Archive for April, 2017

The Handmaid’s Tale is the most horrific thing I have ever seen

April 29th, 2017

Enlarge / The handmaid June (Elizabeth Moss) must wear regulation red, with a bonnet covering her face, to signify that role as a slave designated to bear children for a prominent man. (credit: The Handmaid’s Tale / Hulu)

One of the most exciting new science fiction shows on the Web right now isn’t exactly fun. The Handmaid’s Tale, currently streaming its first three episodes on Hulu, may repulse you, incense you, or just make you cry. But like a good workout that makes your muscles burn, the hurt of watching this series eventually results in something great.

Based on the celebrated 1985 novel by Margaret Atwood, The Handmaid’s Tale is a half-dystopia, half-fairy tale about what happens to the United States after a far-right religious group seizes control of the government. There are a few notable changes from the novel, but, for the most part, the series follows the events of Atwood’s book faithfully.

We aren’t quite sure how the new nation of Gilead was formed, but we hear bits and pieces about a war that has left “the colonies” a radioactive wasteland. Food is scarce, and an infertility epidemic is sweeping the world.

Read 15 remaining paragraphs | Comments

Posted in margaret atwood, the handmaid's tale, The Multiverse | Comments (0)

10 Cybercrime Myths that Could Cost You Millions

April 29th, 2017

Don’t let a cybersecurity fantasy stop you from building the effective countermeasures you need to protect your organization from attack.

Posted in Uncategorized | Comments (0)

KNOW before NO, (Fri, Apr 28th)

April 28th, 2017

A good friend told me that anengagedinformation security professional is one wholeads with the KN …

Posted in Uncategorized | Comments (0)

Banks Face Challenge Of Integrating Cyber And Operational Risk

April 28th, 2017

Banks are increasingly aware of the threats that can arise from cyber-related crimes and are continuing to strengthen their defenses against these threats. The resulting pace of change and innovation on both sides of the “conflict” continues to accelerate as the potential for gain and/or loss for the attacking entities and financial institutions only grows.

Newly published Accenture research on cybersecurity across the banking sector found that 78 percent of senior security executives from across the banking sector expressed confidence about their overall cybersecurity strategy. However, these executives may be overconfident; the survey also revealed that, among the thousands of phishing, malware and penetration attacks that financial services firms face each year, there were an average of 85 serious attempted cyber breaches. Of these, about one-third (36 percent) were successful – meaning at least some information was obtained through the breach. And, according to respondents, a majority (59%) of successful breaches go undetected for several months – demonstrating that the cybercrime industry has evolved from its early days of being “smash and grab” to a more sophisticated approach of getting inside in order to listen, learn and extend the criminal activity.

Dealing with threats of this magnitude continues to call for new and innovative approaches to cybersecurity. Typically, banks have tried to establish controls to manage cyber risk from the top down with a strong security perimeter. But in coping with the complexities of firewalls, malware and phishing alongside increasing use of social engineering approaches to infiltrate the institutions, banks are struggling to connect the technical aspects of cybersecurity with the broader concerns of operational risk – defined by the Basel Committee as “the risk of direct or indirect loss resulting from inadequate or failed internal processes, people and systems, or from external events.”

Any successful cyberattack has the opportunity to affect people, processes and technology throughout the organization. In the wake of an attack, banks need to get IT systems back up and running, but they also need to reassure customers and regulators, deploy effective back-up systems, and potentially, compensate losses. This calls for advance planning, cooperation and communication between operational, risk, infrastructure and cybersecurity teams. Proper planning is a critical component in the overall defense approach and needs to be prioritized on a risk basis. Being able to identify the valuable data assets in the environment – and then focusing on how to provide multiple layers of defense for this specific population – helps to enable the right strategy and focus the security related investment.

Another important factor for consideration is the ability to quickly quarantine an area which has been breached, to enable the broader systems and processes of the bank to continue operating while the affected areas are investigated, repaired and brought back on line. Incorporating the cyber risk strategy with an effective enterprise risk management (ERM) strategy can therefore help to limit the damage from a data loss event, distributed denial of service (DDoS) attack or other cyber incidents. Increasingly we do see cyber risk as a specific component of a comprehensive operational and ERM strategy, with formal review and oversight by the board and senior management.

Banks are continuing to step up both their investments in cybersecurity and their risk-based approach to protecting the institution. In addition to spending on technology and cyber expertise, they also are enhancing the governance framework to help foster accountability across heritage functional silos and create a more cohesive security-minded culture. By ensuring that the security program is supported by a more comprehensive risk and business strategy, organizations are able to develop a more complete “cyber response plan” that includes stakeholder communications and the protection and recovery of key assets. And the result is seen in banks decreasing their risk exposure while also improving the speed and effectiveness of their responses.

Cyber threats will continue to evolve, but banks that tie cybersecurity efforts to broader operational risks will be far more resilient in a challenging environment.

 

This article was written by Steve Culp from Forbes and was legally licensed through the NewsCred publisher network. Please direct all licensing questions to legal@newscred.com.

The post Banks Face Challenge Of Integrating Cyber And Operational Risk appeared first on McAfee Blogs.

Posted in Optimize Operations | Comments (0)

Google, Facebook Swindled in $100M Payment Scam

April 28th, 2017

Lithuanian man impersonated an Asian-based manufacturer to trick Facebook and Google into paying him $100 million.

Posted in Uncategorized | Comments (0)

FTC Offers ID Theft Victims Online Crime Reporting Tool

April 28th, 2017

ID theft victims can report their cybercrime attack to the Federal Trade Commission, without having to file a police report in most cases.

Posted in Uncategorized | Comments (0)

FTC Offers ID Theft Victims Online Crime Reporting Tool

April 28th, 2017

ID theft victims can report their cybercrime attack to the Federal Trade Commission, without having to file a police report in most cases.

Posted in Uncategorized | Comments (0)

FTC Offers ID Theft Victims Online Crime Reporting Tool

April 28th, 2017

ID theft victims can report their cybercrime attack to the Federal Trade Commission, without having to file a police report in most cases.

Posted in Uncategorized | Comments (0)

Fileless Malware Attacks Continue to Gain Steam

April 28th, 2017

Endpoint woes grow as fileless attacks grow in prevalence and file-based attacks remain largely undetected by AV engines.

Posted in Uncategorized | Comments (0)

Fileless Malware Attacks Continue to Gain Steam

April 28th, 2017

Endpoint woes grow as fileless attacks grow in prevalence and file-based attacks remain largely undetected by AV engines.

Posted in Uncategorized | Comments (0)