Addressing the DDoS problem has become more important than ever. The global pandemic almost instantly shifted the whole education system and jobs that can be done online to the home. Accessing different remote systems has become a necessity for all those affected. DDoS attacks against many organizations could previously have had only a limited negative effect and reputational damage and the daily operations of employees and students could continue in person or via locally accessible systems. Now the attack can stop all work and education for remote users relying on the targeted system.
According to Ralph Nickl, CEO and co-founder of Canopy, “Until recently, data protection regulations have outpaced technology and processes. Our software enables people to significantly expedite the assessment of compromised data following a security incident so that, in the event of a breach, they can respond within required timeframes and help minimize harm by notifying affected individuals faster.”
According to Secretary of Homeland Security Alejandro N. Mayorkas, “The cybersecurity landscape is constantly evolving and we must adapt to address new and emerging threats. The recent ransomware attack on a major petroleum pipeline demonstrates that the cybersecurity of pipeline systems is critical to our homeland security. DHS will continue to work closely with our private sector partners to support their operations and increase the resilience of our nation’s critical infrastructure.”
According to Exterro Founder and CEO Bobby Balachandran, “Speed and accuracy are of the utmost importance when conducting large breach reviews. Historically, organizations have tried to create their own cobbled-together solutions or repurpose technology not built for the task to understand, report on, and mitigate data breaches. The result was slow ingestion, processes that don’t scale, and inflexible data definitions that cannot detect emerging and important data types like PHI. With Exterro Smart Breach Review, our customers can now complete even the largest breach reviews in less time using fewer resources. The software’s AI-led identification and automated report data generation also significantly reduce the potential for errors and omissions.”
In 2020, the FBI’s Internet Crime Complaint Center (IC3) received 19,369 Business Email Compromise (BEC)/ Email Account Compromise (EAC) complaints with adjusted losses of over $1.8 billion. BEC/EAC is a sophisticated scam targeting both businesses and individuals performing transfers of funds. The scam is frequently carried out when a subject compromises legitimate business email accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.
The 10th installment in a series published by the NATO Cooperative Cyber Defence Center of Excellence (CCDCOE) designed for military and national security decision-makers looks at various ways a supply chain could be compromised as was the case for SolarWinds, the political response to the SolarWinds attack and much more. The new CCDCOE report also highlights the growing interest towards strategic decision-making exercises focusing on threats in the cyber domain.
Developed based on the European Union Agency for Cybersecurity (ENISA) framework for artificial intelligence lifecycle stages and modified through the lens of the Electronic Discovery Reference Model (EDRM), the HaystackID Cyber Discovery Framework defines, depicts, and discusses a strategic framework that may be useful for understanding and applying the discipline of data and legal discovery in support of cybersecurity-centric challenges.
According to Tami Erwin, CEO of Verizon Business, “The COVID-19 pandemic has had a profound impact on many of the security challenges organizations are currently facing. As the number of companies switching business-critical functions to the cloud increases, the potential threat to their operations may become more pronounced, as malicious actors look to exploit human vulnerabilities and leverage an increased dependency on digital infrastructures.”
According to Commissioner for Internal Market, Thierry Breton, “AI is a means, not an end. It has been around for decades but has reached new capacities fueled by computing power. This offers immense potential in areas as diverse as health, transport, energy, agriculture, tourism or cyber security. It also presents a number of risks. Today’s proposals aim to strengthen Europe’s position as a global hub of excellence in AI from the lab to the market, ensure that AI in Europe respects our values and rules, and harness the potential of AI for industrial use.”
According to Dan Goodin of Ars Technica, the Cellebrite vulnerabilities could provide fodder for defense attorneys to challenge the integrity of forensic reports generated using the Cellebrite software. Additionally, Lucas Ropac of Gizmodo notes that if all of these disclosures are true, it could have pretty massive ramifications for Cellebrite.