View Post

Move Over GDPR, NIS is the Gorilla in the Room

In Blog post by Sam Coleman0 Comments

The new acronym has a far greater impact for cybersecurity than the privacy focussed GDPR act. The legislative armageddon known as the General Data Protection Regulation or GDPR is fast approaching this May with the financial consequences for non-compliance (up to 4 percent of worldwide total) causing a fair amount of justified alarm. But however important that new legislation is, another critical and impactful legislation that some say will have even greater impact is on the horizon, especially in the realm of cybersecurity. That law is The Network and Information Security (NIS) Directive which has as its focus securing critical infrastructure and creating a regulatory climate that creates urgency for cybersecurity defences. …

View Post

Putting its money where its mouth is: Verizon goes all in with a USD 10 bln cost cutting commitment using virtualisation

In Blog post by Sam Coleman0 Comments

As everyone in both the telecom and security industries know, virtualisation is a Holy Grail for both performance and cost savings. Verizon bets on the latter to give it a multi-billion payback. John Stratton, EVP & president of global operations for Verizon, knew that the room was filled with anxious investors, wanting to know how the telecom was planning to stay competitive in one of the most contested spaces in business. The telecom business, squeezed by price competition, pushed to deliver its services faster and with better QoS, is looking for the data revolution of 5G to buoy its market, all the while demanding bold moves and initiatives to deliver …

View Post

The non-nuclear North Korea could be as deadly as the nuclear one

In Blog post by Sam Coleman0 Comments

With mounting evidence pointing to the hermit kingdom as a nation state cybercriminal, experts wonder which battlements Kim Jong Un is wiling to use: cyber weapons or nuclear ones? Some say the tipping of the North Korean cyber army’s hand was a slight that the temperamental Dear Leader 2.0 could not let stand. In 2016, irreverent and sacred cow slayer Seth Rogan and wingman James Franco produced the filmic stocking stuffer The Interview, a spoofing comedy where Kim Jong Un is seen as a needy, petulant dictator who’s head is ceremoniously and to comic effect blown off. Had it not been for North Korea’s covert cyber reaction, the film would have …

View Post

Of Artificial Intelligence and Machine Learning: how cybersecurity needs to know the value of each to get the best of both

In Blog post by Sam Coleman0 Comments

Recent discussions within the security community point to a need to understand this two fields to apply them affectively. The increasing drumbeat of machine learning (ML) and Artificial Intelligence (AI) as it affects cybersecurity is growing, a fact that was easily seen at the recent Black Hat 2017 gathering. Of the vendors and solutions present, on the lips of many of the presenters in a myriad of sessions, AI and ML were liberally thrown about and bandied as the future of cybersecurity. And while there’s no doubt that the two technologies will be more pervasive and disruptive to the security field, it’s also true that they’re greatly understood, even in …

View Post

Summer is here and the kids are… cybersecuring?

In Blog post by Sam Coleman0 Comments

As a growing cybersecurity talent gap emerges, governments and industry recruit tomorrow’s cyber defenders at an ever younger age. Elizabeth Lewelling is—at first glance—your typical all American kid. She’s gregarious and confident, a seasoned pro as a Girl Scout, not afraid to knock on doors to sell thin mints nor be in the wilderness to get her survival badge. But these months, she’ll be participating in an all together different activity than what most people expect Girl Scouts or any young person to be doing during the hot lemonade days of summer. She—along with 1.8 million Girl Scouts—will be shooting for the latest badge offered by the Scouts: one in …

View Post

A breach of (public) trust?

In Blog post by Sam Coleman0 Comments

Two massive political fallouts—one European, one Asian—show that the tolerance for data mishandling is zero. And when GDPR arrives, the repercussions will be financial as well. This week, the Swedish government barely managed to survive one its most serious challenges. A vote of no confidence was mounted against three ministers by the opposition that—in normal situations—would’ve triggered snap elections and the government stepping down. But instead the Social Democratic government punted and did a cabinet reshuffle with two ministers exiting their jobs and the defence minister in peril. What was the trigger? Data sloppiness. The Swedish Transport Agency had given a contract to IBM to handle its data needs into …

View Post

The USD53 billion dollar threat

In Blog post by Sam Coleman0 Comments

WannaCry’s estimate of USD8 billion was a tiny fraction of what Lloyd’s of London sees as the next cost of cyber catastrophe… one that rivals hurricane Katrina in financial damages We’re used to screaming headlines of doom as we march to an increasing digitally connected world. Passwords hacked and identities stolen, ransomware, IoT DDoS, election hacking and critical infrastructure hacks fill the media on an almost deadly basis. But sometimes it takes hitting the global pocketbook to get a sense of the magnitude of cyber complacency. For that, there are few better bellwethers than the most iconic name in risk insurance, Lloyds of London. And their latest report, issued July …

View Post

Getting a bad reputation? IP reputation is the answer

In Blog post by Sam Coleman0 Comments

As Clavister launches its new IP reputation feed, powered by Webroot®, we caught up with Chad Bacher, SVP of Product Strategy and Technology Alliances at Webroot to get his views on the new cyber realities and why keeping a healthy network starts from the outside as much as inside. DeCrypted News: You’ve mentioned that the threat from cyberthreats— for the first time in years — is decreasing. Can you elaborate on the reasons why it’s decreasing and is it temporary?  Chad Bacher: For the first time, we witnessed a minor year-over-year decrease in the volume of malware. In part, the decline can be attributed to the increased security awareness, but …

View Post

The end is just the beginning

In Blog post by Sam Coleman0 Comments

The global attack of Wannacry ransomware last week was unprecedented. But that was just the opening salvo for this ShadowBrokers cyber weapon as new variants are already worming their destructive paths into systems. How did we get here and what happens next? The toll we know of is devastating enough. Over the weekend of May 12-14, when the ransomware know known as WannaCry (with others calling it Wana, WanaCrypt etc) was awoken, 200,000 machines across 150 countries had been hit. Its chilling message of pay €300 in bitcoins or lose all data on the now encrypted machine a textbook example of how ransomware behaves, pushing the term into the global vocabulary …

View Post

The NFV revolution kicks into high gear

In Blog post by Sam Coleman0 Comments

As the benefits of SDN/NFV take the market by storm, a recent Red Hat Telco Partner Summit points to the groundwork that still needs laying, with security concerns a major aspect. What had started as a slow whispering of a compelling technology and its solutions for telecom operators has now – after the initial analysis of business impact for first tier operators – is getting commitments from most of the companies surveyed according to Red Hat market research. According to Red Hat, a leader in the DevOps, Linux and OpenStack Platform (OSP) space, tier one operators reported the following. 50% of the Communications Service Providers (CSPs) already execute a NFV …