5 Key Cybersecurity Threat Trends in 2023

Cybersecurity Threat

Cyber security is a fast-moving sector, as both hackers and cybercriminals providers vie to outsmart each other. Cyberattacks are launched against organizations every day. Financial losses from cybercrime exceed the total losses incurred from the global trade of all illegal drugs. Aside from financial losses, such forms of cyber-attacks can lead to reputation damage as well. There are many varieties of cyberattacks that happen in the world today. In this video, we take you through some of the five key cybersecurity threats organizations need to be aware of including:

1. As prominent ransomware groups such as LockBit continue to offer evolving products with targeted services, vulnerabilities have reduced in quantity whilst increasing in severity. In fact, last year, several vulnerabilities accounted for some of the biggest threats faced by organizations.

2. A Structured Query Language injection attack occurs on a database-driven website when the hackers manipulate a standard SQL query. An SQL query is a request for some action to be performed on a database, and a carefully constructed malicious request can create, modify or delete the data stored in the database.

3. Threat actors monetized criminal services to great success in 2022. Multi-factor Authentication (MFA) is a common security practice, and threat actors are turning to OTP bypass services to circumvent this layer of security. This area of the underground ecosystem will likely grow as demand increases for these services in the future.

4. World events have further complicated the threat landscape, with Russia’s invasion of Ukraine acting as a catalyst for further polarization of the underground. The most prolific threat to date has been KillNet, a pro-Russian group that gained notoriety through orchestrating distributed denial of service (DDoS) attacks against pro-NATO countries and organizations. A DDoS attack is when attackers use multiple compromised systems to launch this attack.

5. The use of information-stealers will continue into 2023; since the beginning of 2022, there has been a substantial uptick in offering when compared to the same period of 2021.

The post 5 Key Cybersecurity Threat Trends in 2023 appeared first on Analytics Insight.

Hacking is Useless in Quantum Cryptography

Hacking

Quantum mechanical techniques not only allow for the development of faster algorithms but also strong cryptography

There is a wealth of really private information on the Internet. Such content is typically protected from interception and reading thanks to sophisticated encryption mechanisms. High-performance quantum computers, however, could quickly decrypt these keys in the future. Therefore, it is fortunate that quantum mechanical techniques not only allow for the development of new, much faster algorithms but also extremely strong cryptography.

Quantum key distribution (QKD) is secure from attacks on the communication channel but not from attacks or alterations of the devices themselves. Therefore, the gadgets may output a key that the maker had previously saved and could have theoretically sent to a hacker.

There are various methods for exchanging quantum mechanical credentials. Either coupled quantum systems are used, or light signals are conveyed from the transmitter to the receiver. Two rubidium atoms that were quantum mechanically entangled were employed in the current experiment. They were located in two laboratories on the LMU campus, 400 meters apart. A 700-meter fiber optic cable that connects the two places runs underneath Geschwister Scholl Square in front of the main structure.

The researchers initially use a laser pulse to stimulate each atom to produce entanglement. The atoms then return to their ground state on their own, emitting photons as they do so. The rotation of the atom is coupled with the polarization of its released photon as a result of the conservation of angular momentum. Joint measurement of the photons at the reception station, when the two light particles arrive after traveling over the fiber optic cable, reveals an entanglement of the atomic quantum memory.

By contrast, security is only assured with conventional QKD approaches when the quantum devices utilized have been appropriately defined. Tim van Leent, says that users of such protocols “had to rely on the specifications supplied by the QKD providers and believe that the device will not transition into another operational mode during the key distribution.”

It was restricted in the current configuration by the loss of around half the photons in the fiber connecting the laboratories. In additional tests, the researchers were successful in reducing the photons’ wavelength to a low-loss range appropriate for telecommunications. They were able to extend the quantum network connection’s range to 33 kilometers in exchange for a small amount of additional noise in this method.

The post Hacking is Useless in Quantum Cryptography appeared first on Analytics Insight.

5 Things You Need to Know About Phone Hacking

Cybercriminals

Modern smartphones come with a lot of features and can handle most tasks that were initially preserved for computers. For instance, you can run applications with your smartphone, browse the internet, and even connect to networks, among others.

This has led to the growing popularity of smartphones worldwide. Unfortunately, they have become a target for cybercriminals looking for access to their victim’s data. They are even used when gaining access to systems used by other organizations.

For example, cybercriminals are using smartphones when hacking institutions such as banking institutions. They send messages using their victim’s phones authorizing access to the institution’s information. Learning about phone hacking and the things hackers can do is important to ensure that you are protected.

Here are a few things you need to know;

How to Spot if a Phone Has Been Hacked

The most important thing you need to know is how to spot if your phone has been hacked. This is essential in helping you get rid of the hackers before they can steal valuable information from the phone.

If you notice things like faster battery drainage, faster data usage, sluggish performance, suspicious pop-ups, poor network connections, and unauthorized texts or calls, then your Android phone may have been hacked.

You can take different measures to secure your phone. One of them could be downloading a security app from your app store. You can also change all your passwords, uninstall any suspicious applications, or factory reset the phone.

Hackers Can Learn About Your Computer’s Pressed Keys

This is something that most smartphone users do not know. Modern phones come with a tilt detector that flips your phone depending on how you are holding the phone. This feature has advanced to include a more complicated sensor known as the accelerometer.

Once your phone has been hacked, cybercriminals can use this sensor to read your computer’s keyboard vibrations when you are typing. However, the phone has to be placed near your computer.

With this, the hackers can use mathematical algorithms, and the information obtained using the sensors to calculate your key presses and gain access to sensitive information. This could be your passwords, bank accounts, and other details.

Hackers Can Steal Your Money

Zip, PayWave, Fitbit Pay, Apple Pay, and Android Pay are some of the modern and most popular modes of payment we have today. We are all talking about contactless cards and how they are transforming the financial industry.

They come with RFID (Radio Frequency Identification Chip) which makes it easier for people to shop online. However, since thieves cannot pickpocket from you now, they have also advanced in technology and are doing so digitally.

Hackers use NFC (Near Field Communications) that comes with modern phones to read and transmit your RFID information once they hack your phone. They will also scan for any RFID credit cards and use this information for purposes of cloning your credit cards. You might end up losing a lot of money without knowing. This is one of the cybercrimes to beware of in the digital world.

Hackers Can Use Your Phone to Hack Others

Did you know that hackers can use your phone to hack other phones or system applications after gaining control of the phone? Well, the first step is usually hacking your phone. After that, they will control it and can send messages, emails, or even make calls.

They can send spam and malware from your phone to your contacts, ensuring that the recipients cannot identify the original source of the malware. If one of these contacts loses sensitive information or is impersonated, you will be responsible.

This kind of attack is known as a DDoS (Distributed Denial of Service) attack. It makes it possible for hackers to launch targeted attacks. You can avoid these kinds of attacks by securing your networks, using VPNs, and installing applications from known sources.

Hackers Can Map Your House

Technology advancements have led to the development of thousands if not millions of mobile applications. Today, you can get a mobile app for almost everything, ranging from communication to socializing, transportation, food, and leisure, among others.

Some people will download applications without even checking the source of the app or what the app can do. This is a mistake committed by smartphone owners. They do not know that such applications can be a gateway for cybercriminals to gain access to their personal lives.

But how? Some of these applications come with a hidden camera feature that can take videos and photographs when invoked by the hacker. They will learn everything about you before they strike with blackmail and other criminal demands.

Knowing all these things is important when it comes to creating awareness about phone hacking. It will also help you protect yourself from cybercriminals.

The post 5 Things You Need to Know About Phone Hacking appeared first on Analytics Insight.

NASA’s James Webb Telescope is the Trending Malware Carrier

NASA

NASA’s James Webb Space Telescope captures images of thousands of never-before-seen young stars in the Tarantula Nebula.

A “giant space tarantula” has been caught by NASA’s powerful James Webb Telescope. At 161,000 light years away from Earth in the Large Magellanic Cloud galaxy, the Tarantula Nebula is the nickname for 30 Doradus – the largest and brightest star-forming region in the Local Group, the galaxies nearest our Milky Way, according to NASA’s Jet Propulsion Laboratory. The National Aeronautics and Space Administration (NASA) launched the James Webb Space Telescope (JWST) on December 25, 2021, and the first set of images taken by the powerful telescope was released in July 2022. Cybersecurity officers have identified a unique attack where hackers are exploiting a hugely popular deep space image taken from NASA’s James Webb telescope to infiltrate computers with malware.

A newly-discovered hacking campaign is exploiting an image from the James Webb Telescope to infect targets with malware. Securonix Threat research team has identified a persistent Golang-based attack campaign, that incorporates an equally interesting strategy by leveraging the deep field image taken from the James Webb and obfuscated Golang (or Go) programming language payloads to infect the target system with the malware.

“Initial infection begins with a phishing email containing a Microsoft Office attachment. The document includes an external reference hidden inside the document’s metadata which downloads a malicious template file,” said the researchers.

The James Webb Telescope has managed to clear out the dusty filaments in the picture that was earlier used to cover the whole observation. In addition to weeding out the dusty filaments, the telescope has also managed to pick up distant background galaxies.

The United States Postal Service is releasing a stamp celebrating @NASAWebb this week. Officials from @NASA and @USPS will dedicate the stamp at a ceremony open to the public on Sept. 8 at 11 am ET at the @PostalMuseum.

https://go.nasa.gov/3qmB1tr

~@NASAGoddard

“Take a moment to stare into the thousands of never-before-seen young stars in the Tarantula Nebula. @NASAWebb reveals details of the structure and composition of the nebula, as well as dozens of background galaxies,” the US space agency wrote on Instagram while sharing a mesmerizing image of the “space tarantula”.

Scientists can also figure out the details of the structure and composition of the nebula’s gas and dust from these images. The most active regions in the image show sparking young stars in pale blue, while there are also embedded red stars. Webb has also viewed this image from a different perspective using Mid-Infrared Instrument (MIRI), focusing more on dust and glowing gas and showing an abundance of hydrocarbon light in blue and purple, while the hot stars fade in the background.

“Nicknamed the Tarantula Nebula for the appearance of its dusty filaments in previous telescope images, the nebula has long been a favorite for astronomers studying star formation,” NASA said in a statement as it released the latest pictures.

Tarantula is home to some of the hottest and most massive stars known to the human race till now. This star-forming region is situated in the Local Group, the galaxies nearest to our Milky Way. Webb operates primarily in the infrared spectrum because light from objects in the distant cosmos has been stretched into this wavelength over the course of the universe’s expansion. Tarantula Nebula is one of the brightest star-forming regions nearest to our Milky Way neighborhood. It is the hub of the most massive and hottest stars we have known. Another reason Tarantula Nebula has been a topic of interest is that it features a similar chemical composition as the enormous star-forming regions observed at our universe’s Cosmic Noon, a theory, that talks about the history of the universe and how the formation of galaxies occurred.

The telescope’s primary imager, the Near-Infrared Camera (NIRCam), found the cavity in the center of the nebula was hollowed out by radiation carried on stellar winds emanating from a cluster of massive young stars, which appear as pale blue dots. Webb’s Near-Infrared Spectrograph (NIRSpec), which analyses light patterns to determine the composition of objects, caught one young star in the act of shedding a cloud of dust from around itself.

“However, NIRSpec showed that the star was only just beginning to emerge from its pillar and still maintained an insulating cloud of dust around itself. Without Webb’s high-resolution spectra at infrared wavelengths, this episode of star formation in action could not have been revealed,” the space agency said.

The post NASA’s James Webb Telescope is the Trending Malware Carrier appeared first on Analytics Insight.

Xiaomi’s CyberOne, A New Humanoid Robot to Fight TeslaBot

Humanoid-Robot

A humanoid robot named CyberOne appears prepared to take on Tesla Bot. At a gathering on Thursday, August 11, in Beijing, Xiaomi CEO Lei Jun and CyberOne made an appearance on stage.

An exciting and developing area of research, humanoid robotics has attracted a lot of interest recently and will continue to be essential to 21st-century robotics studies and numerous applications. The understanding of human-like information processing and the underlying mechanics of the human brain in dealing with the real environment is one of the common difficulties handled in humanoid robots, regardless of the application area.

This week, Xiaomi unveiled CyberOne, a humanoid robot that appears ready to challenge Tesla Bot. Standing 1.77 meters tall and weighing a substantial 52 kg, CyberOne appeared on stage with Xiaomi CEO Lei Jun at a gathering in Beijing on Thursday, August 11. Before presenting the boss with a crimson flower, the robot lumbered up to Jun. It was unclear why CyberOne was doing this, but it was probably to show that its mitten-like hands can successfully grip a variety of objects.

Xiaomi’s first robot since CyberDog launched into a cool Kung Fu move after Jun accepted the flower, but it decided against decking the person who had given the go-ahead for its development. Before anything terrible could happen to the prototype, Jun took a photo with CyberOne and expressed his happiness at still being alive. This ended the introduction.

On Xiaomi’s YouTube page, a more dramatic film showcasing CyberOne was posted, but in it, the robot spends most of its time strolling as if it’s in urgent need of the restroom — and falls, too. No, it is not yet as agile as Boston Dynamics’ Atlas robot, which can flip around. CyberOne can sense 3D space and recognize people, gestures, and expressions thanks to an MI-Sense depth vision module and an AI interaction algorithm, Xiaomi stated in a statement. This “allows it to not only observe but to understand its environment.”

Many humanoid robots that can move and carry out well-designed activities have been developed thanks to significant advancements in humanoid research. A promising range of science and technology that will eventually lead to the creation of highly developed humanoid mechatronic systems with extensive and intricate sensorimotor capabilities has arisen during the past ten years in the field of humanoid research.

The robot can also distinguish 45 different categories of human emotion in addition to 85 different sorts of environmental sounds, according to the report. Although the company doesn’t say how CyberOne can also recognize happiness and “comfort the user in times of grief.” According to CyberOne, “all of these functionalities are included in the processing units, which are combined with a curved OLED module to display real-time interactive information.”

CyberOne has a lot in common with Tesla Bot, a robot introduced by Tesla CEO Elon Musk last year. At the time, the flamboyant businessman declared that Tesla Bot will be used to “remove risky, uninteresting activities” from the workplace. This year, a prototype is anticipated to debut. Xiaomi’s robot is similar to others like Honda’s Asimo and SoftBank’s Pepper, which both perished in the big robot cemetery in the sky. Hopefully, CyberOne won’t suffer a destiny as sad.

What Xiaomi has in store for CyberOne is unclear, and based on the information in a tweet given by Jun on Thursday, neither is Xiaomi. According to Jun’s essay, “The story of CyberOne is one of setting off on a new adventure of exploration in the field of intelligent robotics.” Although there is still a long way to go, we never lose hope that something fantastic is about to occur.

The post Xiaomi’s CyberOne, A New Humanoid Robot to Fight TeslaBot appeared first on Analytics Insight.

If Cybercrime was a Country, it Would be the Third Largest Economy: Report

CybercrimeCybercrime is predicted to be the world’s third-largest economy after the U.S. and China

As organizations go digital, so does crime. Today, cybercrime is a massive business in its own right, and cybercriminals everywhere are clamoring to get a piece of the action as companies and consumers invest trillions to stake their claims in the digital universe. According to Cybersecurity Ventures, cybercrime is predicted to inflict damages totaling USD 6 trillion globally in 2021 would be the world’s third-largest economy after the U.S. and China. Cybercrime as a country, therefore, would be far ahead of India, which is ranked fifth in the economy.

Cybercrime is a growing concern and also less risky than committing traditional crimes such as bank robbery, etc. According to some cybersecurity reports, we can expect global cybercrime costs to grow by 15 percent per year over the next five years, reaching USD 10.5 trillion annually by 2025, up from USD 3 trillion in 2015. This amount would be larger than the damage inflicted from natural disasters in a year, and more profitable than the global trade of all major illegal drugs combined. This represents the greatest transfer of economic wealth in history and cyberattack risks making a case for incentives for innovation and investment.

Cybercrime would be the third largest economy:

Organized crime gang hacking activities and a cyberattack surface will be an order of magnitude greater in 2025. In fact, in terms of earnings, cybercrime puts even Tesla, Facebook, Microsoft, Apple, Amazon, and Walmart to shame. Their combined annual revenue totals just $1.28 trillion. Today’s cybercriminals are more polished. Cybercriminals evaluate the risk and rewards of their ventures to maximize their gains, negatively impacting the world’s economy with the business losses they trigger.

With the Covid-19 pandemic which has pushed the entire world into a global work-from-home experiment, more employees than ever in history are working from home – and as the majority of this work relies on the Internet to stay connected, and official documents, files which usually have restricted permission become a lot more privier to hacking as they go online. Cybercrime doesn’t just strike the usual suspects like servers and computers.

The cybercrime markets have also split up into groups as the bad guys take pains to gather in secretive, exclusive discussion boards to avoid scrutiny from police and fraudsters. This implies that global cybercrime costs had already surpassed the size of the Indian economy a few years ago. The value of a business depends largely on how well it guards its data, the strength of its cybersecurity, and its level of cyber resilience.

The post If Cybercrime was a Country, it Would be the Third Largest Economy: Report appeared first on Analytics Insight.

Microsoft is on a Mission to Make Cybersecurity Pros Earn in Six Figures

Microsoft

Microsft is hoping to reduce the gap related to cybersecurity skills, here’s how

Companies like Booz Allen Hamilton report the annual earnings of entry-level cybersecurity employees to be around US$150,000. The median base compensation for chief information security officers, which typically requires a master’s degree, is US$584,000, according to a survey by Heidrick & Struggles. Despite steep demand and six-figure salaries, only 3% of U.S. bachelor’s degree-holders have cybersecurity-related skills, Cybersecurity Ventures reports. This skills gap is what Microsoft is hoping to change by honing in on the lack of diversity in the computing and cybersecurity fields. Among cybersecurity specialist jobs, 83% of these roles are held by men and 72.6% by white people.

How Microsft is Reducing the Skill Gap?

In 2021, Microsoft launched its cybersecurity skills initiative, which included the company giving US$150 million to federal, state, and local governments to support upgrading government agencies’ cyber protection and committing to spending US$20 billion on advancing their security solutions over the next five years. The initiative also included a large-scale effort to support cybersecurity education.

Like many industries within tech, cybersecurity is facing both a workforce shortage and a widening skills gap among workers. According to Kate Behncken, vice president and head of Microsoft Philanthropies, citing research by Cybersecurity Ventures, by 2025 there will be 3.5 million cybersecurity jobs open globally. Microsoft originally launched the skilling campaign in the U.S. last fall, partnering with 135 community colleges to skill and recruit workers into the cybersecurity industry.

By expanding skilling and training to 23 countries, Microsoft aims to get ahead of the demand. The countries, which include Australia, Brazil, Canada, and India, were chosen due to their “elevated cyber threat risk.”

The company plans to work with the countries’ local schools, nonprofits, governments, and businesses to develop skilling programs. The goal is to fit the unique needs of each market.

The almost two dozen countries were also identified as markets that have a significant gap in their cybersecurity workforces, unable to keep up with the demand and diversity in the field. “In the countries where we are expanding our campaign, on average, only 17% of the cybersecurity workforce are female,” Behncken wrote in her blog post announcing the news.

Microsft Invests in Community Colleges and Schools

Microsoft is making major investments in the U.S. community colleges – an often overlooked asset. Community college students are typically diverse and affordable. They’re also all over the country, and they meet the needs of students of all ages. So, Microsoft’s four-year campaign is committing to a few things.

Microsoft is giving every U.S. community college access to free curriculum, educator training, and teaching tools. The resources will align with certification course materials for Microsoft.

But just because you get the curriculum doesn’t always mean you have the staff to teach. So, Microsoft is working with the colleges to train and retain their cybersecurity faculty. And community colleges that are accelerating their cybersecurity programs will receive grants and technical assistance too.

One of the key benefits of taking cybersecurity education to community colleges is that it offers affordable education options to a diverse talent pool. Diversity is truly a force multiplier in understanding the people behind cyber problems. And Microsoft is offering scholarship programs for at least 25,000 students for the next four years. The funding is intended to supplement existing federal and state financing programs, and it can be used to cover various financial barriers to education – like childcare.

The post Microsoft is on a Mission to Make Cybersecurity Pros Earn in Six Figures appeared first on Analytics Insight.

Cybersecurity is a Step Away from Entering Ed-tech, Thanks to Lack of Funding

Cybersecurity

Cybersecurity tops the list of State Ed-tech priorities but it is running short of funds: Survey

In this growing trend of artificial intelligence and machine learning, more and more things surrounding us are automated. No doubt it lands with numerous benefits for mankind but in this play of data, cybersecurity is gaining a big concern and companies are handling it with priority.

Cybersecurity has become a priority for top state ed-tech, but it seems they are running in lack of funding for it, a survey of education technology and digital learning leaders from US state education agencies reveals that. As students return to another school year impacted by the COVID-19 pandemic, a new report drops light on how state education agencies and policy-makers are redesigning for an increasingly digital learning, post-pandemic world. The 2022 State EdTech Trends Survey Report, declared by the State Educational Technology Directors Association in collaboration with Whiteboard Advisors, brings out the results of SETDA’s flagship annual State EdTech Trends Survey of ed-tech directors, state superintendents, chiefs of staff, and other senior state officials from all 50 states, the District of Columbia, the Department of Defense Activity (DoDEA), and the Northern Mariana Islands.

The report survey on basis of interviews with leaders in several states spotlights their attempts to adopt digital learning. “Our job at the state is to advocate for what districts need and to promote our mentality that we are all in this together to help our students achieve,” mentioned Rob Dietrich, Senior Director of Teaching and Learning at the North Carolina Department of Public Instruction. “This survey is so important because it shows the first attempt to record the shifts taking place in state education agencies as they adapt to a digital world,” commented Jhone Ebert, Superintendent of Public Instruction at the Nevada Department of Education and author of the report’s preface. “In the process of doing so, its flashlight tremendous work is going on in states across the country while also pinpointing opportunities for further discussion, collaboration, and refinement.”

As schools rapidly increase their turn to artificial intelligence technology, the risk of cyberattacks has also enlarged. Cybercriminals are getting more sophisticated by adapting upgraded techniques for fraud. State and federal lawmakers are paying attention to this problem, but according to SETDA’s survey results, there are more steps needed to overcome it. Cybersecurity is “getting a lot of recognition because you could take down a whole school, and when you take down a school, you trouble the community,” mentioned SETDA Executive Director Julia Fallon. “We’ve learned from the pandemic that closing school is a big problem. It impacts the community in negative ways.”

After unbiased internet access, cybersecurity came up as one of state ed-tech leaders’ top concerns, the survey reveals. Seventy percent of SETDA survey respondents said that their state education agency or at minimum one district in their state was the sufferer of a cyberattack in 2021. As the 2022-23 school year began, a large number of school districts have been the victim of cybersecurity attacks. In recent times, US’s second-largest school district, Los Angeles Unified, was targeted by cybercriminals over the Labor Day weekend.

Although cybersecurity is a top priority for state ed-tech leaders, it is one of the top three unmet technology requirements, the survey points out. Only 8 percent of respondents commented that their state provides “sufficient” funding to cybersecurity risk mitigation efforts; 40 percent mentioned their state allocates “very little” funding. A 54 percent of respondents admitted their state has ample initiatives or efforts related to cybersecurity. on the other hand, only 24 percent admitted that their state supplies cybersecurity tools or resources. Keith Krueger, CEO of the non-profit Consortium for School Networking (CoSN), mentioned that the SETDA survey “amplifies what we’ve undeniably been hearing from school districts.” “The attack on LA Unified indicates that state departments of education and policymakers at the state and federal level have simply not provided the resources that school districts need.”

The post Cybersecurity is a Step Away from Entering Ed-tech, Thanks to Lack of Funding appeared first on Analytics Insight.

Foreign Govts Could Feast Over Twitter’s Careless Collection of Data: Zatko

Twitter

A whistleblower testified before Congress that Twitter’s careless collection and storage of user data

A Twitter whistleblower testified before Congress that Twitter’s careless collection and storage of user data cause real harm to real people, prompting senators to grapple with Washington’s inability to effectively regulate major social networks, whose penetration of the company may have exceeded what’s currently known. The company’s cybersecurity failures make it vulnerable to exploitation. Zatko, formerly Twitter’s head of security, was characterized as having a relative lack of interest in the topic from company leadership. The Twitter company did not track who had actually gotten a look at particular information and almost always had to learn about suspected government agents from outsiders such as law enforcement.

Security failures cause real harm to real people:

Zatko alleges that Twitter makes little effort to fight spam accounts and has shockingly insufficient cybersecurity defenses. He also said the failure to track data, combined with collecting more information than was necessary, meant the company’s thousands of engineers had to be given access to a lot of user data by default just to do their jobs information.

Zatko says that puts company systems at risk and also uses information, which is a big deal because a lot of Indian activists go on Twitter to protest their government. He says Twitter is a decade behind when it comes to basic security practices. He described an executive team that was financially incentivized to ignore root problems, such as employees having too much access to data.

Twitter leadership is misleading the public, lawmakers, regulators, and even its board of directors. Twitter’s CEO Parag Agarwal says an appearance before the committee could have jeopardized the company’s lawsuit against Elon Musk, Tesla’s CEO. A judge recently gave Musk the green light to bring in some of Zatko’s allegations about spam into his claims.

The post Foreign Govts Could Feast Over Twitter’s Careless Collection of Data: Zatko appeared first on Analytics Insight.

Single-Function Products Are the Biggest Enemy for Cybersecurity Teams

Cybersecurity

Overcoming vast exploitable gaps caused by single-function Cybersecurity sprawl

As AI and ML are dominating almost all sectors around us, the future of cybersecurity is bright. For long years, organizations have obtained discrete security products, like threat detection, virtual private networks, secure email gateways, and endpoint protection, among others.

This cybersecurity sprawl of single-function products is becoming a source of serious stress for IT and security teams that are now confronted with complex and fragmented security postures. Making an effort to secure their data and IT resources, IT and security operations come across the restriction of trying to stitch together a patchwork of products. These siloed solutions can’t communicate, coalesce their data and functionally share policies, logs, or remote telemetry data.

Our Cyber and Physical Worlds Are Intrinsically Intertwined

Digital transformation is changing the face of our world. Not just 1’s and 0’s, it’s affecting our physical world, too. Technology and our physical world are now not distinguishable. Organizations should move beyond technology upliftment and advanced workflows. To preserve IT resources and customer data, there is a need for technology that eliminate vulnerable security gaps and exploitable holes. It needed to spend lesser time on manual security configurations and processes and we should dedicate more time to creating exceptional user experiences that drive personalization to transform business outcomes.

Putting an effort to manage dozens of independent security tools comes with substantial operations overhead. Technology complexity is navigating security operations to replace, by consolidation, the number of dissimilar vendor products they deploy.

Compounding cybersecurity sprawl is organizations voraciously expanding digital footprints. A large number of new attack surfaces are being revealed with the explosive adoption of numerous clouds, perform from anywhere, IoT devices, and mobile users. Organizations are compelled to abandon conventional corporate perimeters, exchanging them with distributed cybersecurity that is globally managed and controlled with multi-functional platforms. A unified cybersecurity defense is transforming a business imperative to remove exploitable security weak points caused by disparate security products and tools.

Improving Cybersecurity Forensics with A Coalesced Approach

Punctuation and the space between words serve a clear understanding of the meaning of a sentence and the intent of the author. In the sphere of cybersecurity forensics, cohesion and visibility are needed to identify anomalies, risks, and vulnerabilities that bad actors can exploit. Hackers have multiple tactics in their efforts to exploit technology flaws and human vulnerabilities. Cybersecurity enabled by artificial intelligence (AI) and machine learning (ML) can help security teams differentiate between normal and anomalous activity, while analytics offers a deep understanding of the hacker’s intentions.

Cyberattacks can include multiple stages that together comprise an attack chain. Attacks that are detected at the point of origin can be immediately killed to prevent data loss and malware that can spread across the network. Just as in our physical world, cyberattacks contain traceable evidence. Analyzing a cyberattack chain of evidence requires deep intelligence, visibility, and insights across all attack surfaces. Insightful data that have been coalesced and analyzed from multiple network entry points and across other internal attack surfaces enable investigations to rapidly prevent and mitigate attacks.

The finest way to terminate security skeletons skulking in an organization’s proverbial closet is to unify cybersecurity intelligence. This keeps the potential to deliver considerable forensic clarity by offering a single dashboard view of all attack vectors and surfaces. That single-view perspective can succinctly align the cross-connections of multiple natively integrated security functions with extensive contextual data. Applying sophisticated analytics and threat intelligence gives a view of the full context of an attack, with complete visibility across the entire chain of events.

Not only do cybersecurity solutions need to be more united, but it is also required for them to be extensible to support an open framework for interoperability. This offers them to share information with management platforms like security orchestration, automation and response (SOAR), and security, information, and event management (SIEM).

Automating Multifunctional Security Makes Organizations More Secure

Security automation permits IT and security operations to focus on strategic projects without getting bogged down with the processes underpinning their work. This makes them accomplish more and with considerable accuracy. Automating processes reduces manual steps to reduce the time required to obtain data from multiple attack vectors and attack surfaces for analysis. This can eliminate the time and effort collecting, coalescing, and analyzing cyberattacks, from hours, or even days, to just minutes.

The post Single-Function Products Are the Biggest Enemy for Cybersecurity Teams appeared first on Analytics Insight.