Human Risk Management Blog

Cybersecurity

Get the latest news in cybersecurity with in-depth coverage and analysis of current statiistics, developments and how to stay ahead of current threats.

Gone Phishing: Travelers Claims Plan Doesn’t Cover Cyber Losses

Daniel R. Stoller at Bloomberg Law had an excellent observation about the risks of phishing related to general crime policies. Here is a short excerpt and the whole article is warmly ...

PDF Files Can Be Abused to Steal Windows Credentials

PDF files can be weaponized by malicious actors to steal Windows credentials (NTLM hashes) without any user interaction, and only by opening a file, according to Assaf Baharav, a security ...

Many of us will be at the RSA Conference in SanFran this week. Here are some quick tips!

Lance Spitzner said: Eat breakfast, it may be the last meal you get that day. Schedule the most important meetings in the morning. RSA gives you a back-pack. Don't use it at the con, ...

Best-Funded US Cyber Security Startups By State [InfoGraphic]

We were just made aware of this very interesting map created by CBInsights. It lists the most well-funded cyber security companies in each US State as of Feb 2, 2018. To our pleasant ...

The Malicious Use of Artificial Intelligence in Cyber Security

Kevin Townsend wrote a great article about AI in SecurityWeek, looking at the current state of affairs and the expected near future, based on a recent important scientific paper titled: ...

Accenture Cyber Security Survey: 18% of Health Employees Would Sell Confidential Data

Those who said they were willing to sell the data would do so for as little as between $500 and $1,000. Alexandia Wilson at HealthLeadersMedia had some disconcerting news. "Patients trust ...

Insider Trading Can Pose Cyber Security Risks Says SEC Chair Clayton

Securities and Exchange Commission Chair Jay Clayton warned today insider trading by executives from undisclosed hacks and weak protections can pose cyber security risks to the reputation ...

Global Cyber Security Risk Perception: Highest Management Priorities

Few organizations are highly confident in their ability to manage the risk of a cyber-attack, despite viewing cybersecurity as a top risk management priority, according to a survey ...

WHAT IS “REASONABLE CYBER SECURITY” AND HOW DO COURTS VIEW IT?

Shawn Tuma is an attorney with an internationally recognized reputation in cybersecurity, computer fraud, and data privacy law. He is a Cybersecurity & Data Privacy Attorney at Scheef ...

UK Warns Critical Industries to Boost Cyber Security or Face Hefty Fines

The UK government has warned that Britain's most critical industries must boost their cybersecurity or face potentially hefty fines under the EU's Networks and Information Systems ...

How To Create A Security Culture in 2018

Ever heard: "If it was easy, everyone would do it" ? Creating a better security culture in your organization has a few challenges. Let's have a look at them, see how you can overcome ...

How To Explain Meltdown And Spectre To Your C-Level and employees

OK, 2018 has just started and it has totally borked all networks in the whole world. That's a fine mess we're in to start off the year. :-) Meltdown and Spectre are CPU hardware design ...

Book Review: A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using

Excellent book about InfoSec that has everything you need to know and nothing you don't. A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using by ...

[On-Demand Webinar] Six Cybersecurity Trends Organizations Need to Watch for in 2018

Watch this insider’s perspective of cybersecurity trends to expect in 2018 from our founder Stu Sjouwerman. The list of six predictions are founded on KnowBe4’s deep insight into threats ...

Spy Vs. Spy? WikiLeaks Says CIA Impersonated Kaspersky Lab

Wow, the plot thickens. Attribution indeed is a very murky business. According to WikiLeaks, its analysis revealed that by using these fake certificates, the CIA made it look like data ...

How to sell cybersecurity to your executive team

Scott Schlimmer wrote a great post at CSO about the constant battle between profitable business investments and “unprofitable” security investments to protect the current bottom-line.

Fancy Bear Goes Phishing For DC Cybersecurity Conference Attendees

Want to target a large swath of cybersecurity professionals in one go? Just crash their "cyber" party with a decoy document. So goes the modus operandi for an advanced persistent threat ...

New Worry For CEOs: A Career-Ending Cybersecurity Breach

Corporate chiefs get more involved in defense against hackers, fearing a cybersecurity breach could cost their jobs, hurt their businesses. Vanessa Fuhnmans wrote an excellent heads-up ...

This Week's Five Most Popular HackBusters Posts Sept 16

There is an enormous amount of noise in the security space, so how do you know what people really talk about and think is the most important topic? Well, we created the Hackbusters site ...

Microsoft Wakes Up To The Fact That Cyber Security Risk Is A Business Risk [VIDEO]

The 800-pound Redmond Gorilla asks: "Should your security focus be on systems or people?" They wrote: "In the latest Modern Workplace episode, “Cyber Intelligence—The Human Element,” we ...


Get the latest insights, trends and security news. Subscribe to CyberheistNews.