Source: National Cyber Security – Produced By Gregory Evans This past week, the world learned about the big hack of Biglaw. If your employer was one of the almost 50 firms prestigious enough to be targeted by Russian hackers… congrats? The targeted firms tended to be transactionally oriented; the apparent…
Cybersecurity, Personal Email Accounts and Personal Devices
Source: National Cyber Security – Produced By Gregory Evans In October, we learned that a hacker claiming to be a teenager had accessed the personal email account of CIA Director John Brennan. WikiLeaks then published at least some of the emails. According to WikiLeaks, the published materials include a list…
‘White-hat’ hackers key force in cybersecurity
Source: National Cyber Security – Produced By Gregory Evans Amateur expertsare helping to spot potential loopholes, as Cao Yin reports.A very small office near the Sixth Ring Road in Beijing houses a very big dream, one that’sshared by thousands of Internet security enthusiasts across China. The office is the home…
Cybersecurity bill to thwart hackers added to big 2016 spending deal
Source: National Cyber Security – Produced By Gregory Evans A cybersecurity bill aimed at thwarting huge hack attacks was slipped at the last minute into a massive $1.1 trillion federal spending bill that Congress is poised to pass this week. Supporters said Wednesday the bill will increase the sharing of cyber threat information between U.S. companies…
DHS hacks businesses for free to test cybersecurity
Source: National Cyber Security – Produced By Gregory Evans IndependentSECURITY journalist Brian Krebs first reported on the program, know as National Cybersecurity Assessment and Technical Services (NCATS). He reported that many in the private sector had never heard of NCATS. But the program is no secret. According to the DHS…
Hackers Fuel Cybersecurity Industry
Source: National Cyber Security – Produced By Gregory Evans CybersecuritySOFTWARE has been a major focus in pop culture since the release of the 1995 film, Hackersstarring Angelina Jolie.COMPUTERbreak-ins have since been a significant theme in countless movies and television programs. The entertainment industry has provided cybersecurity firms with the best…
Cybersecurity Expert: I’d Rather Hack Amazon Than Microsoft
Source: National Cyber Security – Produced By Gregory Evans In an interview with the Puget Sound Business Journal, Seely asserts that with cloud technology, Microsoft storing user’s data is like Fort Knox opening safety deposit boxes but Microsoft needed to prove the data is safe. That proof would be the…
Cybersecurity expert: Hackers would ‘rather go after Amazon than Microsoft’
Source: National Cyber Security – Produced By Gregory Evans As Microsoft moves more of its business into the cloud, the success of the company relies on its ability to protect an increasing amount of customer data from cybersecurity threats. The Redmond, Washington-based company’s chief executive Satya Nadella on Tuesday announced…
Overnight Cybersecurity: Teen dumps apparent hack of government data
Source: National Cyber Security – Produced By Gregory Evans The teenaged hackers alleged to be behind the breach of CIA director John Brennan’s personal email account on Thursday released what appeared to be thousands of law enforcement and military personnel’s personal information. The duo, which goes by the name Crackas…
Sullivan: Cybersecurity bill lacks teeth, expands surveillance
Source: National Cyber Security – Produced By Gregory Evans The Senate passed a controversial cybersecurity bill Tuesday night in response to calls for Congress to prevent cyber threats to the United States. This is a continuation of the debate between personal privacy and security, and a decisive victory for those…