global

now browsing by tag

 
 

#cybersecurity | #infosec | LastPass releases its 3rd Annual Global Password Security report

Source: National Cyber Security – Produced By Gregory Evans

LastPass releases its 3rd Annual Global Password Security report

Graham Cluley Security News is sponsored this week by the folks at LastPass. Thanks to the great team there for their support!

LastPass has analyzed over 47,000 businesses to bring you insights into security behavior worldwide. The report helps you explore changes in password security practices worldwide, and see where businesses are still putting themselves at risk.

The takeaway is clear: Many businesses are making significant strides in some areas of password and access security – but there is still a lot of work to be done. Use of important security measures like multifactor authentication is up, but the continued reality of poor password hygiene still hampers many business’ ability to achieve high standards of security.

In the report, we not only highlight key trends by company size, sector, and location, we provide analysis and recommendations to help IT and business leaders take action where it’s needed most.

Download the free report now to see the current state of password security, access, and authentication around the world – and learn what you can do today to better secure your company.


If you’re interested in sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Source link

The post #cybersecurity | #infosec | LastPass releases its 3rd Annual Global Password Security report appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | WFP Global Hotspots 2020: Potential flashpoints to look out for in New Year – World

Source: National Cyber Security – Produced By Gregory Evans

World Food Programme forecasts global hunger hotspots as a new decade dawns

Rome – Escalating hunger needs in sub-Saharan Africa dominate a World Food Programme (WFP) analysis of global hunger hotspots in the first half of 2020 with millions of people requiring life-saving food assistance in Zimbabwe, South Sudan, the Democratic Republic of Congo and the Central Sahel region in the coming months. The sheer scale and complexity of the challenges in Africa and other regions will stretch the resources and capacity of WFP and other agencies to the limit. Ramping up the humanitarian response will again require the generous support of donor governments to fund the assistance required to save lives and support development.

“WFP is fighting big and complex humanitarian battles on several fronts at the start of 2020,” said David Beasley, Executive Director of WFP. “In some countries, we are seeing conflict and instability combine with climate extremes to force people from their homes, farms and places of work. In others, climate shocks are occurring alongside economic collapse and leaving millions on the brink of destitution and hunger.”

The WFP 2020 Global Hotspots Report highlights grave challenges in sub-Saharan Africa over the next six months with Zimbabwe, South Sudan, the Democratic Republic of Congo and the Central Sahel region standing out when it comes to the needs of hungry children, women and men. The WFP report notes that amidst an imploding economy, the situation in Zimbabwe is increasingly precarious as the country enters the peak of its “lean season” when food is at its most scarce and the number of hungry people has reached its highest point in a decade. WFP is planning assistance for more than 4 million people in Zimbabwe as concerns grow that the impact of a regional drought could drag yet more countries down in the first months of the year.

“Last year, WFP was called upon to bring urgent large-scale relief to Yemen, Mozambique after Cyclone Idai, Burkina Faso and many other crises to avert famine,” said Margot Van Der Velden, WFP Director of Emergencies, “But the world is an unforgiving place and as we turn the page into 2020 WFP is confronting new, monumental humanitarian challenges that we need to address with real urgency.”

A rapidly evolving crisis in Haiti is of deep concern at the turn of the year as escalating unrest paralyzes the economy, driving food prices out of reach of many people (+40% between October 2018 and October 2019). According to a recent IPC survey on food insecurity, this has left 3.7 million people – or one-third of the population – in need of assistance

In Asia, Afghanistan faces insecurity combined with drought, leaving more than 11 million people – over a third of the country’s population – severely food insecure.

In the Middle East, WFP can look back on its success in Yemen where it scaled up by 50% from providing food assistance to 8 million people a month at the beginning of 2018 to 12 million by the end of the year. As it looks forward into 2020, WFP remains alert to growing food needs in Iraq and Lebanon, where civil unrest and macro-economic crisis are leading to an increase in food insecurity.

WFP estimates it will require more than US $10 billion to fully fund all its operations in more than 80 countries around the world in 2020.

“Every year at WFP we plan ahead for the next 12 months and ask for support from the generous governments, private sector institutions and members of the public who help us reach our humanitarian and development goals,” said Beasley. “As an agency that depends entirely on voluntary donations, we have a responsibility to show WFP can continue to be the most efficient and effective global organization delivering the kind of food assistance that saves lives and changes lives across the world.”

Photos of Hunger Hotspot countries available here

The United Nations World Food Programme is the world’s largest humanitarian organization, saving lives in emergencies, building prosperity and supporting a sustainable future for people recovering from conflict, natural disasters and the impact of climate change.

Follow us on Twitter @wfp_media

For more information please contact (email address: firstname.lastname@wfp.org):

Frances Kennedy, WFP/ Rome, Tel. +39 06 6513 3725, Mob. +39 346 7600 806

Anne Poulsen, WFP/Copenhagen Mob. +45 40 50 3993

Bettina Luescher WFP/ Geneva Berlin, Mob. +49 160. 9926 1730

Steve Taravella, WFP/Washington, Tel. +1 202 653 1149, Mob. +1 202 770 5993

Source link
——————————————————————————————————

The post #deepweb | <p> WFP Global Hotspots 2020: Potential flashpoints to look out for in New Year – World <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | Stellar Indian American Engineers Among the Latest Group of IEEE Fellows | Global Indian

Source: National Cyber Security – Produced By Gregory Evans The Institute of Electrical and Electronics Engineers recently announced its 2020 IEEE Fellows, with numerous Indian American and South Asian-origin engineers making the cut. IEEE Fellowships are conferred by the IEEE Board of Directors upon a person with an outstanding record of accomplishments. The total number […] View full post on AmIHackerProof.com

#cybersecurity | #hackerspace | Bitglass SASE wins Global 2000 enterprise

Source: National Cyber Security – Produced By Gregory Evans This Global 2000 company had racks of the latest boxes from the leading next-gen firewall vendor for its corporate locations.  As the enterprise moved applications to the cloud, the firewall vendor recommended more boxes at the perimeter.  Plus the fancy firewall-as-a-service for mobile users on the […] View full post on AmIHackerProof.com

#deepweb | 4th Global Report on Adult Learning and Education: Leave No One Behind: Participation, Equity and Inclusion – World

Source: National Cyber Security – Produced By Gregory Evans

UNESCO report shows fewer than 5% of people in many countries benefit from adult learning opportunities

Paris, 04 December—In almost one-third of countries, fewer than five per cent of adults aged 15 and above participate in education and learning programmes, according to UNESCO’s fourth Global Report on Adult Learning and Education (GRALE 4). Adults with disabilities, older adults, refugees and migrants, minority groups and other disadvantaged segments of society are particularly under-represented in adult education programmes and find themselves deprived of crucial access to lifelong learning opportunities.

Published by the UNESCO Institute for Lifelong Learning, the report monitors the extent to which UNESCO Member States put their international commitments regarding adult learning and education into practice and reflects data submitted by 159 countries. It calls for a major change in the approach to adult learning and education (ALE) backed by adequate investment to ensure that everyone has the opportunity to access and benefit from adult learning and education and that its full contribution to the 2030 Agenda for Sustainable Development is realized.

“We urge governments and the international community to join our efforts and take action to ensure that no one – no matter who they are, where they live or what challenges they face – is left behind where the universal right to education is concerned,” says UNESCO Director-General Audrey Azoulay, endorsing the report’s recommendations. “By ensuring that donor countries respect their aid obligations to developing countries, we can make adult learning and education a key lever in empowering and enabling adults, as learners, workers, parents, and active citizens.”

The publication stresses the need to increase national investment in ALE, reduce participation costs, raise awareness of benefits, and improve data collection and monitoring, particularly for disadvantaged groups.

Progress in participation in adult learning and education is insufficient

Despite low participation overall, many more than half of responding countries (57% of 152) reported an increase in the overall participation rate in adult learning and education between 2015 and 2018. Low-income countries reported the largest increase in ALE participation (73%), trailed by lower middle income and upper middle income countries (61% and 62%).

Most increases in adult learning and education participation were in sub-Saharan Africa (72% of respondents), followed by the Arab region (67%), Latin America and the Caribbean (60%) and Asia and the Pacific (49%). North America and Western Europe reported fewest increases (38%) though starting from higher levels.

The data shows persistent and deep inequalities in participation and that key target groups such as adults with disabilities, older adults, minority groups as well as adults living in conflict-affected countries are not being reached.

Women’s participation must improve further

While the global report shows that women’s participation in ALE has increased in 59 per cent of the reporting countries since 2015, in some parts of the world, girls and women still do not have sufficient access to education, notably to vocational training, leaving them with few skills and poor chances of finding employment and contributing to the societies they live in, which also represents an economic loss for their countries.

Quality is improving but not fast enough

Quality ALE can also provide invaluable support to sustainable development and GRALE 4 shows that three-quarters of countries reported progress in the quality of education since 2015. Qualitative progress is observed in curricula, assessment, teaching methods and employment conditions of adult educators. However, progress in citizenship education, which is essential in promoting and protecting freedom, equality, democracy, human rights, tolerance and solidarity, remained negligible. No more than 3% of countries reported qualitative progress in this area.

Increase in funding for adult learning and education needed

GRALE 4 shows that over the last ten years, spending on adult learning and education has not reached sufficient levels, not only in low-income countries but also in lower middle income and high-income countries. Nearly 20% of Member States reported spending less than 0.5 per cent of their education budgets on ALE and a further 14% reported spending less than 1 per cent. This information demonstrates that many countries have failed to implement the intended increase in ALE financing proposed in GRALE 3 and that ALE remains underfunded. Moreover, under-investment hits socially disadvantaged adults the hardest. Lack of funding also hampers the implementation of new policies and efficient governance practices.

Source link
——————————————————————————————————

The post #deepweb | <p> 4th Global Report on Adult Learning and Education: Leave No One Behind: Participation, Equity and Inclusion – World <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#cyberfraud | #cybercriminals | Cyber Risk Update for Construction Companies | Stoel Rives – Global Privacy & Security Blog®

Source: National Cyber Security – Produced By Gregory Evans

Updated: May 25, 2018:

JD Supra is a legal publishing service that connects experts and their content with broader audiences of professionals, journalists and associations.

This Privacy Policy describes how JD Supra, LLC (“JD Supra” or “we,”https://www.jdsupra.com/”us,” or “our“) collects, uses and shares personal data collected from visitors to our website (located at www.jdsupra.com) (our “Website“) who view only publicly-available content as well as subscribers to our services (such as our email digests or author tools)(our “Services“). By using our Website and registering for one of our Services, you are agreeing to the terms of this Privacy Policy.

Please note that if you subscribe to one of our Services, you can make choices about how we collect, use and share your information through our Privacy Center under the “My Account” dashboard (available if you are logged into your JD Supra account).

Collection of Information

Registration Information. When you register with JD Supra for our Website and Services, either as an author or as a subscriber, you will be asked to provide identifying information to create your JD Supra account (“Registration Data“), such as your:

  • Email
  • First Name
  • Last Name
  • Company Name
  • Company Industry
  • Title
  • Country

Other Information: We also collect other information you may voluntarily provide. This may include content you provide for publication. We may also receive your communications with others through our Website and Services (such as contacting an author through our Website) or communications directly with us (such as through email, feedback or other forms or social media). If you are a subscribed user, we will also collect your user preferences, such as the types of articles you would like to read.

Information from third parties (such as, from your employer or LinkedIn): We may also receive information about you from third party sources. For example, your employer may provide your information to us, such as in connection with an article submitted by your employer for publication. If you choose to use LinkedIn to subscribe to our Website and Services, we also collect information related to your LinkedIn account and profile.

Your interactions with our Website and Services: As is true of most websites, we gather certain information automatically. This information includes IP addresses, browser type, Internet service provider (ISP), referring/exit pages, operating system, date/time stamp and clickstream data. We use this information to analyze trends, to administer the Website and our Services, to improve the content and performance of our Website and Services, and to track users’ movements around the site. We may also link this automatically-collected data to personal information, for example, to inform authors about who has read their articles. Some of this data is collected through information sent by your web browser. We also use cookies and other tracking technologies to collect this information. To learn more about cookies and other tracking technologies that JD Supra may use on our Website and Services please see our “Cookies Guide” page.

How do we use this information?

We use the information and data we collect principally in order to provide our Website and Services. More specifically, we may use your personal information to:

  • Operate our Website and Services and publish content;
  • Distribute content to you in accordance with your preferences as well as to provide other notifications to you (for example, updates about our policies and terms);
  • Measure readership and usage of the Website and Services;
  • Communicate with you regarding your questions and requests;
  • Authenticate users and to provide for the safety and security of our Website and Services;
  • Conduct research and similar activities to improve our Website and Services; and
  • Comply with our legal and regulatory responsibilities and to enforce our rights.

How is your information shared?

  • Content and other public information (such as an author profile) is shared on our Website and Services, including via email digests and social media feeds, and is accessible to the general public.
  • If you choose to use our Website and Services to communicate directly with a company or individual, such communication may be shared accordingly.
  • Readership information is provided to publishing law firms and authors of content to give them insight into their readership and to help them to improve their content.
  • Our Website may offer you the opportunity to share information through our Website, such as through Facebook’s “Like” or Twitter’s “Tweet” button. We offer this functionality to help generate interest in our Website and content and to permit you to recommend content to your contacts. You should be aware that sharing through such functionality may result in information being collected by the applicable social media network and possibly being made publicly available (for example, through a search engine). Any such information collection would be subject to such third party social media network’s privacy policy.
  • Your information may also be shared to parties who support our business, such as professional advisors as well as web-hosting providers, analytics providers and other information technology providers.
  • Any court, governmental authority, law enforcement agency or other third party where we believe disclosure is necessary to comply with a legal or regulatory obligation, or otherwise to protect our rights, the rights of any third party or individuals’ personal safety, or to detect, prevent, or otherwise address fraud, security or safety issues.
  • To our affiliated entities and in connection with the sale, assignment or other transfer of our company or our business.

How We Protect Your Information

JD Supra takes reasonable and appropriate precautions to insure that user information is protected from loss, misuse and unauthorized access, disclosure, alteration and destruction. We restrict access to user information to those individuals who reasonably need access to perform their job functions, such as our third party email service, customer service personnel and technical staff. You should keep in mind that no Internet transmission is ever 100% secure or error-free. Where you use log-in credentials (usernames, passwords) on our Website, please remember that it is your responsibility to safeguard them. If you believe that your log-in credentials have been compromised, please contact us at privacy@jdsupra.com.

Children’s Information


Our Website and Services are not directed at children under the age of 16 and we do not knowingly collect personal information from children under the age of 16 through our Website and/or Services. If you have reason to believe that a child under the age of 16 has provided personal information to us, please contact us, and we will endeavor to delete that information from our databases.

Links to Other Websites

Our Website and Services may contain links to other websites. The operators of such other websites may collect information about you, including through cookies or other technologies. If you are using our Website or Services and click a link to another site, you will leave our Website and this Policy will not apply to your use of and activity on those other sites. We encourage you to read the legal notices posted on those sites, including their privacy policies. We are not responsible for the data collection and use practices of such other sites. This Policy applies solely to the information collected in connection with your use of our Website and Services and does not apply to any practices conducted offline or in connection with any other websites.

Information for EU and Swiss Residents

JD Supra’s principal place of business is in the United States. By subscribing to our website, you expressly consent to your information being processed in the United States.

  • Our Legal Basis for Processing: Generally, we rely on our legitimate interests in order to process your personal information. For example, we rely on this legal ground if we use your personal information to manage your Registration Data and administer our relationship with you; to deliver our Website and Services; understand and improve our Website and Services; report reader analytics to our authors; to personalize your experience on our Website and Services; and where necessary to protect or defend our or another’s rights or property, or to detect, prevent, or otherwise address fraud, security, safety or privacy issues. Please see Article 6(1)(f) of the E.U. General Data Protection Regulation (“GDPR”) In addition, there may be other situations where other grounds for processing may exist, such as where processing is a result of legal requirements (GDPR Article 6(1)(c)) or for reasons of public interest (GDPR Article 6(1)(e)). Please see the “Your Rights” section of this Privacy Policy immediately below for more information about how you may request that we limit or refrain from processing your personal information.

  • Your Rights
    • Right of Access/Portability: You can ask to review details about the information we hold about you and how that information has been used and disclosed. Note that we may request to verify your identification before fulfilling your request. You can also request that your personal information is provided to you in a commonly used electronic format so that you can share it with other organizations.
    • Right to Correct Information: You may ask that we make corrections to any information we hold, if you believe such correction to be necessary.
    • Right to Restrict Our Processing or Erasure of Information: You also have the right in certain circumstances to ask us to restrict processing of your personal information or to erase your personal information. Where you have consented to our use of your personal information, you can withdraw your consent at any time.

You can make a request to exercise any of these rights by emailing us at privacy@jdsupra.com or by writing to us at:


Privacy Officer

JD Supra, LLC

10 Liberty Ship Way, Suite 300

Sausalito, California 94965

You can also manage your profile and subscriptions through our Privacy Center under the “My Account” dashboard.

We will make all practical efforts to respect your wishes. There may be times, however, where we are not able to fulfill your request, for example, if applicable law prohibits our compliance. Please note that JD Supra does not use “automatic decision making” or “profiling” as those terms are defined in the GDPR.

  • Timeframe for retaining your personal information: We will retain your personal information in a form that identifies you only for as long as it serves the purpose(s) for which it was initially collected as stated in this Privacy Policy, or subsequently authorized. We may continue processing your personal information for longer periods, but only for the time and to the extent such processing reasonably serves the purposes of archiving in the public interest, journalism, literature and art, scientific or historical research and statistical analysis, and subject to the protection of this Privacy Policy. For example, if you are an author, your personal information may continue to be published in connection with your article indefinitely. When we have no ongoing legitimate business need to process your personal information, we will either delete or anonymize it, or, if this is not possible (for example, because your personal information has been stored in backup archives), then we will securely store your personal information and isolate it from any further processing until deletion is possible.
  • Onward Transfer to Third Parties: As noted in the “How We Share Your Data” Section above, JD Supra may share your information with third parties. When JD Supra discloses your personal information to third parties, we have ensured that such third parties have either certified under the EU-U.S. or Swiss Privacy Shield Framework and will process all personal data received from EU member states/Switzerland in reliance on the applicable Privacy Shield Framework or that they have been subjected to strict contractual provisions in their contract with us to guarantee an adequate level of data protection for your data.

California Privacy Rights

Pursuant to Section 1798.83 of the California Civil Code, our customers who are California residents have the right to request certain information regarding our disclosure of personal information to third parties for their direct marketing purposes.

You can make a request for this information by emailing us at privacy@jdsupra.com or by writing to us at:


Privacy Officer

JD Supra, LLC

10 Liberty Ship Way, Suite 300

Sausalito, California 94965

Some browsers have incorporated a Do Not Track (DNT) feature. These features, when turned on, send a signal that you prefer that the website you are visiting not collect and use data regarding your online searching and browsing activities. As there is not yet a common understanding on how to interpret the DNT signal, we currently do not respond to DNT signals on our site.

Access/Correct/Update/Delete Personal Information

For non-EU/Swiss residents, if you would like to know what personal information we have about you, you can send an e-mail to privacy@jdsupra.com. We will be in contact with you (by mail or otherwise) to verify your identity and provide you the information you request. We will respond within 30 days to your request for access to your personal information. In some cases, we may not be able to remove your personal information, in which case we will let you know if we are unable to do so and why. If you would like to correct or update your personal information, you can manage your profile and subscriptions through our Privacy Center under the “My Account” dashboard. If you would like to delete your account or remove your information from our Website and Services, send an e-mail to privacy@jdsupra.com.

Changes in Our Privacy Policy

We reserve the right to change this Privacy Policy at any time. Please refer to the date at the top of this page to determine when this Policy was last revised. Any changes to our Privacy Policy will become effective upon posting of the revised policy on the Website. By continuing to use our Website and Services following such changes, you will be deemed to have agreed to such changes.

Contacting JD Supra

If you have any questions about this Privacy Policy, the practices of this site, your dealings with our Website or Services, or if you would like to change any of the information you have provided to us, please contact us at: privacy@jdsupra.com.

As with many websites, JD Supra’s website (located at www.jdsupra.com) (our “Website“) and our services (such as our email article digests)(our “Services“) use a standard technology called a “cookie” and other similar technologies (such as, pixels and web beacons), which are small data files that are transferred to your computer when you use our Website and Services. These technologies automatically identify your browser whenever you interact with our Website and Services.

How We Use Cookies and Other Tracking Technologies

We use cookies and other tracking technologies to:

  1. Improve the user experience on our Website and Services;
  2. Store the authorization token that users receive when they login to the private areas of our Website. This token is specific to a user’s login session and requires a valid username and password to obtain. It is required to access the user’s profile information, subscriptions, and analytics;
  3. Track anonymous site usage; and
  4. Permit connectivity with social media networks to permit content sharing.

There are different types of cookies and other technologies used our Website, notably:

  • Session cookies” – These cookies only last as long as your online session, and disappear from your computer or device when you close your browser (like Internet Explorer, Google Chrome or Safari).
  • Persistent cookies” – These cookies stay on your computer or device after your browser has been closed and last for a time specified in the cookie. We use persistent cookies when we need to know who you are for more than one browsing session. For example, we use them to remember your preferences for the next time you visit.
  • Web Beacons/Pixels” – Some of our web pages and emails may also contain small electronic images known as web beacons, clear GIFs or single-pixel GIFs. These images are placed on a web page or email and typically work in conjunction with cookies to collect data. We use these images to identify our users and user behavior, such as counting the number of users who have visited a web page or acted upon one of our email digests.

JD Supra Cookies. We place our own cookies on your computer to track certain information about you while you are using our Website and Services. For example, we place a session cookie on your computer each time you visit our Website. We use these cookies to allow you to log-in to your subscriber account. In addition, through these cookies we are able to collect information about how you use the Website, including what browser you may be using, your IP address, and the URL address you came from upon visiting our Website and the URL you next visit (even if those URLs are not on our Website). We also utilize email web beacons to monitor whether our emails are being delivered and read. We also use these tools to help deliver reader analytics to our authors to give them insight into their readership and help them to improve their content, so that it is most useful for our users.

Analytics/Performance Cookies. JD Supra also uses the following analytic tools to help us analyze the performance of our Website and Services as well as how visitors use our Website and Services:

  • HubSpot – For more information about HubSpot cookies, please visit legal.hubspot.com/privacy-policy.
  • New Relic – For more information on New Relic cookies, please visit www.newrelic.com/privacy.
  • Google Analytics – For more information on Google Analytics cookies, visit www.google.com/policies. To opt-out of being tracked by Google Analytics across all websites visit http://tools.google.com/dlpage/gaoptout. This will allow you to download and install a Google Analytics cookie-free web browser.

Facebook, Twitter and other Social Network Cookies. Our content pages allow you to share content appearing on our Website and Services to your social media accounts through the “Like,”https://www.jdsupra.com/”Tweet,” or similar buttons displayed on such pages. To accomplish this Service, we embed code that such third party social networks provide and that we do not control. These buttons know that you are logged in to your social network account and therefore such social networks could also know that you are viewing the JD Supra Website.

Controlling and Deleting Cookies

If you would like to change how a browser uses cookies, including blocking or deleting cookies from the JD Supra Website and Services you can do so by changing the settings in your web browser. To control cookies, most browsers allow you to either accept or reject all cookies, only accept certain types of cookies, or prompt you every time a site wishes to save a cookie. It’s also easy to delete cookies that are already saved on your device by a browser.

The processes for controlling and deleting cookies vary depending on which browser you use. To find out how to do so with a particular browser, you can use your browser’s “Help” function or alternatively, you can visit http://www.aboutcookies.org which explains, step-by-step, how to control and delete cookies in most browsers.

Updates to This Policy

We may update this cookie policy and our Privacy Policy from time-to-time, particularly as technology changes. You can always check this page for the latest version. We may also notify you of changes to our privacy policy by email.

Contacting JD Supra

If you have any questions about how we use cookies and other tracking technologies, please contact us at: privacy@jdsupra.com.

Source link

The post #cyberfraud | #cybercriminals | Cyber Risk Update for Construction Companies | Stoel Rives – Global Privacy & Security Blog® appeared first on National Cyber Security.

View full post on National Cyber Security

Top #global #cybersecurity #challenges and #how to #overcome #them

Imagine the havoc wreaked on your company’s servers if they were infected by a distributed denial of service (DDoS) bot that is bundled with a ransomware payload, or the damage to your brand if a phishing attack targeting your users and customers resulted in the theft of personal information.

Whatever the kind of cyberattack, there can be serious consequences for the company. It could be forced to pay big money to rescue its systems from the clutches of cybercriminals, lose the trust and confidence of customers and users, and even be liable to pay fines and penalties for failing to comply with data privacy laws such as the EU’s Global Data Protection Regulation (GDPR).

As the size and type of cyberattacks continue to exand, many organizations struggle to focus their efforts on what matters most to their unique business. Here are some of today’s top global cybersecurity challenges and how companies can overcome them to strengthen their cyber defense:

Managing both content security and performance

Customer data is one of your company’s most important assets and is a significant investment for your business. When there’s a breach, you’ll lose customer trust because they’ll start to worry about other vulnerabilities in your network.

To protect against such an attack, companies must ensure their security solutions and software are always up to date. However, with so many types of new attacks cropping up every day, it’s best to use a comprehensive, cloud-based suite vs. a one-off solution. Doing so will help protect your business against new and emerging threats and allow you to employ preventive mitigation measures without adding latency to the delivery experience.

Safeguarding against DDoS attacks

A DDoS attack is one where a network of zombie computers sabotage a specific website or server by fictitiously boosting the volume of traffic causing it to shut down. Such attacks cause businesses to lose millions in revenues.

Another reason for DDoS to be a growing concern is the frequency and sophistication of attacks along with their duration and size, which has increased over the past few years.

To protect yourself against the financial and reputational damages caused by such an attack, you could use a product that can proactively intercept and mitigate a DDoS attack.

This provides much faster scrubbing performance since traffic isn’t moved off your Content Delivery Network (CDN), the network of proxy servers and data centers that distributes your data, for cleaning.

Limelight Network’s solution is effective because when it detects an attack, it passes the traffic to one of several globally distributed scrubbing centers to filter it before passing it back to your origin.

Protecting web applications

As a business, the idea behind launching a web application is usually to improve the customer experience. However, unless you protect your web applications appropriately, they’ll just expose you and your customer to unwarranted cyberthreats.

According to Limelight Networks, retail and financial sectors in Southeast Asia suffered the most from web app attacks. Over the past year alone, there has been a significant increase in attack incidents, with websites containing consumer data being the target of 60 percent of attacks.

To combat such threats effectively, business leaders are now turning to cloud-based security solutions instead of on-premise equipment.

Using a Web Application Firewall (WAF) to secure your web-apps as it inserts its nodes between origin servers and the CDN does the heavy work of content caching, web acceleration, and delivery of static content.

Web app attacks are dynamic, so if your WAF only accepts traffic from your CDN, it can minimize the performance impact of WAF protection and lock down IP traffic.

When a new vulnerability is identified, a new security rule should be created and pushed to all WAF nodes. Doing so makes the solution so secure that it can even close “zero-day” attacks prior to app vendor patches being deployed.

You should also make sure your chosen security solution offers protection against malicious bots. They’re the ones that crawl the internet looking for vulnerabilities for cyberattacks.

Staying ahead of the curve

If you’re a business that aims to empower customers through your digital presence, you’ll need to implement (and update) cybersecurity measures at your organization immediately.

Failing to do so puts a lot at risk on your business – including your reputation and the future prospects of your company.

Implementing a cybersecurity solution created and backed by a company such as Limelight Networks, for example, helps you secure your business on all fronts.

The company’s DDoS Attack Interceptor combines a global CDN with in-network detection and attack mitigation to facilitate situation-aware detection and mitigation via on network scrubbing centers.

Its CDN protection offers several features such as geo-fencing, IP whitelisting and blacklisting, which help you fend off even the most seasoned cybercriminals. The same is also true for its DDoS protection and WAF solution, both of which give you the best-in-class cyber protection.

The company’s scalable cloud-based architecture also allows you to reduce the total cost of protection by leveraging its massive global private infrastructure.

Limelight Networks also boasts world-class features such as a dedicated global network, proactive, intelligent threat detection using behavior-based analysis, and cloud-based scrubbing of traffic – which reassures even the most concerned consumer. Act now, because hackers won’t spare your systems while you’re still wondering what to do next.

advertisement:

The post Top #global #cybersecurity #challenges and #how to #overcome #them appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

2nd Global Fintech & Blockchain China Summit 2018

Source: National Cyber Security News

General Cybersecurity Conference

 April 12, 2018 | Shanghai, China

Cybersecurity Conference Description

2nd Global Fintech&Blockchain China Summit 2018 will be held in Shanghai on April 12th, which is consisting of Main Conference, Parallel Session and a Conjuncted Mini Exhibition Show, more than 800 delegates from government, associations, research institutes, traditional financial insitution as well as fintech and internet finance companies, blockchain technology and industry applicatioin companies, cyptocurrency and digital asset related companiese.

The blockchain summit will discuss the real application cases and future prospect of the blockchain in areas of finance, global payment system, healthcare, energy trading, digital identity authentication, electronic record authentication, IoT, supply chain management and government governance.,etc, and address the opportunities and challenges ahead. We aim to create a global network of entrepreneurs and developers in the fast-evolving blockchain economy, to explore the new business models and unrecognized opportunities in the blockchain world, We are fully convinced that this summit will empower the creation of the new technology-driven financial eco-system and reconfiguration of the future by the blockchain technology.

Read More….

advertisement:

View full post on National Cyber Security Ventures

‘Cyber is the New #Black’: #Cyber Expert Points to #Diplomacy to #Solve Global #Cybersecurity Issues

Source: National Cyber Security – Produced By Gregory Evans

With growing threats not only in the physical world but also in today’s nebular cyber world, Christopher Painter ’80 argued that “cyber is the new black,” meaning that “everyone cares about cyber” now.

Painter, who has been at the forefront of cyber issues for the last 25 years, addressed growing security concerns and the role of modern cyber-diplomacy at the 2017 Bartels World Affairs Fellowship Lecture this Wednesday.

Painter, the “weary warrior” of cyber warfare for his entire career, started his career as a prosecutor dealing with cyber cases and served as the U.S. State Department’s first coordinator for cyber issues from 2011 until July this year.

While studying at Cornell in 1979, Painter used punched cards for computer programming and played hundreds of sessions of BakéGyamon, an anime computer game, for his work study. Back then, Painter reflected, “the internet … existed in very basic form. The world wide web certainly didn’t exist.”

But technology has come far since; today, “we are all dependant [on the internet] for financial transactions, social transactions and to communicate really for everything,” Painter said.

However, though this rapid technological innovation has largely “been a tremendous force for good,” it does not come without its dangers.

“[The internet] has been the target of criminals, malicious state actors, terrorists and others,” Painter said.

Therefore, it is essential to find the balance, so that we are “not trading security for openness … but having all these things together,” Painter said.

“Back then, people looked at computer hackers as Robin Hood’s,” Painter said, because the common citizen’s information was not stolen, nor were they personally threatened.

This is no longer the case for the common citizen today.

In 2000, Painter was involved in a case that seemed to be a sophisticated, dangerous attack because it was on a global scale, but in reality, it was a fourteen-year-old Canadian boy, called the “MafiaBoy,” hacking computers.

His acts, Painter said, “had really a disproportionate effect and demonstrates the asymmetric nature of the technical threat.”

On a more serious note, Painter discussed the time North Korea hacked into Sony to pull back the distribution of an image, in which the country was “not only hacking into a system but was meant to curtail freedom of expression rights,” he said.

Taking this a step further, Painter highlighted a major concern regarding cybersecurity: “the fear of a debilitating attack against our infrastructure,” he said, pointing to possible examples of taking down the water system and the power system.

Painter said plainly, “It would have long-term, terrible consequences” as “not just a cyber but as a physical event.”

Therefore, “we have to be cognisant of these threats going forward,” he said.

These threats transcend individual hackers to entire nations, with different states having different visions for the future of technology.

Whereas much of the Western world is open about sharing information, Russia and China are among the countries that “want absolute sovereignty in cyberspace,” Painter said.

“The internet is not run by states — not run by government,” Painter said.

Although governments have influence over the internet to some extent, the private sector is involved, too, as Painter explained, so it is an international issue that different groups of people have to confront together.

Painter believes international law should apply to cyberspace as it does to the physical world. There are a set of norms many countries agree to, such as the idea that a nation should not attack infrastructures meant for the public good.

“You have to get countries around the world to embrace this to really make these norms stick,” he said.

So, how do we deal with the issue of cybersecurity?

Painter said, “It all comes down to the role of diplomacy — in all of this, the role of building alliances and shaping the environment and showing international cooperation is really paramount.”

The post ‘Cyber is the New #Black’: #Cyber Expert Points to #Diplomacy to #Solve Global #Cybersecurity Issues appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hackers #Attack Global #Banks with Just Found ‘Silence’ #Banking #Trojan

Source: National Cyber Security – Produced By Gregory Evans

One fresh banker Trojan has been detected and found employing techniques resembling ones that the Carbanak employed. The Trojan has been targeting financial institutions mostly in Russia.

According to security researchers from Kaspersky Lab, the new Trojan called “Silence” is used for acquiring continuous access of certain online banking network even as it makes video recordings of computer operations by bank employees, identifies the software they use and the operational activities of the bank. Once equipped with all this knowledge, the attackers controlling the malware apply that knowledge for grabbing cash out of the banks’ customer accounts. Scmagazine.com posted this, November 1, 2017.

By monitoring victims’ activities in the bank, the attackers get all the necessary details from them for sniffing the bank’s networks while escape unnoticed with stolen money. The victims get an e-mail containing one malicious attachment masquerading as ‘Windows help.’ The attachment contains a CHM file with a JavaScript embedded that by default downloads one Visual Basic programmed script and runs it that thereafter pulls down the Trojan installer via its command-and-control (C&C) server.

The researchers state that the controllers of ‘Silence’ possibly are a Russian-speaking group that has targeted no less than ten financial institutions with some inside Malaysia and Armenia although the majority is inside Russia. This is unlike Russian cyber-criminals who usually spare attacking domestic targets.

Like Carbanak, first victims of Silence are duped with spoofed electronic mails that enable the hackers to gain entry inside the network. The hackers then hang around for as long as it needs them to get all the information for striking attack and stealing huge amounts of funds.

The spoofed e-mails are highly personalized to craft them as spear-phishing e-mails. Kaspersky researchers point out that the hackers had previously attacked to infect banking infrastructure so they could dispatch the malicious messages via the ids belonging to genuine bank employees thus making the e-mails appear inconspicuous while trapping the victims.

The Carbanak gang too was the discovery of Kaspersky Lab back during 2015. According to a particular report then, the infamous hackers managed filching a maximum of $1 billion from over a hundred banks globally.

The post Hackers #Attack Global #Banks with Just Found ‘Silence’ #Banking #Trojan appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures