Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Motor industry faces growing threat of cybersecurity attacks
04/30/2018

In the summer of 2015, the motor industry was rocked by a series of high-profile car hacks that remotely unlocked car doors, turned on windscreen wipers, interfered with steering and even stopped a Jeep Cherokee in its tracks on the highway.

The industry already knew that any device with an internet connection could be hacked and that as cars became increasingly connected they could easily become a prime target for those with malicious intent. Despite this, many automakers were slow to secure their vehicles and the audacity of the Jeep hackers – who reportedly spent three years developing their technique – caught people on the hop and led to the recall of 1.4 million vehicles in the United States.

This incident, which auto analyst IHS Markit estimates cost Fiat Chrysler $45.5 million (€37 million), exposed a major vulnerability and underlined the extent to which the auto industry was trailing consumer electronics when it came to security.

Less Than Half Of Companies Detected Threats In the First Hour
04/27/2018

A new survey shows that less than half of all organizations are able to detect a major cybersecurity incident within one hour, while less than one-third said that even if they detected a major incident, they would be unable to contain it within an hour.

The data comes from LogRhythms annual benchmark survey, Cybersecurity: Perceptions & Practices, which surveyed 751 IT decision makers in the United States, United Kingdom, and Asia-Pacific regions.

Lawmakers look to boost Energys cybersecurity role
04/25/2018

To protect the energy sector and other critical infrastructure against cyber threats, lawmakers are looking to boost the Department of Energys cybersecurity role and questioned the future role of its new cybersecurity office.

Five cybersecurity trends to watch
04/23/2018

The year 2017 was plagued by cybersecurity disasters, from Verizon accidently leaking the names, phone numbers and PIN codes of as many as 14 million customers to Equifax exposing sensitive personal information of nearly half the U.S. population. The year 2018 is not shaping up to be much better with Dell reporting in January a security flaw potentially impacting almost all of its processors stretching back a decade. As cybersecurity incidents continue to make news headlines throughout the year, here are a list of trends to keep an eye out for.

Cybersecurity skills lacking in the legal sector
04/20/2018

According to a new assessment, while legal services are embracing new technologies the legal profession is lacking the necessary skills to ensure good cybersecurity practices are in place. Greater investment in resources is also required.

According to a new assessment, while legal services are embracing new technologies the legal profession is lacking the necessary skills to ensure good cybersecurity practices are in place. Greater investment in resources is also required.

The assessment comes from Lewis Slaney, writing from the website Threat Management. Slaney notes how legal practices process considerable volumes of sensitive and private information, which makes them a key target for cybercrime. He also notes that the number of attacks appears to be on the rise and that attacks are becoming more sophisticated.

Why Cybersecurity Is About More Than Prevention-Focused Products
04/18/2018

Breaches of Equifax, HBO and Uber made headlines in 2017, and 2018 will have its own share of high-profile breaches. As the threat landscape continues to evolve, cybercriminals are becoming more creative and expanding their attack vectors. The industry spends billions trying to protect against every imaginable threat, but experts tell you that, no matter how much you spend, it's never enough.  

The mistake most companies make is that they focus solely on security products, thinking: "If I have this product, then I am safe." The reality is that a security product focuses on only one attack vector (e.g., email), but you need to think about more than just email to truly be safe. But where to start? There is an endless supply of products and services available for every known vulnerability and attack vector a company could possibly have. In other words, without knowing better, a company could spend everything down to its last dime on cybersecurity.

National Cyber Security Centre warns UK Government and power companies of Russian threat
04/16/2018

UK Government departments have been issued guidance over possible Russian cyber attacks on key British infrastructure.

The National Cyber Security Centre (NCSC), a branch of intelligence agency GCHQ, has issued advice to key organisations on boosting security and improving cyber defences, according to reports.

Officials from the NCSC have warned the National Grid, major power companies, the Sellafield nuclear power plant and NHS hospitals to prepare for possible action from Vladimir Putin's government, including cyber attacks that cause a blackout or theft of data.

It comes after the Kremlin announced tit-for-tat expulsions of British diplomats in response to prime minister Theresa May's decision to kick out 23 Russian embassy staff.

Dispelling The Fantasy That Cybersecurity Is Sexy
04/13/2018

The news is awash with stories of presumed Russian hackers leaking secrets and unleashing bot armies on social media to spread misinformation, manipulate public opinion and swing the outcomes of elections in the U.S., Europe and elsewhere. The collective imagination is captivated by the conception of shadowy criminals conspiring to take down major corporations from hidden parts of the internet.

How to Improve Federal Cybersecurity Efforts
04/11/2018

Last year was another banner year for cyber hackers and bad actors. A recent report found that the number of data breaches reached 1,202 in 2017—a 50 percent increase since 2015. Breaches on both public- and private-sector networks resulted in millions of Americans having their personal and financial data compromised. The private sector was particularly hit hard with the massive Equifax data breach impacting 145.5 million people. But federal agencies also continue to face major challenges. The Transportation Security Administration and the National Security Agency both experienced serious breaches, even as the federal government has taken steps in recent years to help prevent such successful attacks. These ongoing cyber breaches suggest agencies aren’t doing all they can within the established cybersecurity frameworks and initiatives that abound across government today. The public sector can, and should, play a larger role in helping ensure massive breaches like those at Homeland Security Department, Office of Personnel Management and even Equifax don’t happen again.

Cybersecurity in the Cloud Era
04/09/2018

As CFOs assume greater responsibilities for operational risk management, it is critical to understand security, privacy, and compliance controls. Here is the practical guidance needed to minimize cybersecurity risk with cloud vendors.

Cybersecurity is top of mind for CFOs. Nearly two-thirds of CFOs in a recent study said they are now taking on responsibility for operational risk management and mitigation—and elements of cybersecurity are a big part of that.

The 2015 Cost of Data Breach Study by IBM and the Ponemon Institute found that the typical total cost of a breach was around $3.8 million, an increase from $3.5 million the year before. Putting aside damage to brand and reputations—which can be substantial—the impact on customer trust, and in turn acquisition and retention as well as market value, all add up.

You Do Care About Cybersecurity, But That Is Not the Problem
04/06/2018

As Lawfares survey indicates, adoption of voluntary cybersecurity measures is low. The survey shows that use of encryption on personal devices, anonymous browsers and password managers is less than 20 percent. But other data show that this might be a reflection of how difficult or inconvenient it is to set up and use these measures, as opposed to a lack of concern about consequences.

The Global Cyber Alliance conducted a survey in the fall of 2017. In a poll of 1,000 U.S. consumers:

Only half can determine if a website is legitimate and safe;

35 percent have stopped an online purchase because of security fears;

27 percent said the fear of online scams causes excessive worry; and

Only 16 percent fear a burglar more than a hacker stealing personal information.

The results were similar, if a bit less dire, in the Global Cyber Alliance’s survey of 611 U.K. consumers.

Cybersecurity By The Numbers: Market Estimates, Forecasts, And Surveys
04/04/2018

What is the state of the cybersecurity industry and practice today? Recent surveys and analysis provide fresh insights, from senior management and board of directors not taking cyber threats seriously enough, IoT and mobile security deficiencies, the perennial cybersecurity skills shortage, new types of attacks on consumers and businesses, and the increasing threat of a global cyber war.

These old and new cybersecurity challenges make 2018 yet another year of more of everything.

The Evidence Is in the Numbers: We Need More Cyber Security Professionals
04/02/2018

The digital revolution is here. With technology playing an increasingly significant role in everyday life, the world becomes more and more connected through, and dependent upon, computers. Mobile technology, the Internet of Things, machine learning, and the cloud, just to name a few, all mean opportunity and possibility for businesses, professionals, and society but also for criminals looking to capitalize on vulnerabilities. As we focus on innovation and advancement in technology, we must also focus just as intently on the mitigation of cyber crime, which requires an experienced and educated workforce ready to fill the thousands of open cyber security roles across the nation.




Current Blog

2018


May Arhive

April Archive

February - March Archive
January Archive

2017
Nov/December Archive

October Archive

September Archive
August Archive
April Archive
March Archive

February Archive
January Archive

2016 Security Blog Archive
November /December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2015 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2014 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
Jan & February Archive

2013 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.