Opinion: Be vigilant for weaknesses before a breach occurs | How can we secure critical infrastructure? | Report: Most cyberattackers in Q4 sought financial benefits
February 16, 2018
CONNECT WITH SMARTBRIEF LinkedInFacebookTwitterGoogle+
SmartBrief on Cybersecurity
Security and risk management news that matters to the C-Suite
Top Story
Opinion: Be vigilant for weaknesses before a breach occurs
Companies shouldn't be afraid of proactively probing their systems for security vulnerabilities, argues Jerry Thompson of Identity Guard. "[N]o system is foolproof, and weaknesses and loopholes that can be patched ahead of time and continually monitored for suspicious activity are a company's first and best stronghold across an ever-widening threat landscape," he writes.
WRAL TechWire (Raleigh, N.C.) (2/12) 
LinkedIn Twitter Facebook Google+ Email
Security Tips and Tools
How can we secure critical infrastructure?
A major attack on US critical infrastructure is possible, and the US and private entities that own much of this infrastructure aren't prepared, argues Air Force Lt. Col. Michael Myers. Cyberinsurance is one component of preparation, but it needs to be accompanied by government backups of components such as transformers, Myers writes.
The Hill (2/14) 
LinkedIn Twitter Facebook Google+ Email
Report: Most cyberattackers in Q4 sought financial benefits
Seventy-three percent of cybercriminals launched attacks this past quarter because of financial motivation, a Positive Technologies report states. Malware was the leading form of attack.
eWeek (2/14) 
LinkedIn Twitter Facebook Google+ Email
Survey: Executives don't pay enough attention to breaches
Most business leaders don't fully understand or follow news-making data breaches, a CA Veracode survey has found. That means security officials need to show how such attacks are possible in their organizations and explain what that would mean for executives, writes Chris Wysopal.
CSO/IDG Contributor Network (2/15) 
LinkedIn Twitter Facebook Google+ Email
Spotlight on Education
How higher-ed IT can combat network "zombies"
To properly secure networks, higher-education IT professionals should track down "zombie" machines still in operation, plus check the security of devices such as printers and other unsecured devices, says Curt Carver, vice president and chief information officer at The University of Alabama at Birmingham. IT leaders must proactively address vulnerabilities and work to educate those on campus about security, experts suggest.
University Business magazine online (2/15) 
LinkedIn Twitter Facebook Google+ Email
Managing Data
FedEx says no sign unsecured customer records were misused
Research company Kromtech says it discovered unsecured customer records this month on a server from a defunct FedEx acquisition. "We have found no indication that any information has been misappropriated and will continue our investigation," says Jim McCluskey of FedEx.
Reuters (2/15) 
LinkedIn Twitter Facebook Google+ Email
Government Security
US, UK call out Russia for NotPetya attack
The White House and the British government on Thursday criticized Russia for last year's NotPetya cyberattack; FedEx said the attack caused it $300 million in damages.
CNN (2/15) 
LinkedIn Twitter Facebook Google+ Email
Because I cannot do everything, I will not refuse to do the something that I can do.
Edward Everett Hale,
writer and clergyman
LinkedIn Twitter Facebook Google+ Email
Sign Up
SmartBrief offers 200+ newsletters
Learn more about the SmartBrief audience
Subscriber Tools:
Contact Us:
Advertising  -  Dena Malouf
Editor  -  Susan Rush
Mailing Address:
SmartBrief, Inc.®, 555 11th ST NW, Suite 600, Washington, DC 20004
© 1999-2018 SmartBrief, Inc.®
Privacy policy |  Legal Information