Category Archives: Cybersecurity Memo – Insiders Edition

Cybersecurity Startup Aorato offers a ‘Behavior Firewall’

“And even a breach such as the one at the NSA could have been detected by Aorato. “Snowden reportedly used colleagues’ passwords to access sensitive docs,” Aorato’s co-founder and CEO, Idan Plotnik, notes to me. “Even if the user activity … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Cybersecurity Startup Aorato offers a ‘Behavior Firewall’

Cybersecurity Vs. Privacy is changing our approach to cybersecurity

                  Ted Schlein of KPCB: “We are in midst of cybersecurity technology being completely re-made –  moving from a signature-based protection environment to a more behavioral anomaly-based protection environment.” Video interview by … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Cybersecurity Vs. Privacy is changing our approach to cybersecurity

Cisco Systems Report: Shortage of over a million cybersecurity experts globally

A Cisco security report released on January 16th 2014 shows that hacker threats reached “startling levels” last year and that the world is suffering from a shortage of skilled computer defenders. Cracks in defenses and weapons for attacks rose to … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Cisco Systems Report: Shortage of over a million cybersecurity experts globally

Large botnet traced back to hacked refrigerator

Call it the attack of the zombie refrigerators. Computer security researchers said this week they discovered a large “botnet” which infected Internet-connected home appliances and then delivered more than 750,000 malicious emails. The California security firm Proofpoint, Inc., said hackers … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Large botnet traced back to hacked refrigerator

Cybersecurity is for the C-suite, not just the IT crowd

“Ninety-seven percent of Fortune 500 companies have been hacked,” says Peter W. Singer, “and likely the other 3% have too, they just don’t know it.” Such is the less-than-rosy picture painted by Singer — director of the Center for 21st … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Cybersecurity is for the C-suite, not just the IT crowd

Top cybersecurity threats for 2013

The top  cybersecurity threats in 2013 reportedly included hacktivists targeting users’ privacy at the top spot, followed by cyberespionage campaigns – along with the newest craze of stealing bitcoins. More from the Times of India by clicking here  

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on Top cybersecurity threats for 2013

A cybersecurity framework for critical infrastructure

A cybersecurity framework for critical infrastructure owners will soon become a national standard for litigators and regulators. The framework is now in its final comment stage and will be released mid-February.  The National Institute of Standards and Testing (NIST) will establish this comprehensive set of … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on A cybersecurity framework for critical infrastructure

A clear-eyed guide to Android’s actual security risks

If you’re an Android user — or want to be — you’ve likely heard about all the security risks of Google’s mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on A clear-eyed guide to Android’s actual security risks

How (un-hackable!) Quantum Cryptology Works

By harnessing the unpredictable nature of matter at the quantum level, physicists have figured out a way to exchange information on secret keys. Check it out at HowStuffWorks.com by clicking here.

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on How (un-hackable!) Quantum Cryptology Works

How a WWII intelligence pact between the U.S. and UK forged modern surveillance

Revelations show a transatlantic intelligence pact that started during the second world war is expanding beyond states’ ability to control it. There haven’t been too many moments of levity over the past four months for those intimately involved in the story of Edward … Continue reading

Posted in Cybersecurity Memo - Insiders Edition | Comments Off on How a WWII intelligence pact between the U.S. and UK forged modern surveillance