"The need for board-level responsibility for cyber security is generally accepted but not always applied. A new bill introduced to the Senate seeks to change this by requiring a board level statement of cyber security expertise or practice in annual SEC filings."
"According to a new market research report "Middle East Cyber Security Market by Solution (IAM, Encryption, DLP, UTM, Antivirus/Antimalware, Firewall, IDS/IPS, Disaster Recovery), Service, Security Type, Deployment Mode, Organization Size, Vertical, and Country - Forecast to 2022", published by MarketsandMarkets, The Middle East Cyber Security Market size is expected to grow from USD 11.38 billion in 2017 to USD 22.14 billion by 2022, at an estimated Compound Annual Growth Rate (CAGR) of 14.2%."
"Police seized massive amounts of computer data and were in contact with thousands of witnesses, authorities said Friday, as they tried to piece together a portrait of the man behind the deadliest terrorist attack in the British capital in more than a decade."
"Why are we so worried about Congress repealing the FCC’s privacy rules for ISPs? Because we’ve seen ISPs do some disturbing things in the past to invade their users’ privacy. Here are five examples of creepy practices that could make a resurgence if we don’t stop Congress now."
"In a room heavy with testosterone at Regis University last weekend, the college team that outwitted volunteer hackers at a cybersecurity competition had four women and four men."
"If you’ve been to any type of tech conference, you may have heard someone use the phrase “people, process and technology.” We’ve been told time and time again that if people solely rely on technology to protect their digital assets, the status quo of mega-breaches and wide-scale attacks will only continue."
"I led two conduct risk workshops on March 13 in New York City that preceded the Operational Risk North America conference which should have begun on March 14, but gotcancelled because of a severe winter storm."
"Hyperconnectivity driven by the rise of the digital-everything economy and the internet of things (IoT) will soon disrupt the cybersecurity landscape in a way that hasn’t been seen in the past—and organizations should act now to be prepared."
"Can a big bank have a conscience? Citigroup hired one."
"There’s been one particularly misleading claim repeated throughout coverage of CIA documents released by WikiLeaks today: that the agency’s in-house hackers “bypassed” the encryption used by popular secure-chat software like Signal and WhatsApp."
"New report outlines how cybercriminals have the advantage, thanks to the incentives for cybercrime creating a big business in a fluid and dynamic marketplace."
"A growing industry of boutique security firms has emerged as oil and gas companies seek outside help to protect their networks from increasingly savvy and aggressive cyberattacks."
"I taught my two last classes of the winter quarter this week. "
"When George Orwell envisioned the “telescreen” — the TV that keeps constant tabs on its viewers — in 1984, he predicted that governments would use technology to cross the threshold into our private lives."
"Donald Trump’s anticipated cybersecurity executive order could be done in a week or so."
"WikiLeaks’ release on Tuesday of a massive cache of data describing CIA hacking tools has renewed a debate over how well the U.S. government balances the protection of Americans’ cybersecurity against the need to protect national security."
"The cybersecurity industry has got a lot of work to do in order to shift the gender balance of its talent pool. Industry figures show that - in terms of recruitment of women - cybersecurity remains stagnant, with some of the worst male-to-female ratios in the technology workforce."
"Wikileaks has published details of what it says are wide-ranging hacking tools used by the CIA.
The alleged cyber-weapons are said to include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers."
"Digitalisation plays a key role in the fight against payment fraud. Yet Commerzbank’s cybercrime specialists in cash services show that even in this technologically advanced environment, security threats persist. Companies must take steps to ensure that human beings – as well as computers – are protected against crime. "
"The Oxford Dictionaries definition of cyberwar is “The use of computer technology to disrupt the activities of a state or organisation, especially the deliberate attacking of information systems for strategic or military purposes.” "
"ISACA report finds that 55% of security jobs take three- to six months to fill, and under 25% of candidates are qualified for the jobs they apply for."