Organizations are increasingly exposed to a large number and variety of threats and risks to cyber security. Big Data will be one of the main elements of change by supplying intelligence-driven models.
Research firm Gartner says that big data analytics will play a crucial role in detecting crime and security infractions. By 2016, more than 25 percent of global firms will adopt big data analytics for at least one security and fraud detection use case, up from current eight percent.
Avivah Litan, vice president and distinguished analyst at Gartner said big data analytics enables enterprises to combine and correlate external and internal information to see a bigger picture of threats against their enterprises. It is applicable in many security and fraud use cases such as detection of advanced threats, insider threats and account takeover.
More from Cloud Times by clicking here
Energy companies in the US were hacked 79 times last year according to a survey by ThreatTrack Security.
The survey found that 35% of respondents reported endpoints on their network had been infected by malware that evaded their defenses during the last 12 months.
Moreover, 58% of respondents cited the complexity of malware as the most difficult aspect of defending their organization.
Of all respondents, 61% of energy companies said email is the biggest threat vector to allowing malware onto their systems.
More from Metering.com by clicking here.
We hear anywhere from 10 to 200 lies a day. And although we’ve spent much of our history coming up with ways to detect these lies by tracking physiological changes in their tellers, these methods have proved unreliable. Is there a more direct approach? Noah Zandan uses some famous examples of lying to illustrate how we might use communications science to analyze the lies themselves.
Spend five minutes watching this great Ted-Ed lesson by clicking here.
A survey of federal IT managers commissioned by the Fort Meade Alliance in both the civilian and defense sectors showed a shift in cybersecurity concerns – from outside actors to insider threats and a focus on the need to educate employees.
Cyber security awareness training can help solve many of the challenges we face with protecting information technology assets and our government’s most sensitive information and mission-critical systems,” said Deon Viergutz, president of Ft. Meade Alliance and director of cyber operations for Lockheed Martin Information Systems and Global Solutions.
More from Federal Times by clicking here.
A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is actually people. Why strive to defeat encrypted passwords stored in computers, when those computers’ human users will turn them over willingly? The technique is known as social engineering. It could be a phone call at your desk “from IT” querying problems with your login details, or asking about those of our colleagues’. Or the more common technique of phishing – emails designed to solicit your credit card or login details by passing themselves off as legitimate emails from well-known banks or websites such as PayPal or eBay. This has evolved in spear phishing, in which known details about you personally gives the email even greater credibility. The latest ruse are emails purporting to be from the World Health Organisation about Ebola, with email subjects including:
- “Ebola Safety Tips – By WHO.”
- “What You Need To Know About The Deadly Ebola Outbreak,”
- “So Really, How Do You Get Ebola?,”
- “Is there ANY way to cure Ebola?”
- “The #1 Food Items You’ll Need In An EBOLA Crisis.”
But the link to the attached file which is described as health guidelines instead installs the DarkComet Trojan malware that gives attackers remote access to your computer. Any current event is fair game for cybercriminals if it can tempt you to click that link. Read more at: http://phys.org/news/2014-11-cybersecurity-weakest-link.html#jCp
Up until now, many people think that cyberattacks just amount to stolen credit card numbers or computer viruses or something. That’s not really the case. While your Mastercard and MacBook are valuable things to protect, the technology that relies on the industrial internet are much more valuable. That includes things like high-speed trains, water treatment facilities, and nuclear power plants. The list goes on and on.
The scary truth of all this is that the list is about to grow exponentially, as new internet-connected technology comes into play. The reality of the internet of things is that connecting more things to the internet means creating more vulnerabilities. “Current threats include economic transactions, power grid, and air traffic control,” Mark Nall, a program manager for NASA, told Pew. “This will expand to include others such as self-driving cars, unmanned aerial vehicles, and building infrastructure.”
More from Gizmodo.com by clicking here.
Digital technology has opened many new doors for organizations, enabling greater brand engagement and innovative customer experiences. But, at the same time, it has also exponentially multiplied the points of vulnerability for data breaches and theft of proprietary data. With the increased use, integration, and interconnection of mobile devices, security is even more imperative. This is particularly vital for marketers who must incorporate security into their strategic marketing plans and determine how new security solutions can deliver valuable customer insights.
One of the most important defenses any company has against cyber threats is a widespread and deeply rooted culture of security, shared by all employees, that is bolstered by exemplary leadership, regular training, strong policies and enforcement.
More from Advertising Age by clicking here
Bob Foreman’s architecture firm ran up a $166,000 phone bill in a single weekend last March. The swindle, which on the web is easier to pull off and more profitable, affects mostly small businesses and cost victims $4.73 billion globally last year.“I thought: ‘This is crazy. It must be a mistake,’ ” Mr. Foreman said. It wasn’t…
More from Yahoo.com Finance pages by clicking here.
Cybersecurity breaches such as those at Target (TGT), Home Depot (HD), and JPMorgan Chase (JPM) are expensive and embarrassing. While attacks may come from outside hackers, the FBI recently issued a warning that internal hacking from current and former employees poses the biggest threat—and is on the rise. The FBI recommends companies take additional security precautions such as changing their passwords more often.
There may be a simpler way: Pay employees more to keep them from becoming disgruntled in the first place.
The rise in employee hacking is just a new wrinkle in the ever-present epidemic of employee theft. Studies have documented the many reasons why employees steal: personal predisposition, economic need, workplace culture, or often a misguided sense of fairness. According to Queens University business professors Liane Greenberg and Julian Barling (PDF), workers often steal when they feel their employment relationship is unfair. They might see stealing as justified because it restores moral order. That attitude is most common when employees consider themselves underpaid, and Greenberg and Barling cite studies that show employee theft increased when pay was cut with no explanation.
More from Bloomberg Business Week by clicking here.
Earlier this month, Home Depot confirmed its payment systems were breached and said some 56 million payment cards were likely compromised in a cyberattack at its stores, suggesting the hacking attack at the home improvement chain was larger than last year’s unprecedented breach at Target Corp.
The Home Depot breach has led to fraudulent transactions across the United States, draining cash from customer bank accounts. Criminals are using stolen card information to buy prepaid cards, electronics and even groceries the Wall Street Journal said.
Home Depot had said customers who shopped at its stores as far back as April were exposed, suggesting the breach extended through the busy summer season.
More from Raw Story by clicking here.