The ninth installment in a series published by the NATO Cooperative Cyber Defence Center of Excellence (CCDCOE) designed for military and national security decision-makers looks at the potential damage of limited or near-total shutdown of the internet during a crisis, the takedown of a major botnet, the hacking of the control system of a water plant in Florida, and several other incidents. The CCDCOE report highlights takeaways for the senior leaders in order to be better prepared for emerging cyber threats.
Artificial Intelligence (AI) is influencing people’s everyday lives and playing a key role in digital transformation through its automated decision-making capabilities. The benefits of this emerging technology are significant, but so are the concerns. In this recent report, The EU Agency for Cybersecurity (ENISA) warns that AI may open new avenues in manipulation and attack methods, as well as new privacy and data protection challenges.
According to Thomas Kurian, CEO of Google Cloud, “The benefits of adopting cloud technologies are too compelling for today’s enterprises and we are committed to removing the barriers that prevent this business acceleration. That’s why we are proud to be delivering a first-of-its-kind program with Allianz and Munich Re to help our customers reduce security risks and gain simplified access to specialized cyber insurance coverage to help customers accelerate their business with confidence in the cloud.”
According to the recent FBI and CISA Cybersecurity Advisory on Microsoft Exchange Server vulnerabilities, these vulnerabilities allow an attacker to access a victims’ Exchange Servers, enabling them to gain persistent system access and control of an enterprise network. It has the potential to affect tens of thousands of systems in the United States and provides adversaries with access to networks containing valuable research, technology, personally identifiable information (PII), and other sensitive information from entities in multiple U.S. sectors.
According to the media release as shared by Eric De Grasse, CEO of Project Counsel Media, “With more than two decades coverage and service to practitioners in the cybersecurity, digital media, and legal technology domains, we are now seeing more than ever the accelerated convergence of these discrete, yet mutually inclusive areas in the lives of our worldwide audiences. With a commitment to increasing the understanding and implications of this convergence, we are excited to partner with The Maas Consulting Group and ComplexDiscovery Solutions as they have unique expertise in identifying and sharing insight that helps industry practitioners venture out of the comfort zone of traditional information silos.”
As shared by the Commissioner for Data Protection, Helen Dixon, “The progress the DPC has made in 2020 provides a solid platform on which to build across our enforcement and complaint-handling functions in particular. The GDPR must be understood as a project for the now, but equally for the longer-term. The DPC intends to continue as a leader in its full implementation.”
Consisting of analysis from 524 organizations that experienced data breaches between August 2019 and April of 2020, the Cost of Data Breach Report 2020 from the Ponemon Institute shares key information, findings, and data points harvested from more than 3,200 interviews on areas ranging from global data breach costs to data breach lifecycles in influential countries and industry sectors.
According to the recently released cybersecurity guidance from the National Security Agency (NSA), as cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the mindset necessary to deploy and operate a system engineered according to Zero Trust principles can better position them to secure sensitive data, systems, and services.
According to HaystackID’s Senior Vice President and General Manager for Review Service, Matt Daimler, “Security has always been an essential part of our remote review. But since we first offered it in 2014, we have had to adapt to rapidly changing security risks. Now increased cyber threats and exponential growth in remote work due to the pandemic have driven the need for even greater protection. Our 3.0 platform is the next step in that evolution using cutting-edge, next-generation technology.”
Medical imaging plays an important role in diagnosing and treating patients. The system that manages medical images is known as the picture archiving communication system (PACS) and is nearly ubiquitous in healthcare environments. PACS is defined by the Food and Drug Administration (FDA) as a Class II device that “provides one or more capabilities relating to the acceptance, transfer, display, storage, and digital processing of medical images.” PACS centralizes functions surrounding medical imaging workflows and serves as an authoritative repository of medical image information.