Lack

now browsing by tag

 
 

Americans Fed Up With Lack of Data Privacy

Source: National Cyber Security – Produced By Gregory Evans Eight out of every 10 US adults are worried over their inability to control how data about them is used, a new Pew Research survey shows. The majority of American citizens believe that they are pervasively monitored and that their data is regularly collected and used […] View full post on AmIHackerProof.com

77 Per cent #firms lack #proper #cyber security measures #globally

Nearly 77 per cent companies lack proper cyber security measures and almost half of them have either informal/ad hoc or completely non-existent response plans in case of a data breach, a global study said on Wednesday.

Despite the lack of formal planning, 72 per cent still feel more cyber resilient today than they were last year, said the study conducted by leading IT security research organisation Ponemon Institute and sponsored by IBM Resilient, an IBM company.

“In fact, 60 percent of respondents consider a lack of investment in Artificial Intelligence (AI) and Machine Learning (ML) as the biggest barrier to cyber resilience.

“A response plan that orchestrates human intelligence with machine intelligence is the only way security teams are going to get ahead of the threat and improve overall cyber resilience,” said Ted Julian, Vice President of Product Management and Co-Founder, IBM Resilient.

Nearly 57 per cent of the respondents said the time to resolve an incident has increased while 65 per cent reported the severity of the attacks has increased.

“These areas represent some of the key factors impacting overall cyber resiliency. These problems are further compounded by just 31 per cent of those surveyed having an adequate cyber resilience budget in place and difficulty retaining and hiring IT Security professionals (77 per cent), the report noted.

Read More….

advertisement:

The post 77 Per cent #firms lack #proper #cyber security measures #globally appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Stolen #identities and a #lack of #verification render #public comment #procedures #meaningless

Source: National Cyber Security News

Before implementing policy and regulatory changes, federal agencies are legally required to permit the public to comment directly to the agency. At the end of the comment period, it is customary for the agency review the comments received and, occasionally, include comments received concerning the policy change or regulation.

Prior to the Federal Communication Commission’s decision to repeal the 2015 net neutrality rules, the FCC received over 22 million comments. If that sounds like a lot, it is. So many, in fact, that it prompted a closer look by the agency. As a result of its investigation, it determined that millions of these comments were fake. According to multiple researchers, more than one million of the 22 million cumulative comments were bots that used natural language generation to artificially amplify the call to repeal net neutrality protections. On June 19, 2017, nearly 500,000 comments were submitted in a mere second and nearly all of them were identical. In fact, about 7,000 comments were submitted under the name, “The Internet” and over 400,000 of them came from Russian email addresses.

The FCC is not alone, as other agencies have received fake comments from living as well as dead Americans including the SEC, the Consumer Financial Protection Bureau, the Federal Energy Regulatory Commission and the Department of Labor (DOL).

Read More….

advertisement:

View full post on National Cyber Security Ventures

Cisco: Most #IoT projects are #failing due to lack of #experience and #security

Source: National Cyber Security – Produced By Gregory Evans

Three quarters of all Internet of Things (IoT) projects are “failing”, according to Cisco’s Australian CTO Kevin Bloch, primarily because they have been designed to solve individual problems, and have become siloed and unsupported as a result.

“The inaugural phase of IoT is characterised by numerous point solutions from a multitude of new — often startup — vendors. Typically, these solutions have been designed to solve a particular societal problem such as lighting or parking. In each case, a complete IT stack needs to be built in support of the solution,” Bloch explained.

“Eventually, customers find themselves with multiple siloes from multiple vendors that don’t interoperate, are not cybersecure, use different protocols, and generate more complexity at greater cost.”

According to Bloch, this is why Cisco is constructing an “IoT Phase 2” foundation, which consists of a platform that is able to cope with multiple different sensors, vendors, applications, and data interchanges.

The CTO added that IoT projects are also failing due to a lack of cybersecurity, qualified skills by those running them, project definition, governance, and support.

Released alongside nine other axioms on the IoT landscape, Bloch said Cisco hopes to aid other companies in launching successful connected solutions by discussing both pitfalls and successes.

The lack of cybersecurity made up a second of his axioms, with Bloch saying that if something is not secured, it should not be connected.

“Cybersecurity crime is already at an all-time high and negatively impacting global economies by upwards of 1 percent of GDP,” he said.

“We are becoming more mobile, we are using more cloud services, and we are expanding IoT deployment to tens of billions of connected things, thereby expanding exploitation and attack opportunities. Our situation will inevitably get worse if we don’t take the right precautions.

“If you don’t secure it, don’t connect it.”

Again, Bloch said that most of the new IoT solutions being brought to market are being developed by companies or startups without any experience — including experience in security.

As a result, he said Cisco is continuing to invest billions of dollars into cybersecurity solutions for IoT, mobility, and cloud. One such product was Cisco’s IoT Threat Defense solutionlaunched in June in an effort to mitigate and solve common security issues threatening the deployment and operation of connected devices, with the networking giant at the time saying many vendors and companies strip security mechanisms out of devices in order to keep them at low cost.

Cisco IoT CTO Shaun Cooley in June explained that as many devices also don’t have the power to protect themselves, network-side security must be emphasised, along with improving processors, enforcing the better labelling of devices, and requiring a notification and approval process prior to allowing connectivity.

The IoT Threat Defense suite is also enabled by Cisco’s network intuitive, which combines the technologies Cisco has been working towards for the past few years: Software-defined networking, software-defined access, network function virtualisation, APIs, and intelligent WAN capabilities.

A third axiom saw Bloch argue that IoT is about collecting data and about the data itself — not about connecting things, with Cisco predicting that connections will cost nothing within a decade.

Under this axiom, Bloch said there are two main components needed to be able to “measure” the physical world and enable automation: Sensing via a camera, sensor, or processor; and connectivity, or the transferring of data measurements to a computer.

“Sensing and connectivity provide data that enable a product to externalise its capabilities and provide a range of new opportunities and services,” he explained.

Another of Bloch’s IoT axioms argued that the key is having the right data, knowing what to ask of the data, and knowing how to find the answers — with the CTO correlating this to another assumption: That by 2025, 40 percent of all data will never make it to the cloud.

“While amassing data may seem important, the critical question to ask is ‘what do you need the data for?’” he said.

“Most organisations already have more data than they can manage, yet most often don’t have the right data. If they did, would they know what to ask of the data? If they are able to formulate the problem, how would they go about finding the answers needed within the data?”

The key for organisations is finding the answers to those three questions by utilising a combination of compute, artificial intelligence, and machine learning, he argued.

Cisco has been focused on providing IoT solutions globally, in June announcing its Kinetic IoT operations platform with a focus on managing connections, “fog” computing, and the delivery of data, which “streamlines the capability of companies bringing their IoT initiatives to market”.

“It’s really a platform for getting data off of your devices,” Cisco SVP and GM of IoT and Applications Rowan Trollope said at the time, adding that it will complement Cisco’s Jasper IoT platform.

“We’re extending from the edge all the way onto the device to provide an amazing platform to get way more data.”

According to Trollope, trillions of terabytes of data is “locked up” on unconnected devices across the world, which Cisco Kinetic could help extract. It will also speed up the time between proof of concept and implementation for customers.

The post Cisco: Most #IoT projects are #failing due to lack of #experience and #security appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Many merchant systems still lack basic security

download-59

Source: National Cyber Security – Produced By Gregory Evans

Many merchant systems still lack basic security

What could a Point of Sale (POS) security breach cost your business? Factoring in the cost of an investigation, legal fees, potential fines and lawsuits, damage to a reputation, and a likely decrease in customer loyalty, your business could be

The post Many merchant systems still lack basic security appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

IoT security suffers from a lack of awareness

iot_5

Source: National Cyber Security – Produced By Gregory Evans

IoT security suffers from a lack of awareness

As consumers we have become obsessed with connected devices. We like the idea of smart homes, smart cars, smart TVs, smart refrigerators or any machine that can be automated with sensors and an IP address. Yet fewer tasks in IT

The post IoT security suffers from a lack of awareness appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

40 percent of Polish companies lack any cyber-attack plan

hack_4_78eda145ebd42ecc1bb040ac0d756ec0-nbcnews-ux-320-320

Source: National Cyber Security – Produced By Gregory Evans

40 percent of Polish companies lack any cyber-attack plan

Up to 40 percent of enterprises in Poland do not have an emergency plan for cyber attacks, according to research by Intel in the Central and East-European countries Poland, the Czech Republic, Romania and Hungary, carried out among 250 IT

The post 40 percent of Polish companies lack any cyber-attack plan appeared first on National Cyber Security.

View full post on National Cyber Security

Charter schools in northern Arizona lack diversity – Education Week

View full post on Education Week: Bullying







#pso #htcs #b4inc

Read More

The post Charter schools in northern Arizona lack diversity – Education Week appeared first on Parent Security Online.

View full post on Parent Security Online

Single churchwomen ‘cry inside’ for lack of men

SINGLE Christian women may have to choose between marrying a partner who does not share their beliefs and staying single, a new survey suggests. It found that churches contained large numbers of middle-class single women, but few single men. The research concluded that Christian women had to face up to the possibility that they would go through life without finding a partner who shared their Christian beliefs. Read More….

The post Single churchwomen ‘cry inside’ for lack of men appeared first on Dating Scams 101.

View full post on Dating Scams 101

ACLU Cites Lack of Public Input on Surveillance TechnologyNational Cyber Security

nationalcybersecurity.com – Ever since 9/11, local law enforcement agencies have relied on surveillance technology — like video cameras and license plate readers — in order to protect public safety. In a report out today, the…

View full post on Hi-Tech Crime Solutions Weekly