Author: rescue@crimefire.in

  • Australia forms multi-agency task force to combat cyber crime – JURIST

    On Saturday, Australia’s Minister for Home Affairs and Cyber Security Clare O’Neil announced the formation of a multi-agency task force to combat cyber crime. Called the Joint Standing Operation (JSO), the task force will merge the efforts of the Australian Federal Police (AFP) and the Australian Signals Directorate (ASD), an agency of the Defense Department.
    The announcement comes after the Medibank hack exposed the private health information of 9.7 million Australians earlier this week. The hackers, associated with the Russian ransomware gang REvil, published data from the breach on the dark web this past Wednesday. The hackers sorted the published data into two files: a “good-list” and a “naughty-list.” The “naughty-list” purportedly included the medical information of Australians who had sought treatment for HIV, drug addiction, and unwanted pregnancies.
    “I am disgusted by the perpetrators of this criminal act,” stated Prime Minister Anthony Albanese on Friday. The Joint Standing Operation represents the government’s commitment to combat cyber crime with a new and more aggressive cyber-policing model.
    The JSO will be composed of 100 officers from the AFP and ASD. Its formation formalizes a partnership between the two organizations that began after the Optus hack in September. The JSO will not only investigate cyber crimes, but it will also proactively track and disrupt the activities of international cyber-criminal syndicates, in cooperation with the organizations’ international partners.
    “The smartest and toughest people in our country are going to hack the hackers” and “hunt down the scumbags,” stated O’Neil.
    A report from the Australian Cyber Security Centre earlier this month stated that cyber crime rose 13 percent in Australia from July 2021 and July 2022.
    India dispatch: Supreme Court ruling on Election Commission appointments limits executive branch discretion
    EU dispatch: Serbia and Kosovo agree to EU proposal on normalization of relations
    ChatGPT and Other AI Programs Aid and Muddle Access to Justice as Non-Lawyers Seek Their Advice
    A Debt Default Would Be Unconstitutional. President Biden Should Say So Now.
    Explainer: The Failure of the Organization of American States to Apply the Inter-American Democratic Charter in Haiti
    How the Lives of Ukraine’s Law Students Have Changed in the Year Since Russia Invaded
    James Earl Ray sentenced for the murder of Martin Luther King, Jr.
    On March 10, 1969, James Earl Ray was sentenced to 99 years in prison for the murder of civil rights leader Martin Luther King, Jr.. Ray died in 1998, still seeking a retrial of his case.

    On December 9th, 1999, a Memphis jury handed down a verdict agreeing with the King family that the 1968 assassination of the civil rights leader was a conspiracy rather than the act of a lone gunman. Learn more about the trial and the assassination from The King Center in Atlanta.
    Gandhi arrested for sedition
    On March 10, 1922, Mahatma Gandhi was arrested and charged with sedition for leading a campaign of mass civil disobedience against the British in India. He was then convicted and sentenced to six years in prison. After his release, Gandhi continued to build Indian unity and use civil disobedience and non-cooperation to oppose British rule in his country, culminating in the Salt March of 1930 and eventual Indian independence in 1947.

    Learn more about Mahatma Gandhi and the Indian Freedom Struggle from the archives of the government of India.

    source

  • Majority of Firms Make Cybersecurity Decisions Without Attacker … – Infosecurity Magazine

    Four out of five (79%) businesses make most cybersecurity decisions without insights into the threat actor targeting their infrastructures.
    The claims come from Google-owned threat analytics company Mandiant, which has also said that while 67% of cybersecurity decision makers believe senior leadership teams still underestimate cyber-threats, 68% agree their organization needs to improve its understanding of the threat landscape.
    The data in Mandiant's Global Perspectives on Threat Intelligence report further indicates an almost consensus (96%) among respondents who were satisfied with the quality of threat intelligence their organization uses.
    At the same time, almost half of them (47%) have admitted that effectively applying that intelligence throughout the security organization was one of their most significant challenges, and nearly all (98%) said they need to be faster at implementing changes to their cybersecurity strategy based on available threat intelligence.
    "Security teams are outwardly confident but often struggle to keep pace with the rapidly changing threat landscape. They crave actionable information that can be applied throughout their organization," said Sandra Joyce, vice president of Mandiant Intelligence at Google Cloud.
    "Security teams are concerned that senior leaders don't fully grasp the nature of the threat. This means that critical cybersecurity decisions are being made without insights into the adversary and their tactics."
    In terms of what threats teams felt most confident in tackling, financially motivated crime like ransomware was at the top of the list (91%), followed by hacktivist threats (89%) and nation-state actors (83%).
    The latest Mandiant report was compiled after a global survey of 1350 cybersecurity decision makers across 13 countries and 18 sectors.
    "This research indicates that one of the biggest barriers to building stronger defenses is the sheer volume of information: organizations must find better strategies for putting intelligence into action to regain much-needed focus and identify clear priorities," explained Jamie Collier, Mandiant senior threat intelligence advisor of EMEA at Google Cloud.
    "UK organizations need to put themselves on the front foot, and that can only be achieved by knowing your adversaries, implementing changes at speed, and ensuring cyber-risks are communicated effectively amongst all stakeholders."
    A separate report by BlackBerry security researchers has shown that several security leaders are also worried about ChatGPT, expecting the AI model to complete a successful cyber-attack within a year.

    source

  • 20 Careers You Can Get with a Homeland Security Degree | Keiser – Keiser University

    By clicking the “Submit” button, I authorize Keiser University to make or allow the placement of recurring marketing calls, emails, and texts to me at the phone number that I have provided, including through the use of automated technology or a prerecorded or artificial voice. I understand that I am not required to provide my phone number as a condition of purchasing any property, goods, or services. Privacy Policy
    We offer a range of programs and guidance to prepare you for a competitive landscape. For more information, please call us at 888-753-4737.
    Learn More
    By clicking the “Submit” button, I authorize Keiser University to make or allow the placement of recurring marketing calls, emails, and texts to me at the phone number that I have provided, including through the use of automated technology or a prerecorded or artificial voice. I understand that I am not required to provide my phone number as a condition of purchasing any property, goods, or services. Privacy Policy
    Posted on January 4, 2023 on Graduate School, Seahawk Nation
    By clicking the “Submit” button, I authorize Keiser University to make or allow the placement of recurring marketing calls, emails, and texts to me at the phone number that I have provided, including through the use of automated technology or a prerecorded or artificial voice. I understand that I am not required to provide my phone number as a condition of purchasing any property, goods, or services. Privacy Policy
    In 2002, the United States government created the Department of Homeland Security. The attacks in New York and Washington D.C. in 2001 showed the country’s vulnerability to terrorism. In response, President Bush ordered the formation of a division that would work specifically in the public’s interest to keep them safe from terrorism and other public crises.
    The Department’s primary goal is to “secure the nation from the many threats we face.” While sometimes those threats are in the form of terrorism, they also can come in the form of natural disasters, economic decline, and crime from within the nation. The DHS needs trained professionals to help them in their efforts, and a degree in homeland security can give you that training. If you earn a degree in this field, you will find many career options available. Here is a closer look at the various jobs you could get with a degree in homeland security, both undergraduate and higher-level graduate degrees.
    The Department of Homeland Security offers unique career opportunities, but one must meet the criteria to work in this field. They look for people with the proper education and background. The job requirements fall into two categories:
    They look at each applicant individually but screen for these general criteria. If you meet them, you can apply through the USAJOBS website.
    An undergraduate degree in homeland security can open the door to many career options. Depending on your interests and the focus of your degree program, you may be able to find work as:
    While you don’t need a degree in homeland security to work as a police officer, this degree does provide the training necessary to work in a wide range of law enforcement roles. Police officers can earn between $40,000 and $105,000 a year based on 2021 data from the Bureau of Labor Statistics (BLS), and there will always be a demand for people trained to protect the public.
    Corrections officers can use the information they learn in a homeland security degree to better work with the inmates and law enforcement professionals within the corrections system. According to the BLS, the median annual salary for correctional officers and bailiffs is $47,920.
    The Transportation Security Administration employs operators to screen travelers and keep airports and other forms of transportation secure. There are many roles within this field, but security officers can earn an average of $38,155 a year, with that increasing to $69,552 for those who become security specialists.
    Postal Inspectors work for the United States Postal Service. They work to prevent crime and manage risks associated with the mail system. This position is relatively well-paid, with an average salary of $144,364 a year. The information learned in a homeland security degree will provide the knowledge to understand and mitigate risks.
    FEMA workers step in when national and natural disasters strike. They can work as reservists on-call for disasters or full-time workers who help manage risks all year long. The average base salary for this role is $80,000 annually.
    The country’s railroad and over-the-road transit systems have many opportunities for crime and terrorist activity. When these are attacked, the infrastructure of the nation is at risk. Transit and railroad police help protect these vital transportation sectors. According to the BLS, transit and railroad police earn a median annual salary of $69,570.
    Forest fires and flooding are common emergencies that can affect the national forests and other protected areas and expand into populated areas. Emergency management is a vital role within the US Forest Service, and a degree in homeland security can open the door to these roles. The 2021 average pay rate for this role was $79,965.86 annually.
    Hospitals provide care for vulnerable members of our communities, and it is critical they remain safe & secure. Hospital security managers navigate the complexities of large buildings, huge groups of people, and complicated procedures to design, manage and conduct security for hospitals and healthcare campuses. The average salary for a hospital security manager is $65,192 per year – with variation depending on experience, size of the facility, geography, etc.
    Keeping the nation’s borders protected is a crucial role of the US Customs and Border Protection agency. Many threats come from just across the border. Border protection officers have great benefits and a competitive salary. They earn between $42,516 and $102,897 a year based on grade and location worked.
    Some homeland security positions, especially many within government agencies, require more in-depth training. A master’s degree in this field will allow you to dig into a particular area of expertise, which, in turn, can bring higher-paying roles within reach. Here are some that require a master’s degree.
    Many roles within the FBI can use the information learned in a homeland security master’s program, but those who work in antiterror sectors can especially benefit from this training. FBI agent pay varies wildly based on an agent’s assignment, but the average is $75,169 annually.
    If you have worked within the field for a while and are ready to pass your knowledge on to the next generation, you will need a graduate degree. Teaching in homeland security can be very rewarding and comes with lower risks than many other positions in the field. The median pay for postsecondary educators in 2021 was over $79,000 annually.
    Much of the work of fighting terrorism requires research. Researchers put their knowledge of terrorism and risk to work behind the scenes, digging into data to find potential problems or create scenarios to address them. According to Indeed.com, the average base salary of a researcher in the US is $53,559.
    A counterterrorism specialist works for the FBI, CIA, or Department of Homeland Security to track down and stop threats to the nation from terrorists or terrorist organizations. Special agents in leadership roles can earn an annual pay of around $102,000 per year, especially with a master’s degree.
    Earning a master’s degree can make it possible to step into leadership roles in the homeland security arena. Program managers oversee organizations and programs to ensure the work is done correctly. These leaders are vital to the country’s protection and ability to address disasters. Program managers’ average salary as of October 2022 is $143,008.
    Many different organizations must come together when emergencies occur to provide care to the people affected. Emergency management specialists take the training they earned in their degree program and use it to oversee these emergency management actions. These leaders are vital to the success of emergency management planning and implementation. The average annual salary of an emergency management specialist is $81,484.
    A prison warden supervises the activities and discipline of a prison system. They may also ensure that all professionals who work within the prison are appropriately vetted. A prison warden can earn an average of over $89,400 per year.
    Homeland security is all about risk. Identifying, managing, and preventing various risks is the central focus of this line of work. Risk management professionals work within the government to perform these roles. They monitor at-risk areas and identify or mitigate risks. Those working as risk managers for the federal government earn an average annual salary of $116,000.
    Intelligence analysts work with the FBI and other government agencies to collect and analyze data. They work directly with law enforcement organizations to find the most at-risk areas and will take action against threats when they see them. Homeland security graduate degrees are an excellent foundation for these professionals. The average salary for intelligence analysts is close to $70,000 annually.
    Many of the risks to our nation come not from natural disasters or overt terrorism but rather from cybercriminals. One cyber hack could take down significant parts of the national infrastructure, including power systems or internet-based programs. Homeland security master’s degree programs focusing on cybersecurity will help people be prepared to address these issues. Cybersecurity managers can earn up to $102,600 a year per the BLS.
    Illegal immigration is a growing problem that risks the nation’s security. Working as an immigration officer allows you to protect the community from these risks. Positions within the US Citizenship and Immigration Services department pay an average of $71,718 per year.
    The coursework focuses on critical areas of homeland security, information security, and border control. After graduating with this degree, you would be able to work in both government agencies and the private sector.
    The program teaches you to:
    The Master of Arts in Homeland Security at Keiser University offers an intensive study of topics related to protecting the United States from threats. The coursework promotes self-directed learning and allows students to contribute intellectually.
    Graduates will be prepared to work at the border, airports, seaports, and waterways. They’ll be able to research and develop security technologies, respond to natural disasters or terrorist attacks, analyze intelligence reports, and perform other homeland security-related tasks.
    If one of these homeland security careers appeals to you, then it is time to get the proper training. Keiser University offers a Master of Arts in Homeland Security that can provide a strong foundation for any of these careers. Keiser is an educational partner of the U.S. Department of Homeland Security, so this ensures our degree is on track with what they’re looking for in graduates. Whether you picture yourself working for the DHS or in one of these other related fields, you can start your career advancement with Keiser.
    Our master’s degree program is 33 credit hours with eight-week terms, and you can complete it in 12-18 months. It is finished entirely online, allowing you to get the right training without disrupting your career. Reach out to our admissions team today to learn how you can grow your homeland security career with Keiser University.
    My instructors believed in me. They were more than instructors, they tried to get to know you as a person and tried to understand your goals so they could push you towards them. Student services helped me find a job before I even graduated. Everyone was dedicated to my overall success.
    Going to Keiser University was one of the greatest experiences in my life. All of my deans, professors, and staff made me feel that I was a part of something very special, and I am. I would recommend for anyone to get their education at Keiser University.
    The instructors at Keiser University impacted my life. They believed in my ability to become a great graphic designer, regardless of how I felt about my skills. KU helped to prepare me for the real world and got me to where I am today.
    If not for my education at Keiser I probably would not be where I am today, in both life and career. It is because of going to Keiser and the instructors I had that I joined a club started by Mr. Williams, The Lakeland Shooters Photography Group, which allowed me to venture into an amazing and very creative field that I use to enhance all aspects of my life.
    The Design program at Keiser University was filled with real world learning and hands on instruction… Based on the portfolio I created while a student at Keiser University, I landed a job in Graphic Design for a major online retailer immediately after graduation.
    The year and a half I spent in the program better prepared me for attaining a job in the field…As a hands-on learner, the project-centered teaching was perfect for me.
    Keiser University has given me the opportunity to embrace a career change… It has opened the door for a timely graduation and quick return to the work force…
    Without the education I received at Keiser University, I would not be where I am today!
    I not only received an excellent education but also encouragement and training that built my self-confidence every day.
    I realize the amount of knowledge I gained and feel that the educational experiences have developed me in to a person who can move higher up the career ladder.
    Keiser University’s MBA program has renewed my mind, changed the way I think, and given me a new sense of purpose.  The professors transformed my attitude and behavior, gave me the self-confidence I was lacking, and restored my energy.
    It has been great attending and graduating from Keiser University.  Because of the small class sizes, I was able to build good relationships with classmates and professors.  The PA professors care very much about the progress and success of the students and have been great advisors every step of the way through the program.
    Attending Keiser University and getting my degree was the best decision I have ever made.  The small class sizes and personalized attention helped me get my degree quickly.  The hands-on experience and the education landed me a job at a neighboring law firm.
    I chose Keiser because it had everything—small classes, caring professors, hands-on learning, and counselors that are really there for you.  I feel like I’m part of a family here, not just a number.
    After being denied for several promotions at my current employer, I decided that I needed to further my education.  Since graduating from Keiser with my bachelor’s degree in Business Administration, I have been promoted and I am able to obtain positions that weren’t available to me before.
    Beyond the curriculum of the courses, the lessons the instructors have taught me have paid dividends in my real work experiences. How to respond to criticisms, project and time management, interview skills, the list goes on and on. At the end of the day, they not only showed me how to design, but they taught me how to be a professional.
    Keiser helped change my life by getting my education at the right school! I had been going to another school before, I dropped out because I felt that I was not getting enough information. When I found out about Keiser, I was pleased because the instructors were great.
    My decision to attend Keiser University has been one of the best decisions I’ve made. I chose to enroll in the Information Technology program… The one-class-a-month pace helped incredibly with my self-discipline.
    The BA for Business Administration at Keiser has to be one of the best in the nation. Keiser takes the basics that are taught at the Associates level and uses them to strengthen your skills and knowledge.
    I found that Keiser University’s Nuclear Medicine program of advanced studies and small class size was a perfect fit. I never came across a faculty member who wasn’t truly interested.
    Copyright © 2023 Keiser University   |   Toll Free: 888-KEISER-9   |   Online: 888-4-KEISER   |   Site by Pacific54

    source

  • How to build a career in cybersecurity? – The Economic Times




    A career in cybersecurity necessitates a diverse skill set, including problem-solving talents, technical understanding of security across many platforms, excellent communication skills, and the ability to think creatively and outside the box, among other things.
    Download The Economic Times News App to get Daily Market Updates & Live Business News.
    More
    Read Complete Print Edition

    source

  • Cyber Security for Medical Devices Training Course (January 20 … – Business Wire

    DUBLIN–()–The “Cyber Security for Medical Devices Training Course” conference has been added to ResearchAndMarkets.com’s offering.

    This seminar will provide you with an understanding of cybersecurity and its increasing regulatory focus and how to embed and apply state-of-the-art security in your existing processes to deliver safe and secure products and solutions.
    The impact of Cyber Security incidents on society is high, and in critical infrastructures such as healthcare, it impacts the ability for hospitals to provide care. Cybersecurity for medical devices is not just about safety, it should also protect the confidentiality, integrity and availability of systems and data.
    Benefits in Attending
    Who Should Attend:
    Key Topics Covered:
    Introduction and Welcome
    What is Cybersecurity?
    Cybersecurity Regulatory Overview
    Security Management Considerations
    Security Standards
    Security by Design
    Security Risk Management
    Further Security Considerations
    Interactive Discussion Q & A
    Speakers
    Ben Kokx
    Philips
    Ben Kokx joined Philips in 2001 as a software designer. He quickly moved into a new role as a product security and privacy officer and worked as such in several business and market positions. As Director Product Security within the central Philips Product Security Office, he is responsible for security related standards and regulations next for the Philips Product Security Policy and Process Framework since 2013.
    Ben is a healthcare and IoT security expert who leads and participates in several industry associations and standard development organizations like ISO/IEC JTC 1/SC 27, IEC ACSEC, IEC TC62/ISO TC 215, IEC TC65, ETSI TC-CYBER and others. He is the convenor of CEN/CENELEC JTC 13/WG 6 on product security. Ben is an ENISA eHealth cybersecurity expert, chairs the COCIR Cybersecurity focus group and through DITTA, participates in several public-private organizations such as the IMDRF cybersecurity workgroup.
    For more information about this conference visit https://www.researchandmarkets.com/r/5b8gv0
    ResearchAndMarkets.com
    Laura Wood, Senior Press Manager
    press@researchandmarkets.com

    For E.S.T Office Hours Call 1-917-300-0470
    For U.S./ CAN Toll Free Call 1-800-526-8630
    For GMT Office Hours Call +353-1-416-8900
    ResearchAndMarkets.com
    Laura Wood, Senior Press Manager
    press@researchandmarkets.com

    For E.S.T Office Hours Call 1-917-300-0470
    For U.S./ CAN Toll Free Call 1-800-526-8630
    For GMT Office Hours Call +353-1-416-8900

    source

  • How training and continuing education are crucial for healthcare … – Healthcare IT News


    Photo: John M Lund Photography Inc./Getty Images
    Training is one of the main components of protecting against cyberattacks. And this goes not just for healthcare provider organization employees but also the security managers and staff – especially those looking to get ahead.
    This is the topic of “In-house Career Development: Hiring from Within,” an educational session at the HIMSS Healthcare Cybersecurity Forum, December 5-6 in Boston.
    The session is a fresh look at cybersecurity training within healthcare organizations and how security leaders and staff also can improve their knowledge, skills and abilities. Cybersecurity training of clinicians is different from that of administrators. Effective, meaningful training is essential not only for the wellbeing of the organization, but also for the employees within.
    Notwithstanding this, cybersecurity professionals within organizations also need continuing education. A roadmap will be provided in the session to outline training and educational resources for individuals, organizations, contractors and others.
    Melissa Elza, cofounder of GRC for Intelligent Ecosystems, a training and education organization where she serves as the chief people officer and head of the NextCISO Academy, is one of three panelists speaking during the session. She sat down with Healthcare IT News to offer a preview of the Healthcare Cybersecurity Forum session.
    Q. How is cybersecurity training for administrators different from training for doctors and nurses?
    A.
    Administrators are the gatekeepers of our private health information. Yes, all staff have to know about HIPAA and the precautions needed to keep that data safe. But the administrators are the ones transmitting our sensitive health data and other PII to the insurance companies, to other doctors, etc.
    Administrators especially need role-based training to make sure they understand the types of attackers and what tactics they might use to come after this data. I recently read a statistic that something like 95% of cybersecurity breaches are caused by human error. That’s a staggering number.
    Melissa Elza, GRC for Intelligent Ecosystems
    That means we could have prevented most breaches through training. It’s incredibly important.
    Q. Cybersecurity training that works obviously is good for a healthcare organization. How is it also good for employees, including cybersecurity professionals?
    A.
    The healthcare sector has suffered more than 337 breaches already this year, according to Fortified Health Security’s midyear report. This was reported in September, so that number is absolutely higher now.
    More than 19 million records were compromised in those breaches. Healthcare is already a stressful job, especially after the start of the pandemic. If patients are worried about their personal health information getting exposed, that only adds to the pressure of an already tough job.
    Figuring out how to reduce these breaches and keep attackers out of our systems benefits everyone. Spending time training people can hopefully also lessen the burden on the triage and forensics teams in those organizations.
    Q. What kinds of continuing education do healthcare cybersecurity professionals really need?
    A. In cybersecurity, you’re always learning. You have to be. Attackers are figuring out new ways to get into our systems every day, and we have to understand those new threats.
    IBM releases a report every year called the “Cost of a Data Breach.” This year’s report said the average cost of a healthcare data breach is now $10.1 million per incident, which was a 9.4% increase from its 2021 report. That number will only keep increasing.
    Education never really stops for us. It can’t.
    Q. What is an example or two of educational resources for cybersecurity professionals, and where can they find them?
    A.
    At GRCIE, we strongly believe that community is what gets our students across the finish line. I don’t think that changes once they get into the industry.
    There are many excellent community organizations that have tremendous reach, like Cloud Security Alliance (CSA), ISACA, ISC2 and Information Systems Security Association (ISSA), which have local chapters in a lot of cities.
    If you’re a woman in cyber looking for other women, WiCyS is another wonderful organization supporting other like-minded women. Cyversity is yet another fantastic organization that supports women, minorities and underrepresented individuals.
    All of these organizations offer continuing education to their communities. These community organizations bring professionals together so they learn how to protect us from these new threats together. If you’re looking for ongoing learning opportunities, please check these organizations out.
     The HIMSS 2022 Healthcare Cybersecurity Forum takes place December 5 and 6 at the Renaissance Boston Waterfront Hotel. Register here. 
    Twitter: @SiwickiHealthIT
    Email the writer: bsiwicki@himss.org
    Healthcare IT News is a HIMSS Media publication.

    More Whitepapers
    More Webinars


    © 2023 Healthcare IT News is a publication of HIMSS Media

    source

  • FACT SHEET: Biden-Harris Administration Announces National … – The White House

    The White House
    1600 Pennsylvania Ave NW
    Washington, DC 20500
    Read the full strategy here
    Today, the Biden-Harris Administration released the National Cybersecurity Strategy to secure the full benefits of a safe and secure digital ecosystem for all Americans. In this decisive decade, the United States will reimagine cyberspace as a tool to achieve our goals in a way that reflects our values: economic security and prosperity; respect for human rights and fundamental freedoms; trust in our democracy and democratic institutions; and an equitable and diverse society. To realize this vision, we must make fundamental shifts in how the United States allocates roles, responsibilities, and resources in cyberspace.
    The Strategy recognizes that government must use all tools of national power in a coordinated manner to protect our national security, public safety, and economic prosperity.

    VISION
    Our rapidly evolving world demands a more intentional, more coordinated, and more well-resourced approach to cyber defense. We face a complex threat environment, with state and non-state actors developing and executing novel campaigns to threaten our interests. At the same time, next-generation technologies are reaching maturity at an accelerating pace, creating new pathways for innovation while increasing digital interdependencies.
    This Strategy sets out a path to address these threats and secure the promise of our digital future. Its implementation will protect our investments in rebuilding America’s infrastructure, developing our clean energy sector, and re-shoring America’s technology and manufacturing base. Together with our allies and partners, the United States will make our digital ecosystem:
    The Administration has already taken steps to secure cyberspace and our digital ecosystem, including the National Security Strategy, Executive Order 14028 (Improving the Nation’s Cybersecurity), National Security Memorandum 5 (Improving Cybersecurity for Critical Infrastructure Control Systems), M-22-09 (Moving the U.S. Government Toward Zero-Trust Cybersecurity Principles), and National Security Memorandum 10 (Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems). Expanding on these efforts, the Strategy recognizes that cyberspace does not exist for its own end but as a tool to pursue our highest aspirations.
    APPROACH
    This Strategy seeks to build and enhance collaboration around five pillars:
    1. Defend Critical Infrastructure – We will give the American people confidence in the availability and resilience of our critical infrastructure and the essential services it provides, including by:
    2. Disrupt and Dismantle Threat Actors – Using all instruments of national power, we will make malicious cyber actors incapable of threatening the national security or public safety of the United States, including by:
    3. Shape Market Forces to Drive Security and Resilience – We will place responsibility on those within our digital ecosystem that are best positioned to reduce risk and shift the consequences of poor cybersecurity away from the most vulnerable in order to make our digital ecosystem more trustworthy, including by:
    4. Invest in a Resilient Future – Through strategic investments and coordinated, collaborative action, the United States will continue to lead the world in the innovation of secure and resilient next-generation technologies and infrastructure, including by:
    5. Forge International Partnerships to Pursue Shared Goals – The United States seeks a world where responsible state behavior in cyberspace is expected and reinforced and where irresponsible behavior is isolating and costly, including by:
    Coordinated by the Office of the National Cyber Director, the Administration’s implementation of this Strategy is already underway.
    ###
    We’ll be in touch with the latest information on how President Biden and his administration are working for the American people, as well as ways you can get involved and help our country build back better.
    Opt in to send and receive text messages from President Biden.
    The White House
    1600 Pennsylvania Ave NW
    Washington, DC 20500

    source

  • Analysis | Paid security features at Twitter and Meta spark … – The Washington Post

    Sign in
    A newsletter briefing on cybersecurity news and policy.
    with research by Vanessa Montalbano
    A newsletter briefing on cybersecurity news and policy.
    Welcome to The Cybersecurity 202! If you want to hear the funniest sequence of noises perhaps in the history of the world, watch this video. Do not worry. No frog is actually harmed in the video so far as I can tell, despite its title. I daresay the frog is quite happy at the conclusion of the video.
    Reading this online? Sign up for The Cybersecurity 202 to get scoops and sharp analysis in your inbox each morning.
    Below: The FBI says it contained a cyberattack, and GoDaddy reveals it was the target of a multiyear hacking operation. First: 
    In recent days, Twitter — and to a lesser extent Facebook parent company Meta — has debuted features that gate off stronger security features for those who pay for them.
    It’s a development that seemingly goes against a movement by some U.S. government officials and cyber pros for products to offer strong security to everyone at the outset without additional cost.
    And while the Twitter Blue feature and the Meta Verified test initiative could improve security in certain ways, both developments sparked concern, to varying degrees, among cyber observers.
    “The thing that strikes me is that security should be baked into everything we do, not a paid-for service,” Charles Henderson, global head of IBM’s X-Force threat management division, told me. “It should be on by default.”
    Last week, Twitter published a blog post announcing that as of March 20, only Twitter Blue paid users will be able to use a form of two-factor authentication (2FA) that sends text message codes to users to verify their identities after they enter their passwords. 
    “While historically a popular form of 2FA, unfortunately we have seen phone-number based 2FA be used — and abused — by bad actors,” the blog post read.
    Separately, over the weekend, Meta — which owns both Facebook and Instagram — said it would begin testing Meta Verified, a paid program that offers enhanced impersonation protections, access to account support and more. 
    Twitter last year allowed Twitter Blue subscribers to get blue check marks, which have historically represented “verified” users on the platform. However, the company didn’t require users to provide ID to verify that they were who they said they were, and users impersonated brands like Eli Lilly and Co. The company briefly paused the feature, with Musk saying users would be authenticated. But our colleague Geoffrey A. Fowler was still able to get an account impersonating Sen. Edward J. Markey (D-Mass.) verified.
    The Twitter move, in particular, prompted a lot of worry that popped up on … well, Twitter, naturally.
    Here’s Dakota Cary, a consultant with the Krebs Stamos Group, in one typical response:
    “Pay us or we will remove this security feature” 🙄 pic.twitter.com/5Wq9eVBiFs
    Twitter’s announcement comes amid a push by federal cybersecurity officials for tech companies to offer security to customers from the start. Earlier this month, Cybersecurity and Infrastructure Security Agency Director Jen Easterly co-wrote an essay with Eric Goldstein, her agency’s executive assistant director for cybersecurity, making their biggest plea to date about putting security features in the base product rather than charging extra for them.
    “Secure-by-default products have strong security features — akin to seat belts and air bags — at the time of purchase, without additional costs. Strong security should be a standard feature of virtually every technology product, particularly those that underpin critical infrastructure such as energy, water, transportation, communications, and emergency services,” the pair wrote.
    Easterly herself tweeted out her concern on Twitter’s move, but said she was encouraged about the attention it gave to multifactor authentication (MFA), often an interchangeable term with two-factor authentication:
    So yeah, I'll admit I wasn’t (at all) super psyched to read about this change, but I was excited to see more talk about MFA. So, let’s keep it going & get as many @Twitter users on MFA as possible–using an authenticator app or a security key. Start today & help your friends!
    One of the most thorough breakdowns of the security worries triggered by the Twitter and Meta moves came from Rachel Tobac, a hacker and CEO of SocialProof Security.
    This Twitter 2FA change is nerve-racking because:
    1. Only ~2.6% of Twitter users have 2FA on at all (it’s essential for preventing easy account takeover)
    Of those 2.6%, 74% use text message based 2FA (https://t.co/WXuFydZk17)
    If they don’t pay for Blue they auto lose 2FA on 3/20. https://t.co/LneQojvjbi pic.twitter.com/PgySF3Qyag
    Do I think paid verification is the best idea in the world? I don't.
    But I'm not a Product Manager so I'll focus on the cybersecurity elements of this roll out.
    ID is *essential* in pay-to-play verification, otherwise impersonation goes wild (like we saw in the Twitter roll out) pic.twitter.com/buoE5JEnso
    Summarized, Tobac is concerned that forcing people to pay for text-based (also known as SMS) two-factor authentication will push them away from using multifactor authentication altogether. And she’s got questions about whether Meta expanding account support will give cybercriminals a venue to trick customer support employees, as well as how the enhanced impersonation protections will work.
    Cybersecurity experts say text message-based forms of two-factor authentication are among the weakest forms, since hackers can intercept them with tactics like sim-swapping, where they trick mobile phone carriers into activating a SIM card in their possession that scammers can then use to take over a victim’s phone number.
    But “SMS is vastly better than using a static password” with no two-factor authentication, Bill Malik, vice president of infrastructure strategies at cybersecurity firm Trend Micro, told me.
    Still, if text-based two-factor authentication is costing Twitter so much money, one might ask why it’s offering it at all, especially to paying users. Henderson offered the theory that paying users who are using text-based two-factor authentication would be the ones reimbursing its costs.
    For Meta, some observers have pointed out that the paid service also requires a government ID to verify a user’s identity, which could make Meta a more tempting hacker target and make a breach worse if criminals obtained those sensitive documents.
    Twitter notably isn’t taking away the ability to use multifactor authentication entirely. Users will still be able to employ methods such as Google or Microsoft authentication apps. Here’s security journalist Kim Zetter
    People tweeting that Twitter is eliminating two-factor authentication are spreading misinfo. It’s just limiting one way to get 2FA codes – getting them sent to yr phone via SMS. You can use other ways to get codes. They even say this in announcement, but everyone is ignoring this https://t.co/6xqzT2O9aa
    Meta, for its part, isn’t taking away any existing security features for nonpaying users, like Twitter is doing. And it already has some capabilities for taking down fake accounts and offering customer support chats.
    Meta also securely stores IDs for 30 days before deleting them, Meta spokesperson Gabby Curtis told me. And by better protecting creator accounts that have large followings against impersonation, Curtis explained, that could better protect users who might fall victim to scams from fraudsters pretending to be popular creators.
    Twitter did not respond to a request for comment Monday.
    The FBI has in recent days been working to contain a malicious cyber incident on part of its computer network that has been involved in investigations of child sexual exploitation material, according to people briefed on the matter, CNN’s Evan Perez and Sean Lyngaas report. 
    “The FBI is aware of the incident and is working to gain additional information,” the bureau said in a statement to CNN. “This is an isolated incident that has been contained. As this is an ongoing investigation the FBI does not have further comment to provide at this time.”
    The people said that the attack likely targeted the FBI’s New York field office — one of its largest and most prominent offices. The bureau has yet to name a suspect. 
    Web hosting giant GoDaddy said last week that hackers had access to its computer software for at least the past three years, allowing them to steal company source code and customer and employee data, Sergiu Gatlan reports for Bleeping Computer
    In a filing Thursday with the Securities and Exchange Commission, the firm also said that over that period the cybercriminals installed malware onto its systems that redirected customer websites to malicious ones. 
    GoDaddy, one of the largest domain registrars, first discovered the breach following customer reports early last December, but later linked it to previous incidents in November 2021 and March 2020. 
    In those cases, bad actors “gained access to the email addresses of all [1.2 million] impacted customers, their WordPress Admin passwords, sFTP and database credentials, and SSL private keys of a subset of active clients,” and “used their [28,000 customers] web hosting account credentials in October 2019 to connect to their hosting account via SSH,” Gatlan writes. 
    “Based on our investigation, we believe these incidents are part of a multiyear campaign by a sophisticated threat actor group that, among other things, installed malware on our systems and obtained pieces of code related to some services within GoDaddy,” the hosting site said in the filing. 
    GoDaddy said it is working with law enforcement agencies and external cybersecurity experts to investigate the cause of the breach. 
    Spain’s National Court on Friday agreed to a request to extradite a British citizen to the United States over the alleged July 2020 hack of more than 130 Twitter accounts, including those of President Biden, former president Barack Obama, Bill Gates and Elon Musk, the BBC’s Shiona McCallum reports. 
    Joseph James O’Connor is wanted by courts in the Northern District of California and the Southern District of New York on 14 charges, including illegal access to computer systems, internet fraud, money laundering and extortion. 
    U.S. officials have accused him of hijacking the high-profile Twitter accounts and asking their followers to send bitcoin to an account, promising to double their money.
    A court statement said the “necessary conditions” were met for Spain to hand over O’Connor, 23, who was arrested in 2021 in Estepona. The Spanish court also said that he is suspected of hacking the Snapchat account of an anonymous public figure and threatening to publish their nude photos unless he was paid a ransom. 
    Spain’s cabinet must first approve the extradition before it is finalized, and his defense team will also have the opportunity to appeal the decision. 
    Russian state TV website goes down during Putin speech (Reuters)
    Researching North Korea online? You could be victim of a malware attack (Tech Radar)
    Russia targets Netherlands’ North Sea infrastructure, says Dutch intelligence agency (Reuters)
    Norway seizes $5.84 million in cryptocurrency stolen by Lazarus hackers (The Hacker News)
    Guardian staff forced to work out of former brewery after ransomware attack (The Telegraph )
    Lehigh Valley Health Network reports cyberattack from suspected Russian ransomware group (The Morning Call)
    Major hack at Virgin Media Television in Ireland ‘contained and terminated’ (The Independent)
    Semiconductor industry giant says ransomware attack on supplier will cost it $250 million (The Record )
    AI is starting to pick who gets laid off ( Pranshu Verma)
    🐈🐾💨 Bobcats can run at up to 30 miles per hour. They place their back feet in the same spots where their front feet have stepped to reduce noise when hunting. 🤫
    . . .
    👋 Visit the Zoo's bobcats Ollie, Yoda and Cheese at the Claws and Paws Pathway exhibit! pic.twitter.com/xNMst8GC15
    Thanks for reading. See you tomorrow.

    source

  • Lenovo Cybersecurity Innovation Center Established in Cooperation … – Lenovo StoryHub

    Be’er Sheva, Israel – February 20, 2023 – Today, Lenovo (HKSE: 992) (ADR: LNVGY) established the Lenovo Cybersecurity Innovation Center (LCIC) in cooperation with Ben-Gurion University of the Negev, a leading Israel-based cyber security research institution. The center will focus on zero-trust architecture innovation in hardware and below-OS security, as well as serve as a hub for the development of next-generation security solutions. The LCIC offers Lenovo customers an attestation lab and access to industry insights and information exchange through an on-site briefing center.
    The variety and severity of cyber threats are increasing as criminal hackers employ more sophisticated tools to an ever-growing threat surface of computing solutions run by businesses, governments, and consumers.
    According to Lenovo’s global “Data For Humanity” report in November 2022, IT security is the top consideration when deciding to invest in digital transformation solutions across small, medium, and large businesses. Monitoring and assessing threats combined with research and reporting by LCIC cybersecurity professionals will empower more strategic and effective responses.
    Israel is internationally recognized for being a center of the cybersecurity industry, and Be’er Sheva is home to cybersecurity R&D centers for several global technology companies. The LCIC will be staffed and managed in coordination by cybersecurity experts from Lenovo and Ben-Gurion University.
    “Cybersecurity is one of the top priorities of CIOs today,” said Nima Baiati, Executive Director & GM, Commercial Cybersecurity Solutions, Lenovo. “Lenovo opening the new security innovation center with Ben-Gurion University gives us access to a global nexus of security innovation, our customers’ access to world-leading experts, and will help us create even stronger products across our portfolio.”
    Solutions developed at LCIC will be incorporated into ThinkShield, Lenovo’s portfolio of hardware, software, and services with enhanced security features. The portfolio for comprehensive end-to-end security provides advanced solutions in the forms of built-in platform security and device protection, threat and data protection, and security management tools that help protect critical business information.
    “Ben-Gurion University is committed to maintaining its cybersecurity research leadership not just in Israel, but also globally, and to apply the most recent academic knowledge and research to real-world issues,” said Prof. Yuval Elovici, Head of Ben-Gurion University Cyber Security Research Center. “As part of this vision, we are eager to team-up with industry leaders who share our values and aspire to serve as a model for the industry by actively pursuing cybersecurity excellence and innovation. Therefore, we would like to welcome Lenovo as our new partner in this digital battle against cyber threats. We are excited to work together in our jointly established center for new cybersecurity technologies with a particular emphasis on zero trust architecture and next-generation security innovation. The center’s work will become part of Lenovo’s cybersecurity portfolio and help further drive security innovation for Lenovo’s customers.”
    “The dedication of the Lenovo Cybersecurity Innovation Center at Ben-Gurion University of the Negev demonstrates our ongoing success in collaborating with key industry partners. The University’s collaborations with industry are key for developing technologies and capabilities, as well as critical to the strengthening the Negev region. One of our greatest assets as a University – one might say, our expertise – is forging strong relationships with our global partners in industry,” said Ben-Gurion University President Prof. Daniel Chamovitz.
    About Lenovo
    Lenovo (HKSE: 992) (ADR: LNVGY) is a US$70 billion revenue global technology powerhouse, ranked #171 in the Fortune Global 500, employing 82,000 people around the world, and serving millions of customers every day in 180 markets. Focused on a bold vision to deliver smarter technology for all, Lenovo has built on its success as the world’s largest PC company by further expanding into key growth areas including server, storage, mobile, solutions and services. This transformation together with Lenovo’s world-changing innovation is building a more inclusive, trustworthy, and sustainable digital society for everyone, everywhere. To find out more visit https://www.lenovo.com, and read about the latest news via our StoryHub.
    LENOVO and THINKSHIELD are trademarks of Lenovo. All other trademarks are the property of their respective owners. ©2022 Lenovo
    At the new Lenovo factory in Budapest, Hungary, teams use the latest innovation to advance Lenovo’s efforts against climate change.
    For Cybersecurity Awareness Month, Doug Fisher explores how we need more qualified, talented people to consider cybersecurity as a career.
    SentinelOne delivers real-time prevention, ActiveEDR, IoT security, and cloud workload protection powered by patented Behavioral AI to Lenovo customers.

    source