If you conduct a search on the keywords Iran, cyber, and attack, you will find many articles summarizing Iranian attacks. Look at those from the Wall Street Journal and Microsoft, reporting of 100’s of attacks on enterprises. Victims also include municipalities, such as the infamous ransomware attack on Atlanta.
Read More ›In the digital world, it can be easy to lose sight of the emotional dimension of the operations we perform. This will only increase as AI becomes more dominant. Too many experts are expecting AI to address the risks that other cybersecurity tools have failed to fully vanquish. But as long as the human element remains, emotional intelligence will be an important part of an effective cybersecurity strategy.
Read More ›As trade tensions between the US and the People’s Republic of China (PRC) escalate, PRC-sponsored hacking and spying on US businesses is also on the rise. How worried should you be about state-sponsored hackers targeting your organization?
Read More ›Russian hacker collective known as Fxmsp claimed to have breached three major U.S.-based antivirus companies. MeriTalk sat down with Maitland Muse to better understand the ramifications this news on Federal agencies and everyday end-users:
Read More ›Like antibiotic-resistant strains of bacteria give nightmares to medical epidemiologists, modular malware systems are doing the same to cyber defenders. New variations of modular malware are appearing weekly, if not daily. They are designed to target Linux and Windows Servers. Xbash, AdvisorsBot, and Marap are a few examples of a modular malware that doubled in […]
Read More ›Panelists worthy of any CISO’s attention, discussed and prioritized the methods China is using to compromise enterprises via their supply chain, including the currently rare, covert placement of spy chips into computing hardware. China’s ‘2025’ strategy to steal and degrade western economic power affects any enterprise that generates high-margin value and/or is in the same […]
Read More ›2016 was an alarming year for tallying increases in data breaches and analyzing the sophistication of cybersecurity attacks and threats. It is clear that companies and individuals are playing games of catch up from a growing array of cyber adversaries. The following links are compiled from recent statistics pulled from a variety of articles and […]
Read More ›