We'd like to hear from you.
As a valued subscriber, we would like to better understand your needs and challenges. Complete our 15 minute survey for a chance to win a $100 gift card and to allow us to learn how we can better serve you.
Identifying endless threats and new vulnerabilities exposing your organization to cyber attacks is a never-ending task. The Cyber Daily curates the most important trending technical indicators from across the internet and delivers them right to your inbox – every day. Stay informed about suspicious IP addresses, new exploits and vulnerabilities, relevant cybersecurity news, threat actors, and more. Subscribe to Cyber Daily today.
As a valued subscriber, we would like to better understand your needs and challenges. Complete our 15 minute survey for a chance to win a $100 gift card and to allow us to learn how we can better serve you.
The US Intelligence Community late yesterday released the unclassified version of its report on foreign interference in the 2020 Federal elections. The investigation found no evidence of foreign attempts to manipulate vote counts or other “technical aspects” of the election. It did find evidence of an extensive Russian influence campaign aimed at denigrating then-candidate Biden to the advantage of then-President Trump, with a strong overarching goal of eroding confidence in US elections. The investigation found that Iran conducted a similar influence effort aimed at damaging President Trump’s candidacy. Both efforts were authorized at the highest levels. China considered an influence campaign, but eventually sat the election out. Lebanese Hizballah, Cuba, Venezuela, and Vietnam played bit parts with their own minor influence operations.
The Russian Embassy in Washington didn't much like the IC’s report: "another set of groundless accusations against our country of interfering in American internal political processes." The report, says the Embassy, is just more American "megaphone diplomacy."
The White House says US agencies are within about a week of remediating the effects of Holiday Bear’s SolarWinds compromise.
Worldwide response to Hafnium’s Exchange Server hacks continues. Netherlands authorities, Reuters reports, have found at least 1200 compromised servers.
Ukraine’s SBU says it stopped a large Russian cyberespionage effort by the FSB yesterday, Reuters says.
CISA has released four advisories on industrial control system vulnerabilities and their mitigations. They cover the Becton Dickinson Alaris 8015 PC Unit, the Hitachi ABB Power Grids AFS Series, the GE UR family, and Advantech WebAccess/SCADA.
Today's issue includes events affecting China, Cuba, France, Iran, Japan, Lebanon, Myanmar, the Netherlands, Russia, Sri Lanka, Ukraine, the United Kingdom, the United States, Venzuela, and Vietnam.
In a remote work world, managing and securing endpoints has never been more important. Tanium, provider of endpoint management and security built for the world's most demanding IT environments, published a report with PSB Insights on the new security challenges facing organizations as a result of the COVID-19 pandemic. IT Leads the Way: How the Pandemic Empowered IT features intelligence from 500-senior level IT decision makers. Visit tanium.com/EmpowerIT to download the full report.
Ukraine accuses Russian hackers of new cyber attack (Reuters) Ukraine's State Security Service (SBU) said on Tuesday it had prevented a large-scale cyber attack by Russian hackers targeting classified government data.
Microsoft hack fallout substantial for Dutch servers, watchdog says (Reuters) Dutch authorities on Tuesday said that the fallout for the Netherlands from a hack on Microsoft Corp’s Exchange was substantial, with at least 1,200 Dutch servers likely to have been affected.
Magento 2 PHP Credit Card Skimmer Saves to JPG (Sucuri Blog) Bad actors often leverage creative techniques to conceal malicious behaviour and harvest sensitive information from ecommerce websites. A recent investigation for a compromised Magento 2 website revealed a malicious injection that was capturing POST request data
FBI warns of rise in PYSA ransomware operators targeting US, UK schools (ZDNet) Data is being stolen ahead of encryption in extortion attempts.
Can We Stop Pretending SMS Is Secure Now? (KrebsOnSecurity) SMS text messages were already the weakest link securing just about anything online, mainly because there are tens of thousands of people (many of them low-paid mobile store employees) who can be tricked or bribed into swapping control over a mobile phone number to someone else. Now we're learning about an entire ecosystem of companies…
Hacker leaks payment data from defunct WeLeakInfo breach site (BleepingComputer) WeLeakInfo was a website that offered paid subscriptions that provides searchable access to a database containing 12.5 billion user records stolen during data breaches. This data included email addresses, names, phone numbers, addresses, and in many cases, passwords.
Nvidia’s new beta driver unlocks RTX 3060 Ethereum cryptocurrency mining (The Verge) The cryptomining protections have been bypassed using Nvidia’s own drivers.
Birmingham college falls victim to 'major ransomware attack' (Computing) The colleges says it is reverting to online teaching for one week starting Monday
Thinking of Joining Clubhouse? The Membership Fee Could Be Your Data Privacy (Check Point Software) Clubhouse’s exclusivity has created a huge buzz – but does the app and platform’s security match the hype around it? Jonathan Fischbein, Chief Information
How to protect our critical infrastructure from attack (IFSEC Global) Just how worried should we be about a cyber or physical attack on our national infrastructure? Chris Price reports on how the pandemic, the growth of remote working and IoT are putting assets at risk.
Microsoft explains the cause of yesterday's massive service outage (BleepingComputer) Microsoft has shed some light on the root cause behind yesterday's massive Azure authentication outage that affected multiple Microsoft services and blocked users from logging into their accounts.
REvil Group Claims Slew of Ransomware Attacks (Threatpost) The threat group behind the Sodinokibi ransomware claimed to have recently compromised nine organizations.
'I scrounged through the trash heaps... now I'm a millionaire:' An interview with REvil's Unknown (The Record by Recorded Future) REvil's Unknown talked to Recorded Future expert threat intelligence analyst Dmitry Smilyanets recently about using ransomware as a weapon
REvil member says gang targets organisations with cyber insurance for ransomware attacks (Computing) Pharmaceutical firms are also good payers, claims gang member 'Unknown'
BD Alaris 8015 PC Unit (Update B) (CISA) 1. EXECUTIVE SUMMARY CVSS v3 6.8 ATTENTION: Low skill level to exploit Vendor: Becton, Dickinson and Company (BD) Equipment: BD Alaris 8015 PC Unit Vulnerabilities: Insufficiently Protected Credentials, Security Features 2.
Hitachi ABB Power Grids AFS Series (CISA) 1. EXECUTIVE SUMMARY CVSS v3 6.5 ATTENTION: Low skill level to exploit Vendor: Hitachi ABB Power Grids Equipment: AFS Series Vulnerability: Infinite Loop 2. RISK EVALUATION Successful exploitation of this vulnerability could cause a denial-of-service condition on one of the ports in a HSR ring.
GE UR family (CISA) 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low skill level to exploit Vendor: GE Equipment: UR Family Vulnerabilities: Inadequate Encryption Strength, Session Fixation, Exposure of Sensitive Information to an Unauthorized Actor, Improper Input Validation, Unrestricted Upload of File with Dangerous Type, Insecure Default Variable Initialization, Use of Hard-coded Credentials 2.
Advantech WebAccess/SCADA (CISA) 1. EXECUTIVE SUMMARY CVSS v3 5.4 ATTENTION: Exploitable remotely/low skill level to exploit Vendor: Advantech Equipment: WebAccess/SCADA Vulnerability: Cross-site Scripting 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an unauthorized user to steal a user’s cookie/session token or redirect an authorized user to a malicious webpage.
New SonicWall 2020 Research Shows Cyber Arms Race at Tipping Point (SonicWall) Threat actors weaponizing cloud storage, advanced cloud-based tools to create record ransomware attack effectiveness, volume Ransomware soars with 62% increase since 2019 Office files preferred by cybercriminals, surpass PDFs, roughly 1 in 4 malicious ‘Never-before-seen’ malware variants up 74% year-over-year Cryptojacking shows three-year high with 28% year-over-year increase IoT malware rises 66% as criminals continue …
2020 Unit 42 IoT Threat Report 2020 Unit 42 IoT Threat Report (Unit42) New IoT Threat Report analyzed 1.2 million IoT devices to better understand the current IoT threat landscape and identify the top threats.
HP research shows that the vast majority of malware is still delivered by email (Continuity Central) HP has published its latest Quarterly Threat Insights Report, providing analysis of real-world attacks against customers worldwide. The report found that 88 percent of malware was delivered by email into users’ inboxes, in many cases having bypassed gateway filters.
Global Survey Finds 71% of Cloud Users Suffered on Average Seven Malicious Account Takeovers in Last Year (PR Newswire) Vectra AI, a leader in network detection and response (NDR), released today its global survey of 1,112 security professionals working in mid to...
Cybersecurity Report: “Smart Farms” Are Hackable Farms (IEEE Spectrum) Net- and IoT-connected agriculture could help feed 8.5 billion by 2030—but also may be broadly vulnerable to cybersecurity threats
Top Pentagon research arm combats ‘aggressive’ foreign investors (C4ISRNET) DARPA seeks domestic investors to move 150 projects into the market — and away from unfriendly governments.
Recorded Future Buys Fraud Analytics Startup Gemini Advisory (SecurityWeek) Threat intelligence firm Recorded Future has acquired fraud analytics startup Gemini Advisory in a $52 million cash and stock deal.
Cyber firm Recorded Future buys ‘dark web’ infiltrator for $52 million (Fortune) The band is getting back together: Recorded Future, a cybersecurity firm that sells threat intelligence, or information useful for computer security teams, is plunking down $52 million to buy a startup founded by a former employee.
Vulcan Cyber Secures $21 Million Series B Funding to Expand Its Vulnerability Remediation SaaS Platform and Orchestrate Cyber Security Hygiene - Vulcan Cyber (Vulcan Cyber) Vulcan Cyber raises series B funding round of $21 million led by Dawn Capital. Vulcan Free offers free risk-based vulnerability management.
Coalition Raises $175M to Build the Future of Commercial Insurance (PR Newswire) Coalition, the leading cyber insurance and security company, today announced it has raised $175 million to accelerate its rapid growth and...
Axonius Raises Another $100M and Secures Unicorn Status for its Cybersecurity Asset Management Platform (AlleyWatch) Axonius, cofounded by Dean Sysman, is a cybersecurity asset management platform that enables enterprises to ensure that all assets are secured properly.
Cyware Closes $30M Series B Just 7 Months After A Round (Crunchbase News) New York-based Cyware locked in a $30 million Series B after growing annual recurring revenue 120 percent last year and just seven months after raising its Series A.
Authentication Provider LoginID Raises $6 Million in Seed Funding (SecurityWeek) FIDO-certified multi-factor authentication provider LoginID this week announced that it raised $6 million in seed funding.
SafeGraph raises $45M for its ‘rigorous’ location data (TechCrunch) While there are plenty of companies selling data about physical locations, SafeGraph CEO Auren Hoffman said his startup is “one of the few companies to sell this data to data science teams.” For the most part, location data has traditionally been sold to marketers, and Hoffman said, “In the marketi…
Lookout Acquires CipherCloud to Deliver Security from Endpoint to Cloud (PR Newswire) Lookout, Inc., a leading cybersecurity company, today announced it has acquired CipherCloud, a leading cloud-native security company that...
Rumble Raises $5m in VC Funding to Solve the Network and Asset Discovery Challenge (Odessa American) Rumble, a global leader in network and asset discovery, has raised $5 million in VC funding to help IT and security staff find all networked devices and associated topologies within their environment. Rumble will invest the funds to expand its enterprise capabilities and broaden its go-to-market reach.
Meltwater announces agreement to acquire leading social media intelligence company Linkfluence for 50 million euro in a combination of cash, equity, and earn-out (GlobeNewswire) Meltwater B.V., a leading global provider of media intelligence and social analytics, has entered into an agreement under which it is committed to acquire Linkfluence, a French SaaS company using artificial intelligence to algorithmically mine social media for consumer insights.
Nokia Cuts Up To 10,000 Jobs as Race to Dominate 5G Heats Up (Bloomberg) Nokia Oyj will cut as many as 10,000 jobs in the coming years so it can invest more to catch up in the race to win orders for 5G networks. The measures will trim 600 million euros ($715 million) off Nokia’s cost base by the end of 2023, the Finnish telecommunications equipment maker said in a statement on Tuesday. The move doesn’t affect the outlook for 2021, it said.
Apple allows Russia to pre-install apps on iPhones as part of device setup (9to5Mac) Starting next month, Apple will allow the Russian government to pre-install apps on iPhones, iPads, and possibly other devices like Macs in future. In accordance with a new Russian law, Apple users will see a dialog box upon initial setup of new devices that features web browsers, antivirus, messenger, email clients, and more to be […]
Cars Have Your Location. This Spy Firm Wants to Sell It to the U.S. Military (Vice) 15 billion car locations. Nearly any country on Earth. ‘The Ulysses Group’ is pitching a powerful surveillance technology to the U.S. government.
Wikipedia Is Finally Asking Big Tech to Pay Up (Wired) The Big Four all lean on the encyclopedia at no cost. With the launch of Wikimedia Enterprise, the volunteer project will change that—and possibly itself too.
Facebook explores paid deals for new publishing platform (Axios) The company plans to build tools within the platform that allow writers to monetize.
Facebook to Publish Annual Report on Human Rights Impacts (Bloomberg) Social media giant to give board formal updates on the issue. Company has been criticized for role in Myanmar, Sri Lanka.
Mercer-Backed Parler Casts Its Reboot as Fight for Free Speech (Bloomberg) Leaked recordings of meetings detail role of Rebekah Mercer at social-media platform
The Departure of 2 Google AI Researchers Spurs More Fallout (Wired) Two academics changed plans to attend an invite-only conference this week; a third says he’ll no longer accept funding from the company.
Inside Gab, the Online Safe Space for Far-Right Extremists (The Intercept) The hacked data from Gab contains 65 gigabytes of data, including 4 million Gab accounts, 31,000 groups, and 39 million posts.
Embarc Collective Announces Brian Murphy As Chair Of The Board Of Directors (GlobeNewswire) ReliaQuest founder to bring proven experience in scaling startups to support 70+ early stage companies at Florida’s premier startup hub
Okta Welcomes Steve Rowland as Chief Revenue Officer (Okta) Senior Technology Executive to Join Okta’s Global Field Operations
Prominent Security Evangelist Joins Virsec as Chief Security Advisor (Virsec) Virsec announced today that Jim Routh has joined the company as Chief Security Advisor and Board Participant.
Giant Oak's GOST Search Tool Awarded U.S. Patent (PR Newswire) Today, Giant Oak, Inc. announced that the United States Patent and Trademark Office (USPTO) has issued U.S. Patent No. 10,885,124 for its...
Radware and TeraGo Deliver Tailored DDoS Protection Services to Simply Voting (GlobeNewswire) Radware® (NASDAQ: RDWR), a leading provider of cyber security and application delivery solutions, and TeraGo Inc. (“TeraGo”) (TSX: TGO, www.terago.ca), a leading networking, colocation and cloud services provider, jointly announced today the development of a best-of-breed security solution that protects online elections from potential cyber-attacks for Simply Voting, Inc.
Akamai to Combat Multi-Factor Authentication Security Gaps with Phish-Proof Push (PR Newswire) Akamai Technologies, Inc. (NASDAQ: AKAM), the world's most trusted solution for protecting and delivering digital experiences, today announced...
Okera Introduces Distributed Stewardship to Power Universal Data Authorization (PR Newswire) Okera, the universal data authorization company, today announced it has added the ability to delegate data access policy management, an...
Telos Corporation Partners with Zscaler to Streamline Compliance (Telos Corporation) Telos’ enterprise risk management framework and cloud security leader manage and automate FedRAMP and DoD authorizations
Dropbox will have a free password manager in April — if you’ve got 50 or fewer passwords (The Verge) Passwords sync across three devices, regardless of type
Cyber-Security Expert Provides Guidance for CxOs (PR Newswire) The Cyber Elephant in the Boardroom: Cyber-Accountability with the 5 Pillars of Security Framework by VigiTrust CEO Mathieu Gorge is available...
phoenixNAP Launches its Data Security Cloud Platform in Ashburn, VA (PRWeb) phoenixNAP®, a global IT services provider offering security-focused cloud infrastructure, dedicated servers, colocation, and specialized Infrastructure-as-a-Servic
Kasada V2 platform provides defense against advanced bot attacks (Help Net Security) Kasada announced the general availability of its V2 platform to address the increasing sophistication of bot attacks.
LogRhythm inks Aussie distie partnership with Netpoleon (ARN) Security intelligence vendor LogRhythm has inked a distribution partnership with Netpoleon for the Australian market.
CoCre8 announces partnership with HyTrust (ITWeb) HyTrust technology has a strong market presence in the financial services, healthcare and government verticals.
Backdoors & Breaches - Tabletop Simulator Guide (Black Hills Information Security) Edward Miro // Backdoors & Breaches is now available as an official Workshop Mod for Tabletop Simulator! Backdoors & Breaches (B&B) contains 52+ unique cards to help you conduct incident response tabletop exercises and learn attack tactics, tools, and methods. This post is a guide for getting a virtual B&B game going. Note: New attack, […]
Eliminate Hesitations: Security Simplified For Those Building In The Cloud (PR Newswire) Trend Micro Incorporated (TYO: 4704; TSE: 4704), a leader in cloud security, today announced the AWS Marketplace debut of its answer to the...
Mandiant Introduces New Services to Counter Dynamic Insider Threats (StreetInsider.com) New Insider Threat Security as a Service and Insider Threat Program Assessments offer customers protection from insider threats using unparalleled frontline incident response expertise and Mandiant Threat Intelligence
Feds Close to SolarWinds Hack Remediation; New Tech Deployments Coming (Meritalk) The nine Federal agencies whose networks were compromised in the Russia-backed hack via SolarWinds Orion products are close to finishing their remediation reviews, and the government is planning new deployments of unspecified security and IT modernization technologies to avoid a repeat of the intrusions, a senior Biden administration official said during a background briefing on March 12.
Juniper VP: SolarWinds Underscores the Network’s Role in Security (SDxCentral) The SolarWinds supply chain attack put a fine point on the importance of network security, Juniper Networks VP Samantha Madrid.
Security tips for start-ups from Kaspersky (Intelligent CIO Africa) From 2020 being dubbed ‘the year of the side hustle’ to small businesses grappling to maintain continuity and profitability, despite these unprecedented times there has been a significant uprising in entrepreneurial activity the world over. Start-ups tend to be created by people who burn with an idea and want to put it into action as […]
How to reduce remote working cyber security attacks (ITProPortal) Here’s how to keep remote working safe and secure
Cybersecurity for small business: everything you need to know (ITProPortal) Staying vigilant against threats in an online world
Illumio Wins U.S. Air Force SBIR Award (GlobeNewswire) Illumio Core Part of Zero Trust Security Strategy to Lock Down Malware and Protect Air Force Innovations
David Cumbow Selected as SynED's Cyber Hero for Bringing a Holistic Approach to Cybersecurity Education (PR Newswire) Today, SynED, a national non-profit organization that identifies emerging best practices for effective articulation between employers, job...
A Breakthrough for U.N. Governance of Cyberspace (World Politics Review) A working group within the U.N., comprising all 193 of its member states, just adopted a consensus report on norms for responsible state behavior in cyberspace. While the report itself represents fairly limited progress, in terms of its contents, the consensus is significant in a field wrought with division.
Open-ended working group on developments in the field of information and telecommunications in the context of international security: Final Substantive Report (United Nations General Assembly) Despite the radical transformations the world has experienced since the United Nations was founded 75 years ago, its purpose and timeless ideals retain foundational relevance. Alongside the reaffirmation of their faith in fundamental human rights, and their commitment to promote the economic and social advancement of all peoples and to establish conditions for justice and respect of international law, States resolved to unite their strength to maintain international peace and security.
Japan, U.S. to hold security talks in response to China's coercion (Kyodo News+) Japanese and U.S. foreign and defense ministers are set to closely coordinate on steps to strengthen the bilateral alliance at security talks in Tokyo as China puts forth increasingly coercive measures across the Indo-Pacific region.
America Will Only Win When China’s Regime Fails (Foreign Policy) There are two possible outcomes of U.S.-China competition—but Washington should prepare for the more turbulent one.
How to Craft a Durable China Strategy (Foreign Affairs) Washington Must Reconcile Interdependence and Conflict
Getting the Quad Right Is Biden’s Most Important Job (Foreign Policy) The Quadrilateral Security Dialogue is the best hope for standing up to China.
The UK Is Secretly Testing a Controversial Web Snooping Tool (Wired) The country passed its Investigatory Powers Act in 2016. Now, its building what could be the most powerful data collection system used by any democratic nation.
Bye bye, cyber Pearl Harbor. (The CyberWire) Some caution about historical metaphors that can inform cybersecurity policy and strategy, specifically "cyber Pearl Harbor." Maybe an 8-count, but not a KO.
The Cybersecurity 202: Foreign actors didn't successfully interfere in 2020. Here's how to make sure they don't in 2024 (Washington Post) Russia and Iran did attempt to influence the 2020 U.S. election, but American officials found no evidence that foreign nations prevented voting, changed votes or interrupted vote counting in any way, a pair of intelligence reports released yesterday confirm.
New Strategy Aims To Up DoD, IC Game To Counter Disinformation (Breaking Defense) "Adversary use of disinformation, misinformation and propaganda poses one of today's greatest challenges to the United States, not just to the Department of Defense," said Pentagon official Chris Maier.
How America Can Better Leverage the Private Sector Against Cyber Threats (The National Interest) It is time to build a strategy of shared cyber command and control, one that unleashes the private sector’s resources and innovation as an equal partner in national cyber defense.
Cybersecurity is more critical than Biden's rescue plan (TheHill) The U.S. has taught Russia that, when it comes to Russian cyberattacks, the U.S. is like a dog without teeth — rarely barking, never biting.
WSJ News Exclusive | GAO Calls for Protections to Prevent Retirement Savings From Online Theft (Wall Street Journal) Until the Labor Department takes such steps, participants’ data and assets will remain at risk, the report said.
In a cyberattack disaster, DoD needs backup squad to fix networks, restart critical systems (C4ISRNET) If the worst happens, cyber Guard and Reserve troops could help repair networks, fight intruders and get infrastructure running again. But not without changes.
California Passes New Regulation Banning 'Dark Patterns' Under Landmark Privacy Law (Gizmodo) Banning deceptive advertising tactics is another step towards ensuring that consumers are protected under the CCPA.
New director takes over at Pentagon’s top research office (C4ISRNET) An experienced veteran of DARPA is taking the helm.
Putin targeted people close to Trump in bid to influence 2020 election, U.S. intelligence says (Washington Post) Russian President Vladimir Putin and other senior officials in Moscow sought to influence the 2020 election by spreading misleading information about Joe Biden through prominent individuals, some of whom were close to former president Donald Trump, the U.S. intelligence community said in a report Tuesday.
Russia conducted operations 'denigrating' Biden while Iran schemed to 'undercut' Trump, US intelligence finds (Washington Examiner) Both Russia and Iran attempted to undermine a U.S. presidential candidate in the lead-up to last November’s presidential election, according to the intelligence community.
Intel report finds Russia, Iran tried to influence 2020 election (ABC News) The chief U.S. intelligence office has concluded that Russia and Iran sought to influence the election but China did not.
Russia attempted to influence 2020 election in Trump's favor, intelligence report says (CNET) But foreign actors didn't interfere with the voting process or attack election systems.
Foreign Threats to the 2020 US Federal Elections (Office of the Director of National Intelligence) This document is a declassified version of a classified report that the Intelligence Community provided to the President, senior Executive Branch officials, and Congressional leadership and intelligence oversight committees on 07 January 2021.
Russia Threatens to Block Twitter in a Month (SecurityWeek) Russian authorities threaten to block Twitter, saying that Twitter still wasn’t complying with the demands of the Russian authorities to remove banned content.
Apple Faces Next Round in French Probe Into iOS 14 Overhaul (Bloomberg) Apple set to get French antitrust ruling as soon as Wednesday. Software update plan aims to curb web tracking in privacy push.
Tampa Twitter hacker agrees to three years in prison (Tampa Bay Times) Graham Ivan Clark, 18, pleaded guilty to fraud charges for a hack of several Twitter accounts last summer.
Adobe Forces Takedown of Tweet Linking to 27-Year-Old Product (Vice) Adobe sent a DMCA takedown request to Twitter for a tweet from 2016 where a security researcher linked to a site that contained a download link for a 1994 version of Acrobat Reader.
NatWest Faces U.K. Criminal Charges in Money-Laundering Case (Wall Street Journal) The Financial Conduct Authority has filed criminal charges against U.K. bank National Westminster Bank for allegedly failing to prevent money laundering.
ICO registration mandatory for all businesses (ARLA Propertymark) Any business or sole trader who processes personal information must register with the Information Commissioner’s Office (ICO) under the Data Protection Act 2018 and failure to register is a criminal offence.
Cease and desist claims: a new way to curb data protection breaches by your competitors? (JD Supra) By bringing a cease and desist claim for unfair market practices, companies may have an important weapon at their disposal to teach a competitor that...
For a complete running list of events, please visit the Event Tracker.
Insider Threat Program Manager - Working Group Live Web Based Training Course / Certificate (Virtual, Apr 20, 2021) This affordable, comprehensive and practical 1 day training course will ensure the Insider Threat Program (ITP) Manager / Senior Official, Insider Threat Analyst, FSO, and others who support the ITP (CSO, CIO, CISO, IT, Network Security, Human Resources, Etc.), have the Core Knowledge, Blueprint, Resources needed for developing, managing or enhancing an ITP / Working Group. Our student satisfaction levels are in the exceptional range. Over 800+ individuals have attended this training course and received ITP Manager Certificates.
National Cyber League (NCL) Spring Season (Virtual, Feb 15 - Apr 11, 2021) The National Cyber League (NCL) is a defensive and offensive biannual puzzle-based, capture-the-flag style cybersecurity competition allowing US high school and collegiate students of all skill levels to showcase and build their skills. Its virtual training ground helps students prepare and test themselves against cybersecurity challenges that they will likely face in the workforce. All participants play the games simultaneously during Preseason, Individual Game and Team Game. Between easy, medium and hard challenges, students identify their strengths and weaknesses and expand their portfolio with an NCL Scouting Report. Registration for the Spring Season closes March 9, 2020.
SoCal Cyber Cup Challenge (SCCC) (Virtual, Feb 15 - May 31, 2021) Now in its 12th year, the SoCal Cyber Cup Challenge (SCCC) is a cybersecurity competition for middle school, high school, and community college students in the Southern California region, started by NDIA San Diego. Supported by a Department of Defense grant, this year’s competition will include community college students and extensive training for competitors and their mentors. As part of the grant, faculty from Coastline College, Palomar College, and Riverside City College will be supporting the challenge by developing mentor training content and promoting the competition.
CSO’s Cybersecurity Summit (Virtual, Mar 16 - 18, 2021) As cyber threats grow in scope and sophistication (as evidenced by the devastating and long undetected, SolarWinds breach), so do the stakes for corporations and government to stay alert and on guard. CSO, the tech industry’s premier voice on cybersecurity, presents a summit where top executives and leaders will provide up-to-the-minute insights on how to successfully safeguard your organization. Over three days, IT professionals will learn, contribute to the conversation and source new solutions providers.
4th CYBERSEC Brussels Leaders' Foresight 2021 (Virtual, Mar 18, 2021) CYBERSEC Brussels Leaders’ Foresight 2021 will follow the leitmotif of the CYBERSEC Global 2020: Together Against Adversarial Internet. Since the very beginning of the humankind, every innovation has transformed our lives and the Internet is not an exception. Those inventions are also accompanied by a plethora of threats which need to be addressed for the wellbeing and secure future of the global society.
Celebrating Women in Privacy: Ways to Support and Advance Women in the Field (Virtual, Mar 23, 2021) Women hold only 25% of all the jobs in the tech industry. Women in privacy, in particular, are paid 17% less than their male counterparts; with women of color making even less. Discrimination and bias, both within policies and in the way we structure our workforce, limit the U.S.’s ability to identify and address threats, innovate, address issues related to privacy invasions, and more. To celebrate March as Women’s History Month — an in concert with #ShareTheMicInCyber — join leading women in privacy for a conversation promoting diversity in tech and exploring ways to promote change within the industry. Let’s open a dialogue about the ways allyship, mentorship, and sponsorship can advance women in privacy.