Security News
Bringing more than 36 years of Department of Defense and Intelligence Community cybersecurity experience, Heckman will partner with clients to deliver cyber resilience for DoD policy, strategy, IT and weapon system cybersecurity. His focus encompasses all aspects of cyber and secure information sharing, ranging from innovative approaches to cyber strategy, policy, security architecture and engineering, to initiatives such as controls for IT modernization, Risk Management Framework transformation, identity and access management evolution and data protection.
Owl Cyber Defense Solutions announced the acquisition of the Trident Assured Collaboration Systems product line. The acquisition gives Owl a broader range of certified network perimeter defense solutions than any competitor in the market.
The onset of 5G - which introduces new network architectures, services and devices - raises the stakes and increases the challenge for network operators. The European Union is one such organization taking the lead. It has analyzed numerous risk scenarios and has come up with a toolbox that outlines nine mitigating measures and supporting actions that member states and network operators can leverage to defend themselves.
In the Department of Defense the display reinvigorated interest in counter-swarm tactics research, for drones and swarming tactics can have applications in all warfighting domains. It enables Kaminer's group to establish a multi-university, multi-year effort to develop an operational planning simulation for defense against an attacking drone swarm.
Security defense strategy can be extremely complex, with security teams grappling with tens of thousands of information points and evolving attacker techniques, said Derek Manky, Chief of Security Insights & Global Threat Alliances at Fortinet's FortiGuard Labs. FortiGuard Labs has created threat playbooks to help companies deal with this complexity, by exposing attack techniques utilized by attackers.
Two people have been arrested for stealing defense data from the Italian aerospace and electronics group Leonardo, the interior ministry said on Saturday. "At the end of a complex investigation by the Naples prosecutor into a serious computer attack against Leonardo. a former worker and a company director were arrested," a ministry statement said.
Italian police have arrested two people allegedly for using malware to steal 10 GB of confidental data and military secrets from defense company Leonardo S.p. A. Leonardo is one of the world's largest defense contractors, with 30% of the company owned by the Italian Ministry of Economy and Finance.
There are, of course, other factors that play a role in the attackers' preference for healthcare-related targets: the talent shortage for cybersecurity experts with healthcare expertise, the fact that most healthcare employees still don't make cybersecurity a priority, the fact that many of the devices and technologies they use run on antiquated operating systems - to name just a few. There might come a time when cybersecurity becomes a part of medical curriculums - in the meantime healthcare organizations can significantly lower the number of successful attacks with the proper defenses and training, DiMaggio notes.
They really know how to mix a perfectly balanced cocktail of software engineering and human insight when it comes to crafting the perfect spear-phishing attack. If a CEO or other C-level exec is hooked, they have the power to deliver virtually whatever the attackers desire - whether it's authorizing payment transfers, or spilling company secrets, or any number of actions only a chief exec can take, unchecked.
Qualys announced Container Runtime Security, which provides runtime defense capabilities for containerized applications. Qualys Runtime Container Security, once instrumented in the image, will work within each container irrespective of where the container is instantiated and does not need any additional administration containers.