Biden to Issue Executive Order Upgrading U.S. Cybersecurity

President Joe Biden is working on a draft executive order to require companies doing business with the federal government to report hacks within a few days. Homeland Security secretary Alejandro Mayorkas stated the order would also require the companies to use data encryption and two-factor authentication and would combat ransomware and improve protection for industrial control systems, transportation and election security. The SolarWinds hack has prompted the government to pay closer attention to cybersecurity. Continue reading Biden to Issue Executive Order Upgrading U.S. Cybersecurity

After SolarWinds Hack, Big Tech Debates Cloud Data Security

The SolarWinds hack invaded at least nine U.S. government agencies and 100+ corporations. Now, Microsoft is at odds with Dell Technologies and IBM on the best way to secure data. Microsoft president Brad Smith stated that “cloud migration is critical to improving security maturity,” but the other two companies opine that a hybrid cloud and on-premise data storage is preferable. Smith stated that all the breached accounts Microsoft identified involved on-premise systems and that a hybrid system is more vulnerable to attacks. Continue reading After SolarWinds Hack, Big Tech Debates Cloud Data Security

New York State Calls for a Dedicated Social Media Regulator

On the heels of a cyberattack on Twitter this summer, the New York State Department of Financial Services (DFS) called for a dedicated regulator to oversee big social media platforms. In a 37-page report, the department described the July 15 attack in which accounts of Barack Obama, Joe Biden, Jeff Bezos, Elon Musk and others were hacked and used to promote a cryptocurrency scam. Three people have since been charged with posing as employees to launch that attack, which relied on relatively simple tactics. Continue reading New York State Calls for a Dedicated Social Media Regulator

As Threats to Cybersecurity Grow, So Does Cyberinsurance

Increasingly pervasive threats to cybersecurity have jumpstarted the cyberinsurance business to reach beyond technology companies, its core customers. Covering financial loss, including theft of data and ransomware, cyberinsurance is reportedly the fastest-growing coverage among U.S. companies; cyberinsurance firms provide competing tools to distinguish their offerings in the marketplace. Insurance is not in lieu of good security practices, but the idea of cyberinsurance is appealing even though it is largely untested. Continue reading As Threats to Cybersecurity Grow, So Does Cyberinsurance

Experts Ponder Implications of IoT Vulnerabilities and Risks

The Internet of Things is now made up of approximately 8.4 billion devices, in cars, voice-activated assistants, home security systems, personal fitness trackers and health-monitoring devices. Much of the “connection” is behind the scenes and involves machine learning-enhanced communication. But an increasing number of IoT products are embedded in the things of daily life, from toothbrushes and dental floss to baby monitors, umbrellas and remote-controlled pet food dispensers. Security and safety issues are now a focus. Continue reading Experts Ponder Implications of IoT Vulnerabilities and Risks

President Obama Approves Order Against Foreign Cyberattacks

A new executive order signed by President Obama earlier this week aims to warn off foreign online hackers from targeting the United States. The order authorizes severe consequences to the individual or foreign party determined to be involved with any attack that may compromise the security, foreign policy, economic health, and financial stability of the U.S. Any violations of the policy could result in both financial and travel sanctions as regulated by the federal government. Continue reading President Obama Approves Order Against Foreign Cyberattacks

HPA Tech Retreat: Cybersecurity in Today’s Media Industry

During an HPA Tech Retreat panel yesterday on “Cyber and Content Security: Time for a Strategy Change,” moderated by NSS Labs Sales Director Kari Grubin, panelists asked the important questions: Who are the perpetrators? How easy is it to gain access? How can we understand the risks to our specific companies? And how can we architect against risks? Grubin was joined by Frank Artes of NSS Labs, Theresa Miller of Lionsgate, Bryan Ellenburg of the CDSA, and Ted Harrington of Independent Security Evaluators. Continue reading HPA Tech Retreat: Cybersecurity in Today’s Media Industry