Security News > 2020 > December
Data transparency allows people to know what personal data has been collected, what data an organization wants to collect and how it will be used. Key to creating an efficient and effective data control solution, a very broad term, is to establish a data security and control framework that fits the specific needs of the organization.
A recent Verizon report highlighted social engineering as a top target for bad actors, and the threat is only expected to grow in the year ahead. COVID-19 was in the news nonstop this past year, and threat actors are expected to continue to take advantage of it in 2021. Healthcare providers are doing everything they can to deploy new systems and support more patients online, while bad actors seek out high-value, vulnerable targets.
Attacks conducted by Iranian hackers against Israeli companies involved the deployment of ransomware and theft of information, threat intelligence company ClearSky reported last week. A new series of attacks targeting industrial, insurance and logistics companies in Israel appears to be the work of Fox Kitten, ClearSky noted in a new report.
As of December 2020, there were 229 million 5G subscriptions globally, which represents an astonishing 66 percent increase over last quarter - and is expected to reach 236 million globally by the end of 2020. Of those projections, 506 million 4G LTE connections will come from North America and 406 million will come from Latin America and the Caribbean.
Today, more than half of healthcare respondents have increased their public cloud and hybrid cloud use, and 46% have invested more in private cloud environments in an effort to quickly provide new work-from-home employees with access to IT resources. Healthcare hybrid cloud deployments: Key findings The future of healthcare is dependent on decommissioning of legacy architecture: Currently, more healthcare companies run exclusively traditional, non-cloud-enabled datacenters than any other industry, compared to 18% globally.
In the cybersecurity world, misconfigurations can create exploitable issues that can haunt us later - so let's look at a few common security misconfigurations. On the non-cloud side of the house, one of the most common misconfigurations is not enforcing Group Policy, anti-malware, and other centralized management rules and updates.
Rep. Adam Smith, chairman of the House Armed Services Committee, said in a letter to acting Defense Secretary Christopher Miller that he objects to the way the Pentagon is going about splitting off U.S. Cyber Command from the National Security Agency. A U.S. official confirmed Saturday that the Pentagon has a plan for separating the National Security Agency and Cyber Command.
A threat actor has leaked the stolen email and mailing addresses for Ledger cryptocurrency wallet users on a hacker forum for free. Cybersecurity intelligence firm Cyble has shared the leaked file with BleepingComputer, and we have confirmed with Ledger owners that the data is accurate.
Secure-IC announces the availability of its protection technologies in the Cloud. Starting first with Xilinx App Store launched on December 9th, a new service that allows millions of Xilinx customers to securely find and use third-party IPs in the Cloud, and powered by Accelize's Digital Rights Management technology, Secure-IC is now able to offer its clients the possibility to test protection technologies in the Cloud before deploying them.
F5 Networks announced that Haiyan Song will be joining the company as Executive Vice President of Security, starting January 4, 2021. Song joins F5 from Splunk where she led the Security business as Senior Vice President and General Manager of Security Markets.