Goto

Collaborating Authors

Demystifying Cyber Protection – Five vectors of SAPAS - CRN - India

#artificialintelligence

Data is now our most important asset, and guarding it has become a basic human need. The amount of data doubles every two years and traditional solutions for data protection are criminally outdated. Data protection without cyber security has become obsolete. The new era has come – it's the era of cyber protection. Cyber protection rests on five key vectors: Safety, Accessibility, Privacy, Authenticity, Security – or SAPAS, as we've coined the term.


AICD, Data61 launch Cyber Security course for Directors - Which-50

@machinelearnbot

The Australian Institute of Company Directors (AICD) has launched a new cyber security education program for directors and executives.


Cyber Security Breach Hit Over Half Of UK Businesses In Past Year

#artificialintelligence

NEW DATA reveals 76% of UK CEO's believe a cyber security breach to be a significant threat to business in 2017; significantly higher than global peers at just 61%. Consequently, 97% of British CEO's are currently addressing possible cyber breaches in their organisation; far higher than the global average figure of 90%. Richard Home, UK cyber security partner at PwC comments: "Most business boards now recognise that cyber security is a complex risk that requires their attention. The most successful leaders will be those who define a comprehensive, broad approach to governing cyber security." In defence of this, 58% of businesses have sought information, advice or guidance on the cyber security threats facing their organisations.


Cyber Defense Triad for Where Security Matters

Communications of the ACM

In the early days of computers, security was easily provided by physical isolation of machines dedicated to security domains. Today's systems need high-assurance controlled sharing of resources, code, and data across domains in order to build practical systems. Current approaches to cyber security are more focused on saving money or developing elegant technical solutions than on working and protecting lives and property. They largely lack the scientific or engineering rigor needed for a trustworthy system to defend the security of networked computers in three dimensions at the same time: mandatory access control (MAC) policy, protection against subversion, and verifiability--what I call a defense triad. Fifty years ago the U.S. military recognized subversiona as the most serious threat to security.


Ransomware: Too many firms are still willing to pay up if attacked

ZDNet

Over half of organisations would pay the ransom if they fell victim to a ransomware attack – despite repeated warnings that they shouldn't encourage cyber criminal extortion. Research by the Neustar International Security Council (NISC) found that six in ten organisations would pay cyber criminals for the decryption key in the event of a ransomware attack, according to its survey of 300 workers in'senior positions'. That's despite the likes of The White House, the UK Home Office, law enforcement and cybersecurity experts warning that paying the ransom should be avoided because it signals to ransomware operations that their extortion schemes work. High profile victims of ransomware attacks who have paid ransoms recently include Colonial Pipeline, which paid over $4 million in Bitcoin to cyber criminals using DarkSide ransomware, while meat processor JBS paid $11 million in Bitcoin to criminals who compromised its network with REvil ransomware. These incidents have seemingly forced business to take notice, with 80 percent of cybersecurity professionals surveyed for the research stating that more emphasis is being placed on protecting against the threat of ransomware.