cybertalk.org cybertalk.org

2FA & smart display? Zoom’s new approach to meetings

EXECUTIVE SUMMARY: Strengthening security with 2FA As millions of employees began to work from home due to social distancing rules, the Zoom platform saw a thirty-fold increase in usage. The Zoom platform now hosts over 300 million meeting participants per day. After a spate of ‘Zoom-bombings’, Zoom thoroughly reassessed and reinvented its cyber security measures. From a revamped bug bounty program to encryption to resolving a...

cybertalk.org cybertalk.org

Online learning, a reason to teach about cyber security

EXECUTIVE SUMMARY: Cyber criminals see online learning as an opportunity: Children are precious, and protecting them in all ways, especially on the internet, is imperative. For cyber criminals, the ubiquity of online learning makes it all too easy to connect with youth. “These cyber-criminals are targeting the going ‘back to school,” says cyber security expert Mark Ostrowski. How can you help school children stay safe...

cybertalk.org cybertalk.org

Cyber-physical system attacks, a clear and present danger

EXECUTIVE SUMMARY: As IT systems, IoT and operational technology converge, attacks on cyber-physical systems (CPS) in industrial, healthcare and other contexts will unfold with dire consequences, predicts Gartner. Cyber-physical systems, defined as “systems that are engineered to orchestrate sensing, computation, control, networking and analytics to interact with the physical world (including humans),” are coming together in new...

cybertalk.org cybertalk.org

School districts square against ransomware

EXECUTIVE SUMMARY: This fall, millions of students worldwide are engaged in online learning. While school software systems may have included vulnerabilities prior this point in time, the coronavirus pandemic has amplified these risks. In many US school districts, limited resources exist to secure networks, to install patches, and to ensure error-free operations. Online systems constructed without authentication controls, and VPNs, for...

cybertalk.org cybertalk.org

3 privacy controls for your smart-home device

EXECUTIVE SUMMARY: Smart-home devices can compromise your privacy. Former Amazon executive Robert Frederick even admits to turning Alexa off, due to concerns that the company was listening in. Need to regain some privacy in your home? For Amazon’s Alexa, follow these three tips: Turn-off the ‘drop-in’ app: Alexa’s ‘drop-in’ feature allows predetermined contacts to simply start speaking out of a device’s speaker. No need...

cybertalk.org cybertalk.org

What’s the point of point solutions?

EXECUTIVE SUMMARY: Modern CISOs are often cleaning up the chaos created by predecessors, with a barrage of point solutions polluting security environments. Modern CISOs want prevention techniques, rather than solely detection and mitigation tactics, as point solutions provide. The current climate in cyber security focuses on consolidated architectures, which offer prevention, detection and mitigation under a single umbrella. Aside from...

cybertalk.org cybertalk.org

US results for election: The feds aren’t the only ones monitoring

EXECUTIVE SUMMARY: Updates on US national intelligence concerning the election: On Sunday, the US director of national intelligence, John Ratcliffe, announced that his office will no longer provide in-person election intelligence briefings to Congress. Ratcliffe cites concern over lawmakers leaking information to the public. Instead, the office will provide written reports. The decision to restrict congressional briefings leads to...

cybertalk.org cybertalk.org

Is ransomware winning? Paralyzing attacks, automotive industry

EXECUTIVE SUMMARY: For the automotive industry, ransomware poses a pernicious, ongoing threat. In 2017, the WannaCry attack hit Renault, in France, and at least one of its international alliance partners. The attacks forced Renault facilities across Europe to temporarily close. Earlier this summer, ransomware brought a Japanese car manufacturer’s operations to a standstill. This past weekend, one of the trendiest electric car...

cybertalk.org cybertalk.org

Managing risk: People-centric cyber security solutions

EXECUTIVE SUMMARY: Cyber risk reduction not only relies on technology, but also depends on people-centric solutions. In an IDG study, 98% of respondents agreed with the statement ‘the human employee is the weakest link when it comes to cybersecurity’. It’s the people who are at ‘eye-level’ whose actions will most directly influence organizational security outcomes. Click To Tweet Twenty-five percent of employees have clicked...

cybertalk.org cybertalk.org

The definitive guide to Uber’s legal fights

EXECUTIVE SUMMARY: Uber has received pages of press recently, and if you haven’t had time to parse through every detail, you’re not alone. Cyber Talk provides you with sound-bites that’ll make it seem like you’ve read every word. Uber’s security skirmish: In a felony complaint filed in a federal court, the U.S. Department of Justice is now accusing Uber of covering up a 2016 cyber breach. Between 2015 and 2017, Uber’s top...