Tag Archives: review

2017 Threat Trends – The Year in Review

2017 was another landmark year for cybersecurity. In reviewing our quarterly Threat Landscape reports, it is clear that 2017 has been notable primarily for three things: the rapid digital transformation and expansion of the potential attack surface, the increasing sophistication of cyber attacks, and a lapse in basic cybersecurity hygiene, largely being driven by digital transformation coupled with the growing cybersecurity skills gap.

Let’s take a look at some of the issues that have challenged the cybersecurity community.

The expanding attack surface

2017 was the year of digital transformation. Traditional network environments were upended by the rapid adoption of things like cloud infrastructure and cloud-based applications and services, the virtualization of data centers, the integration of billions of new, connected IoT devices, and the continued expansion of mobility, BYOD, and related applications.

Because this change has happened so rapidly, many organizations have had to scramble to find ways to extend security to new

Read more at: https://www.csoonline.com/article/3243062/security/2017-threat-trends-the-year-in-review.html

2017 Threat Trends – The Year in Review | CSO Online

2017 was another landmark year for cybersecurity. In reviewing our quarterly Threat Landscape reports, it is clear that 2017 has been notable primarily for three things: the rapid digital transformation and expansion of the potential attack surface, the increasing sophistication of cyber attacks, and a lapse in basic cybersecurity hygiene, largely being driven by digital transformation coupled with the growing cybersecurity skills gap.

Let’s take a look at some of the issues that have challenged the cybersecurity community.

The expanding attack surface

2017 was the year of digital transformation. Traditional network environments were upended by the rapid adoption of things like cloud infrastructure and cloud-based applications and services, the virtualization of data centers, the integration of billions of new, connected IoT devices, and the continued expansion of mobility, BYOD, and related applications.

Because this change has happened so rapidly, many organizations have had to scramble to find ways to extend security to new

Read more at: https://www.csoonline.com/article/3243062/security/2017-threat-trends-the-year-in-review.html

Cyber Review No. 22 – The International Institute for Counter

The ICT’s Cyber-Terrorism Activities report for May 2017 reviews six areas: operational uses; defensive tactics; offensive tactics; cyber-crime and cyber-terrorism; international response; and a case study of East Asia.

  1. In the operational domain, three prominent trends were identified this month. First, the establishment of independent platforms and the opening of various channels of communication by jihadist elements. Second, the dissemination of propaganda through the presentation of alleged achievements in the media campaign against the West. Third, highlighting of the economic damage caused by terrorism through infographics (the visual presentation of quantitative information) and discourse on the Shumukh al-Islam jihadist Web forum. In addition, Anonymous launched a campaign against Israel. It is worth noting that this month also saw the use of women and children for the Islamic State’s propaganda purposes.
  2. In the defensive domain, four prominent trends were identified this month. First, the IS banned its fighters from using social media for

    Read more at: http://www.ict.org.il/Article/2098/cyber-review-no-22

Cyber Review No. 22 – International Institute For Counter-Terrorism – The International Institute for Counter

The ICT’s Cyber-Terrorism Activities report for May 2017 reviews six areas: operational uses; defensive tactics; offensive tactics; cyber-crime and cyber-terrorism; international response; and a case study of East Asia.

  1. In the operational domain, three prominent trends were identified this month. First, the establishment of independent platforms and the opening of various channels of communication by jihadist elements. Second, the dissemination of propaganda through the presentation of alleged achievements in the media campaign against the West. Third, highlighting of the economic damage caused by terrorism through infographics (the visual presentation of quantitative information) and discourse on the Shumukh al-Islam jihadist Web forum. In addition, Anonymous launched a campaign against Israel. It is worth noting that this month also saw the use of women and children for the Islamic State’s propaganda purposes.
  2. In the defensive domain, four prominent trends were identified this month. First, the IS banned its fighters from using social media for

    Read more at: http://www.ict.org.il/Article/2098/cyber-review-no-22

Cyber Review No. 21 – The International Institute for Counter

The main trends identified during the month of April 2017 were analyzed on five axes: operational uses; defensive tactics; offensive tactics; cyber-crime and cyber-terrorism; and counter-measures to protect against cyber-crime.

1. On the operational axis, there was a significant trend in the use of the Internet for propaganda purposes and the continued pattern of reliance on open networks for recruitment followed by a move to encrypted channels for suspicious activities; the Islamic State (IS) continued to publish and distribute its purported military achievements on the Internet using infographics to compensate for its losses in the real world; digital banners containing incitement for the execution of “lone wolf” attacks were frequently distributed to inspire young Muslims in the West using design based on popular video games; there was also “gender” propaganda aimed at influencing a female target audience, and accordingly the contents dealt mainly with modesty and the education of children, using

Read more at: http://www.ict.org.il/Article/2097/cyber-review-no-21

Cyber Review No. 21 – International Institute For Counter-Terrorism – The International Institute for Counter

The main trends identified during the month of April 2017 were analyzed on five axes: operational uses; defensive tactics; offensive tactics; cyber-crime and cyber-terrorism; and counter-measures to protect against cyber-crime.

1. On the operational axis, there was a significant trend in the use of the Internet for propaganda purposes and the continued pattern of reliance on open networks for recruitment followed by a move to encrypted channels for suspicious activities; the Islamic State (IS) continued to publish and distribute its purported military achievements on the Internet using infographics to compensate for its losses in the real world; digital banners containing incitement for the execution of “lone wolf” attacks were frequently distributed to inspire young Muslims in the West using design based on popular video games; there was also “gender” propaganda aimed at influencing a female target audience, and accordingly the contents dealt mainly with modesty and the education of children, using

Read more at: http://www.ict.org.il/Article/2097/cyber-review-no-21

We need to talk about Ransomware – Computer Business Review

FavoriteLoadingAdd to favorites

Like bandits lurking in the shadows of the internet, cyber criminals are holding us to ransom. Are we equipped to pay the price, or take a gamble on the forfeit for non-compliance? Taking the latest Cerber Ransomware threat as an example, Charl van der Walt, Chief Security Strategy Officer at SecureData, explores how cybercriminals are turning their hands to new techniques to get their mitts on our data – and now money –

Read more at: http://www.cbronline.com/news/cybersecurity/business/need-talk-ransomware/

Future trends for cyber security – Computer Business Review

FavoriteLoadingAdd to favorites

Cyber security strategy is now a key issue for any enterprise. Ransomware attacks continue to evolve more sophisticated ways to get onto corporate networks. Crypto currencies have enabled cyber crime to become a profitable way to make money directly from malware.

Attackers no longer need any technical knowledge – ransomware attacks

Read more at: http://www.cbronline.com/digital-transformation/future-trends-cyber-security/

Newspaper review: Online bullying and anger over impasse

News LetterImage copyright
News Letter

While the ongoing stalemate at Stormont again features heavily in the papers, the Irish News leads with a mother’s warning about online bullying.

Elle Towbridge was found dead at her home in Killyclogher, outside Omagh, in April.

Her mum Mandy tells the Irish News that Elle had been “very scarred” by repeated bullying on social media.

Ms Towbridge says she has spoken out to warn other parents about the dangers of online abuse.

“Elle’s heart is now my heart and it will beat on and I will put everything

Read more at: http://www.bbc.com/news/uk-northern-ireland-40490746