ICYMI: hacking back, cyber attribution, possible cyber attack on US Navy, Kaspersky Lab software, ransomware apps, and Facebook messenger virus.
ICYMI: Researchers find potentially lethal car hack with no quick fix, IRS used extra funding for cybersecurity and identity theft protection, 8 More Chrome Extensions Hijacked to Target 4.8 Million Users, Maersk Shipping Reports $300M Loss Stemming from NotPetya Attack, IoT Medical Devices a Major Security Worry in Healthcare, Update gone wrong leaves 500 smart locks inoperable, and APT28 Using EternalBlue to Attack Hotels in Europe & Middle East.
ICYMI: HBO hack, cyber risks of self-driving cars, and new legislation proposed to secure IoT devices.
ICYMI: Shadow IT, HBO hacked, hackers fix voting machines, cloud may be a cyber solution, and the latest on Wannacry.
Andrew Paulette, a Security Analyst for NetCentrics Corporation, has published an article in Tripwire titled Shadow IT: How do you protect what you don’t know you have? In this article, Andrew defines Shadow IT – the presence of unknown systems, data and assets on a network – and identifies the four primary factors behind the rise of Shadow IT. Andrew also lays out several important questions and considerations for organizations seeking to combat the threats posed by Shadow IT. Read the full article here.