What if your security strategy added zeros to your bottom line?
Focusing on response alone is costly. You lose data. You lose infrastructure. You lose human and capital resources that could be productive elsewhere. And you lose your reputation. When you catch threats before they execute, you contain the problem, and the rewards add up. Let Blackberry Cylance help you understand how you can reduce your total cost of security controls, bolster your organization’s security posture, and zero in on what really matters.
First, one of the consequences of the move to 5G appears to be greater dependence on satellites to carry Internet traffic. This will in all likelihood require that new generations of communications satellites be reprogrammable, and with such flexibility comes vulnerability: what can be reprogrammed can also be hacked.
And in a keynote, Roger Thornton, AT&T Cybersecurity's vice president of products and technology, asked how we wound up with three-thousand or so cybersecurity companies? Do we need that many? He noted that consolidation of cybersecurity companies is already underway. Of those three-thousand some firms, Thornton said, the revenue of the top five amounts to ten percent of the sector's total revenue.
By the CyberWire staff
The UK's National Cyber Security Centre has warned sixteen NATO allies of Russian activity directed against infrastructure and government networks, ZDNet reports. Today's disclosure came from Secretary of State for Foreign Affairs Hunt. France 24 adds that NATO Secretary General Stoltenberg warned Russia that NATO has a "full range" of responses to cyberattacks available.
The BBC says British chip giant ARM will join Intel and Qualcomm in stopping business with Huawei, and according to the Washington Post Vodafone and BT Group have decided to "suspend plans" to include Huawei phones in their 5G networks. The ARM decision is regarded as particularly damaging. Huawei denies posing a security threat and says it considers the blacklisting "politically motivated."
The Telegraph lists other Chinese companies thought likely to wind up in Huawei's boat: surveillance equipment vendors Hikvision and Dahua, facial recognition providers CloudWalk and SenseTime, drone maker DJI, and, of course, Huawei's smaller rival ZTE.
Equifax continues to suffer from its 2017 breach. Moody's downgraded the credit bureau's outlook from "stable" to "negative," citing long-term effects on Equifax's security and infrastructure costs. CNBC quotes Moody's as saying this is the first time a cyber incident has driven such a downgrade.
The Persistence of Chaos, an artwork by Guo O Dong that consists of a laptop running WannaCry and other malware, is up for auction, with bids starting north of $1 million. Don't worry: the installation is airgapped. (Although an objet less trouvé than bidouillé, Persistence of Chaos might go well with Duchamp's Fountain.)
Today's issue includes events affecting Argentina, Australia, Austria, Belgium, Brazil, Canada, Chile, China, Colombia, Costa Rica, Czech Republic, Denmark, European Union, Estonia, Finland, Germany, Greece, Bailiwick of Guernsey, Hungary, Iceland, Ireland, Israel, Italy, Japan, Bailiwick of Jersey, Republic of Korea, Latvia, Lithuania, Luxembourg, Isle of Man, Mexico, NATO/OTAN, Netherlands, New Zealand, Peru, Poland, Portugal, Romania, Russia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey, United Kingdom, United States.
Bring your own context.
5G is expected to make the Internet-of-things as pervasive and inescapable as, say, the power grid is today. Any easy ways of living securely in a 5G world?
"Looking at the future of 5G and big data and all of these concerns, there's unfortunately not a lot that the individual can do... The way I like to think of it is with personas, right? So if you have your public persona, then here's all the things that I don't care for everyone in the world to know. If you're mindful of that and just kind of keep that out there at all times, you're far better off. There's certainly a number of ways to create alternate personas that you only use at certain times - sort of an operational security perspective. But with 5G, short of becoming a prepper, having a bunch of water at home and a generator and things like that, there's really not much you can do to try to prevent being impacted by an infrastructure attack."
—Dave Venable of Masergy, on the CyberWire Daily Podcast, 05.21.19.
So we suppose we'll have to take that as a "no." Shopping list for the coming 5G world: water, propane, canned goods, batteries, hand-cranked radio, rowdy dog...
According to CyberEdge’s 2019 Cyberthreat Defense Report, 78% of enterprises were victimized by a successful cyberattack last year. Is your organization next? On May 22nd at 2:00 PM ET join LookingGlass’ SVP of Delivery & Support, James Carnall, and CyberEdge’s Co-founder & CEO, Steve Piper, as they review insights from CyberEdge’s sixth-annual research study. They’ll also provide answers to important questions, such as what are the weakest links in current security postures and What the hottest security technologies are in 2019.
And Hacking Humans is up. In this edition, "People aren't perfectly rational," a listener writes in with the results of his phishing exercise with his wife. Joe describes research from F-Secure on the most dangerous email attachment types. Dave shares the story of scammers impersonating local hospitals to scare a response from their victims. Our catch of the day involves a LinkedIn scam impersonating a fighter pilot. Joe also interviews Elissa Redmiles, an incoming assistant professor of computer science at Princeton University. She studies behavioral modeling to understand why people behave the way they do online.
National Cyber Summit Job Fair, June 5, Huntsville.(Huntsville, Alabama, United States, June 5, 2019) Cleared and non-cleared cybersecurity pros make your next career move at the free National Cyber Summit Job Fair, June 5 in Huntsville. Meet face-to-face with 22 leading cyber employers. Visit our site for more details.
Cyber Howard Conference(Columbia, Maryland, United States, June 19, 2019) Join us for our 10th annual cyber conference in Howard County. We will tackle the topic of Cyber Sensemaking which is a fluid and continuous approach for establishing better defenses and best practices as a cyber community.
Wicked6 Cyber Games(Las Vegas, Nevada, United States, August 6, 2019) Wicked6 is a fundraiser and cybersecurity exhibition in a thrilling esports arena in Las Vegas on August 8, 2019. It’s a week when cybersecurity leaders from around the world come to Las Vegas, and all are welcome to come by to experience this exciting and unique cyber competition as a player, sponsor, or avid fan. Wicked6 will raise funds for the Women’s Society of Cyberjutsu, a national 501(c)(3) nonprofit that promotes training, mentoring and more to advance women and girls in cybersecurity careers.
Cyber Warrior Women Summer Social: Sip and Paint(Columbia, Maryland, United States, August 21, 2019) Join the Cybersecurity Association of Maryland, Inc. (CAMI) for the annual Cyber Warrior Women Summer Social, an all-about-fun-and-networking event! We're adding an artistic element to this year's event with a wine glass painting exercise. No previous art experience required.
US officials say foreign election hacking is inevitable(Fifth Domain) Comments before a House subcommittee by representatives from the Departments of Justice and Homeland Security underscored the challenges for federal and state governments in trying to ward off interference from Russia and other countries in the 2020 election.
Online Privacy Is a Right, Not a Luxury(PCMAG) The tech industry is finally waking up to the fact that people care about their privacy. But current solutions all come at too high a cost in money or time to the end user, according to security expert Max Eddy.
Carahsoft to Resell Keeper Security Platform Through Government Contracts(ExecutiveBiz) Carahsoft has agreed to distribute Keeper Security' password management and encryption platform to public sector agencies via three government contracting vehicles and reseller partners. Agencies can procure the cybersecurity offering from Carahsoft through NASA's Solutions for Enterprise-Wi
Tenable Expands Cyber Exposure Ecosystem(AP NEWS) Tenable®, Inc., the Cyber Exposure company, today announced the expansion of its Cyber Exposure ecosystem with 19 new and enhanced technology integrations.
Microsoft Joins MANRS to Improve Routing Security | Internet Society(Internet Society) The Mutually Agreed Norms for Routing Security (MANRS) initiative, supported by the Internet Society, today announced that Microsoft has joined the program whose primary objective is to reduce the most common threats to the Internet’s routing system. Routing security is vital to the future and stability of the Internet. …
Killing Wannacry: How to Eradicate Ransom.Wannacry for Good | Symantec Connectlogo-symantec-dark-source(Symantec) Symantec helps consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. The Symantec Connect community allows customers and users of Symantec to network and learn more about creative and innovative ways to use Symantec products and technologies.
Security’s not that funny, but maybe it should be(Computerworld) Sometimes a single experience or just one data point can radically reshape an individual’s entire outlook — at least, that was the case for Michael Madon, the senior vice president and general manager of security awareness and threat intelligence products at Mimecast.
HAC Pumps Up NIST Research On Emerging Tech(Breaking Defense) House Appropriators add millions of dollars to the National Institute of Standards & Technology's work on AI, cybersecurity, quantum computing, 3D printing, and 5G telecommunications.
Reeducation Returns to China(Foreign Affairs) It is possible to see how Xinjiang’s reeducation drive could end up influencing the nation’s future social credit system: those who end up falling below a certain score could be required to undergo reeducation treatments to greater or lesser degrees.
Could an advisory board help intel innovation?(C4ISRNET) The latest Intelligence Authorization Act, which was approved by the Senate Select Committee on Intelligence on May 14, would establish an advisory board for the National Reconnaissance Office.
Gerelateerde websitesBlijf op de hoogteOver(FIOD) On 22 May the FIOD and the Public Prosecution Service took one of the largest online mixers for cryptocurrencies offline, named Bestmixer.io. This operation deals a severe blow to the concealment of criminal flows of money by mixing cryptocurrencies such as bitcoins. Six operational servers have been dismantled and seized in the Netherlands and Luxembourg. …
SEAL defense claims prosecution withheld information from judge about email spying(Military Times) The trial for Special Operations Chief Edward Gallagher, the Navy SEAL accused of murdering an injured teenage ISIS fighter in Iraq in 2017, has been delayed amid a whirlwind of allegations that the prosecution in the case was illegally spying on defense attorneys and a journalist while withholding information from the judge.
For a complete running list of events, please visit the Event Tracker on the CyberWire website.
Cybertech Midwest 2019(Indianapolis, Indiana, USA, April 24 - July 25, 2019) Cybertech is the cyber industry’s foremost B2B networking platform featuring cutting-edge content by top executives, government officials, and leading decision-makers from the world of cyber. Our Cybertech...
2019 Georgetown Cybersecurity Law Institute(Washington, DC, USA, May 22 - 23, 2019) It is more important than ever that in-house and outside counsel stay abreast of the most current developments and best practices in cybersecurity.Those lawyers who ignore cyber threats are risking millions...
SecureWorld Atlanta(Atlanta, Georgia, USA, May 29 - 30, 2019) Join your fellow InfoSec professionals for high-quality, affordable cybersecurity training and education. Earn 6-12 CPE credits through 30+ educational elements, learning from nationally recognized industry...
Louisville Cybersecurity Conference(Louisville, Kentucky, USA, May 30, 2019) Data Connectors brings together security professionals to discuss mitigating risk and improving their overall security posture. Eight industry speakers, an FBI/NSA/DHS keynote speaker, and a CISO Panel...
National Cyber Summit(Huntsville, Alabama, USA, June 4 - 6, 2019) National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising...
SPONSOR & SUPPORT
Grow your brand and reach new customers.
Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.
Be a part of the CyberWire story.
People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.