pay big money to rescue its systems from the clutches of cybercriminals, lose the trust and confidence of customers and users, and even be liable to pay fines and penalties for failing to comply with data privacy laws such as the EU’s Global Data Protection Regulation (GDPR).

As the size and type of cyberattacks continue to exand, many organizations struggle to focus their efforts on what matters most to their unique business. Here are some of today’s top global cybersecurity challenges and how companies can overcome them to strengthen their cyber defense:

Managing both content security and performance

Customer data is one of your company’s most important assets and is a significant investment for your business. When there’s a breach, you’ll lose customer trust because they’ll start to worry about other vulnerabilities in your network.

To protect against such an attack, companies must ensure their security solutions and software are always up to date. However, with so many types of new attacks cropping up every day, it’s best to use a comprehensive, cloud-based suite vs. a one-off solution. Doing so will help protect your business against new and emerging threats and allow you to employ preventive mitigation measures without adding latency to the delivery experience.

Safeguarding against DDoS attacks

A DDoS attack is one where a network of zombie computers sabotage a specific website or server by fictitiously boosting the volume of traffic causing it to shut down. Such attacks cause businesses to lose millions in revenues.

Another reason for DDoS to be a growing concern is the frequency and sophistication of attacks along with their duration and size, which has increased over the past few years.

To protect yourself against the financial and reputational damages caused by such an attack, you could use a product that can proactively intercept and mitigate a DDoS attack.

This provides much faster scrubbing performance since traffic isn’t moved off your Content Delivery Network (CDN), the network of proxy servers and data centers that distributes your data, for cleaning.

Limelight Network’s solution is effective because when it detects an attack, it passes the traffic to one of several globally distributed scrubbing centers to filter it before passing it back to your origin.

Protecting web applications

As a business, the idea behind launching a web application is usually to improve the customer experience. However, unless you protect your web applications appropriately, they’ll just expose you and your customer to unwarranted cyberthreats.

According to Limelight Networks, retail and financial sectors in Southeast Asia suffered the most from web app attacks. Over the past year alone, there has been a significant increase in attack incidents, with websites containing consumer data being the target of 60 percent of attacks.

To combat such threats effectively, business leaders are now turning to cloud-based security solutions instead of on-premise equipment.

Using a Web Application Firewall (WAF) to secure your web-apps as it inserts its nodes between origin servers and the CDN does the heavy work of content caching, web acceleration, and delivery of static content.

Web app attacks are dynamic, so if your WAF only accepts traffic from your CDN, it can minimize the performance impact of WAF protection and lock down IP traffic.

When a new vulnerability is identified, a new security rule should be created and pushed to all WAF nodes. Doing so makes the solution so secure that it can even close “zero-day” attacks prior to app vendor patches being deployed.

You should also make sure your chosen security solution offers protection against malicious bots. They’re the ones that crawl the internet looking for vulnerabilities for cyberattacks.

Staying ahead of the curve

If you’re a business that aims to empower customers through your digital presence, you’ll need to implement (and update) cybersecurity measures at your organization immediately.

Failing to do so puts a lot at risk on your business – including your reputation and the future prospects of your company.

Implementing a cybersecurity solution created and backed by a company such as Limelight Networks, for example, helps you secure your business on all fronts.

The company’s DDoS Attack Interceptor combines a global CDN with in-network detection and attack mitigation to facilitate situation-aware detection and mitigation via on network scrubbing centers.

Its CDN protection offers several features such as geo-fencing, IP whitelisting and blacklisting, which help you fend off even the most seasoned cybercriminals. The same is also true for its DDoS protection and WAF solution, both of which give you the best-in-class cyber protection.

The company’s scalable cloud-based architecture also allows you to reduce the total cost of protection by leveraging its massive global private infrastructure.

Limelight Networks also boasts world-class features such as a dedicated global network, proactive, intelligent threat detection using behavior-based analysis, and cloud-based scrubbing of traffic – which reassures even the most concerned consumer. Act now, because hackers won’t spare your systems while you’re still wondering what to do next.

advertisement:

The post Top #global #cybersecurity #challenges and #how to #overcome #them appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

4 #solutions to the 3 #biggest #cybersecurity #challenges

Cybersecurity and the threat of malicious actors make headlines every day. Boards of directors are recognizing cyber threats as one of the most significant risks. To date, this cybersecurity discussion has centered largely on IT systems; however, the industrial control system (ICS) that operates a facility is often as critical as or more critical than the IT system to an industrial company’s financial results.
The FBI issued a warning in 2016 to the nation’s power companies that the sophisticated cyberattack techniques used to bring down portions of the Ukraine’s power grid in 2015 could easily be used against U.S. firms. In fact, the most recent report of Russian hacking was identified last week by the U.S. Computer Emergency Readiness Team (U.S. CERT).

According to an alert released by U.S. CERT, a seven-year-old group known as Dragonfly orchestrated the hacking campaign, which hit U.S. government entities and domestic companies in the energy, nuclear, commercial facilities, water, aviation and critical manufacturing sectors. “In multiple instances, the threat actors accessed workstations and servers on a corporate network that contained data output from control systems within energy generation facilities,” states the report.

The results of such an attack could be catastrophic, as Pew Research Center reports that 61% of experts agree a major cyber attack would occur by 2025 causing far-flung harm to the nation’s security and capacity to defend itself. The cost of such attacks will be tremendous. Lloyd’s estimates a blackout across 15 U.S. states would affect 93 million people and cost the economy between $234 billion and $1 trillion.

Despite the need for ICS cybersecurity, three key challenges impede many operations executives from pulling the trigger on that investment. John Livingston, CEO of Verve Industrial Protection, identifies three reasons for that hesitancy:

risk/fear

lack of tools

lack of talent.

1. Risk/fear by leadership of operational disruption from deploying cybersecurity measures. Most operational leaders do not believe their systems are under significant threat. The lack of publicized successful attacks and the general architecture of these networks lead to the belief that these systems are immune to the threats seen on the IT side.

“As a result, the risk of doing something is greater than the risk of doing nothing,” says Livingston. “Potential operational risks include putting security software on control systems equipment that may disrupt normal operations; changing passwords that may create delays in response to a critical operational issue; and adjusting network architectures that may limit access to critical employees or vendors. All of these risks are very real, so I do not intend to downplay them. They must be addressed in any solution.”

2. Lack of tools and approaches that are tuned to the unique challenges of securing industrial control systems. The IT cybersecurity market has grown with a focus on protecting traditional IT devices, explains Livingston. The tools often don’t work in the operations-technology (OT) environment without significant adjustment and tuning. In fact, if improperly installed, they can cause more risk than protection.

3. Talent shortage of people with both operational expertise and cybersecurity knowledge that can be applied to these unique circumstances. A report from Frost & Sullivan and the International Information System Security Certification Consortium, or (ISC)², found that the global cybersecurity workforce will have more than 1.5 million unfilled positions by 2020. At the same time, the number of experienced ICS engineers is declining rapidly as fewer young people go into this career. When you combine the need for ICS and cybersecurity expertise, the talent shortage is extreme.

What can be done?
While the challenges are very real, Livingston recommends four key measures companies can take. Each step is specific to a company’s CFO, as CFOs are a natural bridge between the chief information officer (CIO) or chief information security officer (CISO) with their IT backgrounds and the operations executives.

1. Know what you can do, not just what you cannot do, in ICS. There is a lot you can do, but OEMs and people who have been burned by poorly implemented solutions have convinced owners and operators that these systems are too sensitive to protect. Or at a minimum can only be protected by the OEMs themselves. “I encourage the CFO to bring an independent view and assess what can be done, if done appropriately and safely,” says Livingston. “As we like to say, ‘Take back control of your network,’ from the OEMs holding it hostage.”

2. Pick a standard for security and build a maturity plan. There are many standards that can be applied to ICS security from NIST and NERC CIP to CSC20 and IEC/ISA. All have their pros and cons, and an organization could debate them for a long time. Livingston’s advice is to select something and begin the journey. Each stage of security maturity has benefited over the previous. And they get better as you add new layers over time. A standard allows a CFO to measure centrally against a metric that is common across all industrial control systems.

3. Build security into your capital, as well as operations and maintenance planning. By doing this you don’t have separate budgets for security and operations. Security is a fundamental feature of operations, like maintenance or safety is. Like safety and maintenance, security is a part of ensuring consistent, reliable operations and should be a part of all capital and operational planning discussions.

4. Consider a holistic approach. Take a holistic approach to managing the security risk that not only includes tools and processes for protection, but also purchasing targeted insurance for those risks that do not warrant the expense necessary to protect. “You won’t be able to secure everything, or every possible attack,” explains Livingston, “but you should build foundational elements and then insure what you can.”

The role of CFO in ICS security is absolutely critical. For non-services companies, the protection of these systems is fundamental to sustaining financial results. The CFO is uniquely positioned to bridge the space between the CISO and the operational leadership to drive to a solution using the four steps outlined above to begin a cybersecurity maturity journey and make this a part of every planning discussion.

advertisement:

The post 4 #solutions to the 3 #biggest #cybersecurity #challenges appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

How to #Solve the 3 Biggest #Challenges in #Cybersecurity Customer Success

Source: National Cyber Security – Produced By Gregory Evans

How to #Solve the 3 Biggest #Challenges in #Cybersecurity Customer Success

If you’re waiting for the next major cybersecurity breach, history has shown us time and again that you just have to give it a minute. Yahoo. Equifax. Target. Home Depot. Chase. Sony. OPM. These high profile breaches happen seemingly every few weeks, but the reality is that thousands of cyberattacks are happening every day. It’s no wonder that security is one of the fastest growing sectors in tech.

Even during my time at Symantec a decade ago, it was clear that security was only going to get more important over time. Now, years later, every single one of us has been personally affected by a breach, hack, or cyberattack of some kind. This isn’t going away and it’s not going to stop.  Because of this, security software is by far one of the fastest growing parts of the enterprise IT market.

You can imagine that it’s therefore a great time to be a cybersecurity vendor.

At the same time, it’s not all smooth sailing in security land. Because customers are buying so many overlapping solutions, adoption of security technology is a huge challenge. And clients, faced with a growing amount of spend, are asking vendors about the outcomes they are achieving.

As such, security is one of the fastest growing sub-sectors in Customer Success. At Gainsight, we’ve been fortunate to partner with several established, leading, and emerging vendors on their Customer Success strategy—including Cisco, Okta and RiskIQ.

My former boss, Enrique Salem (former CEO of Symantec and now partner at Bain Capital Ventures) and I hosted a dinner with Customer Success leaders at top security companies to discuss what’s unique about the convergence between CS and Security:

The way the attendees saw it, there are three main reasons why cybersecurity is an ideal fit for Customer Success principles and practices—and those same reasons make implementing those principles and practices uniquely difficult, though rewarding.

1. Adoption is complex→Make health scores about “currency”

Security tools tend to be different from most softwares in two fundamental ways:

Users don’t “use” the software.
“Success” often involves being invisible
In other words, when your security solution is working optimally, you don’t notice it. These companies go to great lengths to make sure their tools are as lightweight and invisible as possible. When you log off at the end of the day and nothing bad happened, that’s a huge win. But from your perspective, it’s just another day.

From a Customer Success Management perspective, that makes tracking health a conundrum. How do you track usage when your product is constantly running in the background? How do you understand satisfaction when your password management app has 100% adoption at a client?

What I learned at this event is that adoption is largely about “currency,” and I don’t mean money. As cybersecurity is about constantly reacting to and preempting threats, how current your version is (in terms of updates and patches) is a huge indicator of how successful you’ll be with the product. In other words, if your customer isn’t up-to-date, they aren’t secure and therefore aren’t getting value.

Customer Success leaders at top security companies have created dynamic health scores that include version currency, breadth of deployment, and other custom factors.

2. Outcomes are difficult to measure→Design end-to-end success plans

As I mentioned before, the customer’s desired outcome with their security solution is (typically) that nothing bad happens and they aren’t disrupted in their day-to-day workflow. To phrase it differently, their objective is a negative, or an absence. For most software products, the goal is much more concrete—and much more positive. For instance, the goal with Gainsight might be a 5x increase in product adoption, or an 8% increase in gross renewals, etc.

With security, how feasible is it to define success as a 0% increase in data breaches? Or to become 10x “more secure.” How do you define that—and more importantly—how do you benchmark that?

Even more challenging is finding the differential impact. If a breach was blocked, which vendor and technology gets credit? If a threat is missed, who takes the blame?

The leaders I talked to see a huge opportunity to better define their customers’ end-to-end success around things like time to detect, time to respond, and the type of threat detected. Building milestones in the customer journey at each stage from pre-sale to Services to Support and Customer Success is critical.

3. Clients are technical→You need technical resources in CSM

At the end of the dinner, we discussed our teams. In every category of Customer Success, companies struggle with the “unicorn” problem. We’d all love CSMs that can do it all—be technical, understand best practices, have walked in the client’s shoes, be firefighters, be strategic, be excellent communicators—and drop some sick karaoke while they’re at it!

In Security, this problem is turbocharged since security buyers are extremely technical.

In the CSM industry broadly, we have witnessed the emergence of a parallel technical partner to the CSM—CS Architect, CS Engineer, Technical Account Manager, etc. And in Security, many companies are leveraging their existing advanced technical resources (e.g., Premium Support Engineers) in this capacity

There’s more at stake than ARR

At the risk of getting melodramatic, I want to end by underscoring the importance of Customer Success beyond the basic economic value proposition that we (understandably) tend to focus on in B2B software. We know that when customers are successful, vendors are successful—it’s the founding premise of my company. But when it comes to Security, we don’t need that conditional statement to understand just how critical an industry it is.

When Security customers are successful, their data is safe. My data is safe. My kids’ data. That’s a heavy burden for companies that so often tend to themselves “run in the background” in the public consciousness. If you’re reading this and you’re in Security, my deepest thanks for what you do. Here’s to keeping all of us successful—and safe.

The post How to #Solve the 3 Biggest #Challenges in #Cybersecurity Customer Success appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hack to the future: HopHacks challenges students to solve problems using technology

Source: National Cyber Security – Produced By Gregory Evans

In rooms around Hodson Hall on Saturday night, clusters of students tapped away at their laptops amid a scattering of snack bags, soda cans, book bags, and belongings. Some took time out from their teamwork to study for a test. A few napped using balled up sweatshirts as pillows. It…

The post Hack to the future: HopHacks challenges students to solve problems using technology appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Online crime presents new challenges for insurers

Source: National Cyber Security – Produced By Gregory Evans

Any business in its right mind has crime insurance. What it may not have is the protection it needs to face new threats such as social-engineering fraud and ransomware. The recent $11.8-million vendor-impersonation scam against MacEwan University in Edmonton is only the latest high-profile social-engineering fraud in what has become…

The post Online crime presents new challenges for insurers appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures