The ninth installment in a series published by the NATO Cooperative Cyber Defence Center of Excellence (CCDCOE) designed for military and national security decision-makers looks at the potential damage of limited or near-total shutdown of the internet during a crisis, the takedown of a major botnet, the hacking of the control system of a water plant in Florida, and several other incidents. The CCDCOE report highlights takeaways for the senior leaders in order to be better prepared for emerging cyber threats.
Cyber Risk and Reward? Kroll Acquires Redscan
According to Redscan CEO, Mike Fenton, “Merging Redscan’s innovative culture and leading managed security services with Kroll’s unparalleled incident response experience and end-to-end cyber risk management capabilities allows us to provide a unique global offering. This combination will build fantastic value for our clients, who will benefit from a global team of world-class seasoned experts monitoring their environments and an expanded platform to grow our proprietary technology capabilities.”
Cybersecurity Challenges for Artificial Intelligence: Considering the AI Lifecycle
Artificial Intelligence (AI) is influencing people’s everyday lives and playing a key role in digital transformation through its automated decision-making capabilities. The benefits of this emerging technology are significant, but so are the concerns. In this recent report, The EU Agency for Cybersecurity (ENISA) warns that AI may open new avenues in manipulation and attack methods, as well as new privacy and data protection challenges.
A New Model for the Future? Google Cloud, Allianz and Munich Re Partner to Revolutionize Risk Management in the Cloud
According to Thomas Kurian, CEO of Google Cloud, “The benefits of adopting cloud technologies are too compelling for today’s enterprises and we are committed to removing the barriers that prevent this business acceleration. That’s why we are proud to be delivering a first-of-its-kind program with Allianz and Munich Re to help our customers reduce security risks and gain simplified access to specialized cyber insurance coverage to help customers accelerate their business with confidence in the cloud.”
Compromised? Joint FBI and CISA Cybersecurity Advisory on Microsoft Exchange Server Vulnerabilities
According to the recent FBI and CISA Cybersecurity Advisory on Microsoft Exchange Server vulnerabilities, these vulnerabilities allow an attacker to access a victims’ Exchange Servers, enabling them to gain persistent system access and control of an enterprise network. It has the potential to affect tens of thousands of systems in the United States and provides adversaries with access to networks containing valuable research, technology, personally identifiable information (PII), and other sensitive information from entities in multiple U.S. sectors.
Luck of the Irish? Data Protection Commission of Ireland Publishes Annual Report
As shared by the Commissioner for Data Protection, Helen Dixon, “The progress the DPC has made in 2020 provides a solid platform on which to build across our enforcement and complaint-handling functions in particular. The GDPR must be understood as a project for the now, but equally for the longer-term. The DPC intends to continue as a leader in its full implementation.”
SOARing Costs? Considering Data Breach Economics
Consisting of analysis from 524 organizations that experienced data breaches between August 2019 and April of 2020, the Cost of Data Breach Report 2020 from the Ponemon Institute shares key information, findings, and data points harvested from more than 3,200 interviews on areas ranging from global data breach costs to data breach lifecycles in influential countries and industry sectors.
Embracing Trust? NSA Shares Guidance on Zero Trust Security Model
According to the recently released cybersecurity guidance from the National Security Agency (NSA), as cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the mindset necessary to deploy and operate a system engineered according to Zero Trust principles can better position them to secure sensitive data, systems, and services.
New Litigation Trends Survey from Norton Rose Fulbright
Released in February of 2021, Norton Rose Fulbright’s 16th Annual Litigation Trends Survey highlights up-to-date insight on key US dispute trends including the changes and challenges presented by the COVID-19 pandemic. Additionally, in the areas of cybersecurity and data protection, the survey report notes that disputes have increased over the last several years, with 2020 being no exception. According to the survey report, 44 percent of respondents feel more exposed than they did 12 months prior and respondents report that past attacks have disrupted operations, with others sensing that their company size or industry makes them targets.
A Chilling Ciao? Facial Recognition on the Borders of Italy
According to the recent article from European Digital Rights (EDRi), biometric surveillance dehumanizes us into lifeless bits of data, depriving us of our autonomy and the ability to express who we are. This is even more dangerous when applied to people who reach our countries escaping from violence, economic disasters, and environmental catastrophes. Meeting human beings with biometric surveillance technologies destroys our humanity.