This Week in Security News: IT Pros and Cyberthreats
Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 23 Mar 2018 13:49:52 +0000
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, 62 percent of IT decision makers report that on-premises security is safer than the cloud, and a new report says 68 percent of businesses are not confident they can protect against an advanced cyberattack.
Read on to learn more.
Vulnerabilities are a Cybercriminal’s Best Friend
When discussions around the ways cybercriminals and hackers are able to compromise and penetrate an organization, it regularly leads to the use of exploits and exploit kits.
The GDPR is Coming: We Shed Light on What’s Still Not Working
On May 25, the biggest shake-up to Europe’s data protection laws in almost a generation will finally take effect, after years of planning. For any US organization handling data on EU citizens, including service providers, it means you could face hefty fines. That should get the attention of any board. Yet awareness remains patchy.
NIST Cybersecurity Framework Series Part 2: Protect
A key goal of many chief information security officers is to bolster the protections the company uses to safeguard its most critical assets. This type of priority isn’t difficult to understand in the current cybersecurity landscape – 360,000 new malicious files were discovered every day in 2017, and many of these threats have continued into 2018.
Mapping the Journey to GDPR Compliance: Who’s got the wheel?
The GDPR enforces the idea that every company should be aware of data privacy for EU citizens, and how we manage their privacy and data within our company.
Connected Vehicle Security Vulnerabilities
Before considering autonomous vehicles, we must understand “black box” unsecure mandatory specifications.
GDPR vs Blockchain: Technology vs the Law
One of the biggest impacts that GDPR will have for consumers (citizens of countries that comply with GDPR, at least) is the right to be forgotten. A person can request that they be removed from a record. What if the record is part of a blockchain?
The Trend Micro Cyber Safety Solutions team has been tracking a potentially unwanted app (PUA) distribution campaign that installs PUA software downloaders. During our research, we found that some of these distributors started pushing malware along with PUAs in late 2017.
Cryptocurrency Miner Distributed via PHP Weathermap Vulnerability, Targets Linux Servers
Legitimate and large-scale cryptocurrency mining operations often invest in dedicated hardware and electric consumption to make a profit. This doesn’t escape the attention of cybercriminals: Malicious cryptocurrency mining was so pervasive last year that it was the most detected network event in devices connected to home routers.
When It Comes to Cyber Risks, 2018 is No Time to Play Games
While some organizations have spent decades fine-tuning their ability to respond to and manage cyber risks, far too many are still playing games with their security strategy.
GandCrab Ransomware Goes ‘Agile’
GandCrab infected over 50,000 victims and reaped more than $600,000 for attackers.
Boosting the Security of Office 365 by Blocking 3.4 Million High-Risk Threats
Trend Micro looked into the state of email threats and security in 2017 to provide a clearer picture of what organizations are up against — and what can protect them.
62% of enterprise IT leaders say on-premises security is better than cloud
Three-quarters of IT professionals share cloud security duties with their cloud providers.
Understanding the Relationship Between AI and Cybersecurity
Dudu Mimran, CTO at Telekom Innovation Laboratories, discussed the relationship between AI and cybersecurity in a speech and blog post for the OECD Forum 2018.
Companies still struggle to hire security pros; use in-house training to fill the gaps
33% of organizations report experiencing a security breach and 68% are not confident that they can protect against an advanced attack.
Do you think in-house security is safer than the cloud? Let me know your thoughts below, or follow me on Twitter: @JonLClay.
The post This Week in Security News: IT Pros and Cyberthreats appeared first on .