now browsing by tag
Source: National Cyber Security – Produced By Gregory Evans First amendment rights in the United States only go so far. Shout “fire” in a crowded room for thrills or threaten to kill someone and you will find yourself on the wrong side of the First Amendment interpretation of what constitutes free speech. Joseph Cecil Vandevere […] View full post on AmIHackerProof.com
Source: National Cyber Security – Produced By Gregory Evans By Gifty Amofa/ Eric Appah Marfo, GNA Accra, Oct. 26, GNA – The 5-day celebration of the National Cyber-Crime Awareness Month has come to an end with a call on citizens to be extra-cautious when using the internet. The media was also called to avoid being […] View full post on AmIHackerProof.com
There are nearly two billion usernames and passwords available for sale in the black market, according to a recent joint study carried out by Google Inc. and the University of California. A significant percentage of those login credentials can be used to directly access Google accounts, driving security researchers’ new focus on machine learning methods to keep password authentication processes from slowing down progress within cloud environments.
“As you start adopting cloud services, as we’ve adopted mobile devices, there’s no perimeter anymore for the company,” said David McNeely (pictured), vice president of product strategy at cybersecurity firm Centrify Corp. “Identity makes up the definition and the boundary for the organization.”
McNeely stopped by the set of theCUBE, SiliconANGLE’s mobile livestreaming studio, and spoke with co-hosts John Furrier (@furrier) and Dave Vellante (@dvellante) at CyberConnect 2017 in New York City. They discussed the weaknesses of current password models, a growing interest in just-in-time permission and the future role of machine learning for enterprise cloud security. (* Disclosure below.)
Password vaults create weaknesses
Flaws in password-protected computer security models have been well-documented. Centrify works with a number of customers who use password vaults or managers, repositories for access credentials that can be “checked out” for a day and used by system administrators to grant them control over every computer in an organization. Often, the passwords are placed in a clipboard file which can be easily accessed by a hacker.
“We been spending a lot more time trying to help customers eliminate the use of passwords, trying to move to stronger authentication,” McNeely said.
Security problems have been exacerbated by models where system administrators are automatically granted persistent access across network. Hack one, hack them all. To address this weakness, Centrify has been developing a just-in-time workflow access request model, where no administrator can enter systems databases until a set of approval protocols have been followed.
“That’s the one that’s a little bit newer that fewer of my customers are using, but most everybody wants to adopt,” McNeely said. “The malware can’t make the request and get the approval of the manager.”
The concern about this approach is that it can slow down enterprise workloads. This is where machine learning could have a major impact by analyzing system entry requests based on patterns of historical access. Behavior-based systems can evaluate more than 60 different factors, such as where the device owned by the requestor is physically located and if that matches an administrator’s profile.
“The whole idea is to try to get computers to make a decision based on behavior,” McNeely said. “It’s going to help us enormously in making more intelligent decisions.”
The post Cybersecurity #begins and #ends with the #trusted #identity appeared first on National Cyber Security Ventures.
View full post on National Cyber Security Ventures
To Purchase This Product/Services, Go To The Store Link Above Or Go To http://www.become007.com/store/ Last week, Michelle Carter was sentenced to 15 months in jail after being found guilty of involuntary manslaughter in the death of her 18-year-old boyfriend Conrad Roy. Carter, who was 17 at the time of Roy’s…
View full post on Become007.com
Dating scams involving “sextortion” in Australia have skyrocketed in the past two years, but remain largely underreported and unprosecuted. Now, a major new study hopes to better understand the crime — and pave the way for legislative change. Tracey* deleted all her social media accounts, moved out of her home of 17 years and lost most of her savings after a romantic relationship begun online turned exploitative. The 53-year-old widow was befriended by a man on Facebook in March this year, and an online courtship evolved over several months. Read More….
View full post on Dating Scams 101
The FBI partnered with their local chapter of Infragard to offer a summer camp for kids. The middle schoolers who participated got a pretty unique first hand look at how the FBI solves crimes. The kids started the day with an exercise, specifically a fake kidnapping. FBI Special Agent Todd Berryman describes the scenario, “We […]
The post FBI kids camp to teach cybersecurity ends with fake guns drawn, mock arrest appeared first on National Cyber Security.
View full post on National Cyber Security
Driven by fears that an aging population could jeopardize China’s economic ascent, the Communist Party leadership ended its decades-old “one child” policy on Thursday, announcing that all married couples would be allowed to have two children.
The decision was a dramatic step away from a core Communist Party position that Deng Xiaoping, the Chinese leader who imposed the policy in the late 1970s, once said was needed to ensure that “the fruits of economic growth are not devoured by population growth.”
For China’s leaders, the controls were a triumphant demonstration of the party’s capacity to reshape even the most intimate dimensions of citizens’ lives.
The post China Ends One-Child Policy, Allowing Families Two Children appeared first on Parent Security Online.
View full post on Parent Security Online
Agents of the state attorney general’s Child Predator Unit raided a Camp Hill home Friday morning, making an arrest in a child pornography investigation.
An official at the scene in the 2300 block of Chestnut Street said he could not immediately provide other information. A spokeswoman for the AG’s office said only that she could confirm an arrest was made on child porn charges.
Camp Hill officials were on the scene and a special investigations truck from the AG’s office idled on the curb.
The house on the quiet residential side street was posted with orange placards. An official said it was being condemned as unfit for human habitation.
View full post on Parent Security Online