ICYMI: Waging cyber war without a rulebook; Hackers Used Malicious MDM Solution to Spy on ‘Highly Targeted’ iPhone Users; New Gmail feature could open more users to phishing risks: Government officials; Mueller indicts 12 Russians for DNC hack, election interference; Facebook to Remove Misinformation That Leads to Violence.
Robert Schofield, a Senior Solutions Architect for NetCentrics, and Thomas Cook, a Senior Systems Engineer for NetCentrics, recently published an article in Cyber Defense Magazine. Titled How consistent security reporting in government could prevent the next WannaCry exploit, the article explores the concept of data aggregation as a means to improved cybersecurity in the federal space. Robert and Thomas explain that the abundance of tools results in an equal abundance of information, which isn’t always consistent when compared to data collected from other tools.
ICYMI: Opinion: To hackers, we’re Bambi in the woods; 100% of corporate networks ‘highly vulnerable’ to attacks, here’s how to secure yours; Australia to ban Huawei from 5G rollout amid security concerns; U.S. intel chief warns of cyber threats to U.S. infrastructure; Google Chrome Feature Guards Users From Spectre Attacks.
ICYMI: You Should Be ‘Significantly Concerned’ There’s No White House Cyber Coordinator, Policy Experts Say; ‘Underground’ May Be the US Military’s Next Warfighting Domain; US gives China’s ZTE some breathing room; Cruel pranksters made NYC internet kiosks play ice cream truck tunes; Thermomanator Attack Steals Passwords by Reading Thermal Residue on Keyboards.
ICYMI: Top Huawei exec blasts US lawmakers as closed-minded and ill-informed; Facebook Files Patent For Tech That Can Take Advantage of Your Phone’s Mic; Pentagon Intelligence Chief: Russia And China Will Have Weapons in Space ‘In the Near Future’; Portland, Maine Ready to Flip Switch on Smart Traffic Signals; Eyes Closed in Photos? Facebook Al Can ‘Open’ Them.
ICYMI: Lawmakers urge Google to end partnership with China’s Huawei; Chinese hacking group resurfaces, targets U.S. satellite companies and systems; Trump directs Pentagon to create military Space Force; Why 50,000 ships are so vulnerable to cyberattacks; Just 5 Percent of Federal Contractors Are Fully Protecting Against Email Spoofing.
ICYMI: Trump, senators head for clash on cyber policy; OPM wants to know the most critical cyber workforce needs; U.S. counterspy warns World Cup travelers’ devices could be hacked; US Government’s biometric database worries privacy advocates; Two men killed over false child kidnapping claims on WhatsApp, Facebook.
ICYMI: US Navy Launches Inspection Program for Cyber Operations Preparedness; Facial Recognition to Aid in Border Security this Summer; VPNFilter Malware Still has Its Sights Set On Your Router; Marcus Hutchins, WannaCry-killer, hit with four new charges by the FBI; Goldman Sachs enlists staff for cyber security war games.
ICYMI: Judge dismisses Kaspersky lawsuits, U.S. Government ban will stand; How China acquires ‘the crown jewels’ of U.S. technology; Russia asks Apple to remove Telegram Messenger from the App Store; Security community urged to prepare for quantum computing; Government Report IDs the Need For Speed in Cyber Hiring.
ICYMI: Theft of North Korean secrets may have pushed Kim Jong Un into talks; Watch Out Apple: North Korean Hackers Are Now Developing iPhone Spy Tools; One Year After WannaCry, EternalBlue Exploit Is Bigger Than Ever; Hidden App Malware Found on Google Play; Trump eliminates national cyber-coordinator job, gives Bolton keys to the cybers.
Seli Agbolosu-Amison, PhD, a cybersecurity data scientist for NetCentrics Corporation, has recently published an article in SIGNAL Magazine on four of the main cyber policies transforming government. Seli explains that as a result of recent federal legislative and administrative activity, government agencies are expected to launch significant modernizations of their cybersecurity systems, get offensive with hackers, and take a more strategic approach to risk, and breaks down the specific components of the four major policies.