cybertalk.org cybertalk.org

Advanced data security insights with expert Patrik Honegger

Patrik Honegger has worked in the IT sector since the 90’s and has specialized in the IT security field since 2000. He joined Check Point in 2001. Since joining Check Point, he has been involved in the full array of the company’s solutions and customer sectors and maintains a deep technological understanding of products and customers’ needs. Patrik has successfully fulfilled roles as Security Engineer, Lead Consultant and Head of...

cybertalk.org cybertalk.org

Here’s what APAC firms are worried about…

EXECUTIVE SUMMARY: In the Asia Pacific region, 68% of businesses scattered across six Asian markets have experienced cyber breaches. This represents a significant increase over the 32% figure reported for the same region in 2019. Among these enterprises, roughly 60% admitted that remediation efforts can consume a full week or more. Cyber security professionals state that budget and skills represent serious obstacles. A given...

cybertalk.org cybertalk.org

Top 5 ways to win the cyber security marathon

EXECUTIVE SUMMARY: Strengthening cyber security is an endurance event. As with a marathon, strengthening security requires the careful implementation of strategy, consistent pacing, effective training, clear communication, and an insightful evaluation of overall performance. How can your organization win the race? Strategy Ahead of implementing a cyber security roadmap, organizations should ensure that their strategy is sound and...

cybertalk.org cybertalk.org

Cyber conflict modeling for financial firms, why does it matter?

EXECUTIVE SUMMARY: How would global banking institutions fare in the event of an international cyber conflict? NATO spent last week exploring the potential fallout in its annual Locked Shields exercise. This wargame scenario involved fictional banks and fictional national infrastructure. In the US, the Federal Reserve Bank of New York posits that an attack that affects any of the country’s top five banks could cripple more than one...

cybertalk.org cybertalk.org

Power grid security, SolarWinds & the pervasive problems for critical infrastructure

EXECUTIVE SUMMARY: A new report indicates that 25 percent of North American utilities incurred infection with the SolarWinds malware. Despite the discovery of this statistic, forensics investigators have not yet determined extent of the intrusion within industrial control systems (ICS). It may be impossible to know. How can the US prioritize and improve power grid security? Will utility groups be able to shore up cyber security ahead...

cybertalk.org cybertalk.org

VP Engineering Peter Sandkuijl: How to navigate the evolving threat landscape

Peter Sandkuijl, a resident of The Netherlands, is a senior security specialist who has operated in the security market for over 25 years. He started his career at a local Check Point distributor, where he served as a technical product manager. This responsibility for the Check Point product line was quickly expanded. In 2000, Check Point started a Benelux office, where Sandkuijl started as the Technical Manager Benelux. Later, as the...

cybertalk.org cybertalk.org

With a Chrome exploit posted on Twitter, did this ethical hacker sabotage security?

EXECUTIVE SUMMARY: Over 330 million monthly active users rely on Twitter for entertainment, news and to let others know about what’s going on in their lives. If you want to connect with others in your areas of focus, Twitter is a place to go. A cyber security researcher who discovered a Chrome zero-day exploit headed to the platform to tweet about his findings. The Chrome zero day exploit A researcher working on exploit code for a...

cybertalk.org cybertalk.org

Your business suffered a cyber attack, now what?

Devin Partida writes about cyber security and technology. She is also the Editor-in-Chief of ReHack.com.  So the worst has happened. Your business suffered either a cyber attack or a data breach, and now it’s time to react and clean up. Many guides explain what to do before an attack and how to prepare. Afterwards, it’s easy to feel like you’re on your own. Cyber attacks are inevitable in today’s digital frontier. But that...