Category: Uncategorized

  • The UAE's collaborative approach to combat cybercrime: A closer … – Lexology

    Review your content’s performance and reach.
    Become your target audience’s go-to resource for today’s hottest topics.
    Understand your clients’ strategies and the most pressing issues they are facing.
    Keep a step ahead of your key competitors and benchmark against them.
    add to folder:
    Questions? Please contact [email protected]
    The UAE Cyber Security Council, formed in November 2020, is responsible for developing and overseeing a cyber security strategy that promotes  a secure  and resilient  cyber infrastructure in the United Arab Emirates.
    The establishment of the Cyber Security Council was followed by legislations that developed to ensure effective cyber solutions were implemented. This article provides a brief overview of the essential articles of the Federal Decree Law No.34 of 2021 on Combatting Rumors and Cybercrimes which hold significant importance. , We will also discuss the role of the UAE Cyber Security Council in fostering collaboration  between the public and  private sectors  to enhance  cybersecurity  across the UAE.  
    The enactment of this law was necessary to safeguard individuals and organizations from the rising cyber threats which have become a challenge in today’s world.  Criminals have an advantage in the borderless system of networks, allowing them to capitalize on anonymity and access.
    Public-private partnerships involve cooperation between a government agency and a private-sector entity for the common good of the entire nation such as to finance, construction, and managing projects that aid in the country’s development in various domains.
     To develop a cybersecurity strategy, the UAE Cybersecurity Council has formed multiple collaboration agreements with external service providers from the private sector over the last eight months.  One such agreement has been made with Deloitte, one of the big four leading auditing and tax consulting firms and offers and extensive range of management and assurance services.   Given the fact Deloitte audits around 20% of all US Public Companies, this partnership aims to introduce international best practices within the Cyber Security Council and provide cyber training.
    Another collaboration was established with Huawei, one of the largest telecommunications equipment manufacturers in the world, to focus on research and thought leadership in cybersecurity.  since telecommunication infrastructure is pivotal for protection, it is mandatory to invest in communications systems as a means of enabling security agencies to counter threats and safeguard society from harm.
     Additionally, the UAE Cybersecurity Council signed an agreement with Amazon Web Services, a widely adopted cloud platform that offers several on-demand operations such as computing power, database storage, and content delivery to help companies scale and grow.  The aim of this partnership is to assist (semi-)government entities in  accelerating their migration to the cloud.
     Giving the growing need for cybersecurity system globally,  it is evident that the UAE has adopted a proactive approach in developing legislations tailored to  the nation’s needs and  establishing collaborations to  protect organizations and  citizens from cyber threats. However, since cybercrime poses one of the greatest risks to prosperity and combat and exponential growth in recent times, we recommend expanding the protection layer worldwide by collaborating with Interpol through  their Global Cybercrime Program, which will facilitate international action to combat  and reduce cybercrime. 
    add to folder:
    If you would like to learn how Lexology can drive your content marketing strategy forward, please email [email protected].
    Federal Decree Law No. (46) of 2021 Regarding Electronic Transactions and Trust Services (UAE)
    Law on Combating Rumors and Cybercrime (No. 34) 2021 (UAE)
    © Copyright 2006 – 2023 Law Business Research

    source

  • Learn the basics of cybersecurity with this $60 web-based training package – TechRepublic

    Learn the basics of cybersecurity with this $60 web-based training package
    Your email has been sent
    The Premium Ethical Hacking Certification Bundle features eight courses that introduce students to the fundamentals and prepare them to earn important credentials from CompTIA.
    The threat of a cyber attack is always looming, so experts advise companies to bolster their IT security budgets on the regular. Considering a tech career? Then cybersecurity is definitely a path worth considering. And to get started on your training, we suggest checking out the Premium Ethical Hacking Certification Bundle, currently on sale for a limited time.
    The Premium Ethical Hacking Certification Bundle provides a convenient and affordable introduction to this very specialized field. It features eight courses that illustrate the basics of cyber security, shows students how to test various types of infrastructure and acquaints them with a lot of the tools that IT professionals use every day.
    Once completed, students will have mastered the skills they’ll need to take and pass two very important certification exams from CompTIA — a widely respected organization that sets minimum standards for the entire IT industry. Basically, with one of their credentials in hand, students face a far better chance of success once they enter the workforce.
    Of course, an education is only going to be as good as the training that’s provided. Which is why these courses are all facilitated by seasoned professionals — such as Joe Parys and Gabriel Avramescu — with stellar performance ratings. So, while the bundle itself is very affordably priced, that quality of the education offered rivals anything else you’re likely to find. The bundle is also rated an average of five stars by verified purchasers. One reviewer named Stefan H. wrote that this is “a must have for everyone who wants to go towards pen testing.”
    Perhaps best of all, because the courses are delivered via the web, you maintain control over the pace of your own education. You can log in at any time you want, learn for a duration of your choosing, and then put it away until next time. And since there are no actual classroom sessions, the courses can be priced affordably.
    In fact, right now, you can purchase the Premium Ethical Hacking Certification Bundle for just $59.99. That works out to less than $10 per course, which is an incredible value — especially when you consider how much you can earn per year as a salaried IT security pro.
    Prices and availability are subject to change.
    Stay up to date on the latest in technology with Daily Tech Insider. We bring you news on industry-leading companies, products, and people, as well as highlighted articles, downloads, and top resources. You’ll receive primers on hot tech topics that will help you stay ahead of the game.
    Learn the basics of cybersecurity with this $60 web-based training package
    Your email has been sent
    Your message has been sent
    TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
    With a lot of choices in the market, we have highlighted the top six HR and payroll software options for 2023.
    Microsoft’s latest Windows 11 allows enterprises to control some of these new features, which also include Notepad, iPhone and Android news.
    Salaries for remote roles in software development were higher than location-bound jobs in 2022, Hired finds.
    With so many agile project management software tools available, it can be overwhelming to find the best fit for you. We’ve compiled a list of 10 tools you can use to take advantage of agile within your organization.
    With phishing-based credentials theft on the rise, 1Password CPO Steve Won explains why the endgame is to ‘eliminate’ passwords entirely.
    Stay up to date on the latest in technology with Daily Tech Insider. We bring you news on industry-leading companies, products, and people, as well as highlighted articles, downloads, and top resources. You’ll receive primers on hot tech topics that will help you stay ahead of the game.
    PURPOSE This Media disposal policy from TechRepublic Premium provides specific instructions for ensuring organization data is properly protected when disposing of old storage media. From the policy: POLICY DETAILS When disposing of damaged, unusable, obsolete, off-lease, decommissioned, old, or end-of-service-life equipment and media, the organization requires that the guidelines outlined herein be followed: Hard drives, …
    PURPOSE To take some of the effort out of writing (and rewriting) emails to share with company staff and executives, TechRepublic Premium has assembled basic templates to handle the most common types of communications. Simply copy the text into your favorite word processor and customize it to fit your needs. Then, paste it into an …
    PURPOSE The purpose of this policy from TechRepublic Premium is to provide guidelines for developing mobile applications from a security, procedural and best practices standpoint. While it contains technical guidelines, it is not intended to serve as a programming guide but as a framework for operations. This policy can be customized as needed to fit …
    PURPOSE This checklist from TechRepublic Premium provides a method for auditing and documenting a client site and assembling an inventory of systems and software, as well as giving you a framework for developing recommendations, applying costs to them, and storing all that information in one file. Tracking client contact details, circuit information, network equipment, cloud …

    source

  • What are 10 Common Cybersecurity Mistakes in 2023 – Eisneramper

    Our Personal Tax Guide highlights tax planning ideas that may help you minimize your tax liability. Use this guide to identify issues that may impact you, then discuss them with your tax advisor.
    EisnerAmper discusses a summary of CARES Act and how self-employed individuals, independent contractors or sole proprietors must submit necessary documentation
    EisnerAmper provides some federal and state resources that are providing coronavirus-related assistance.
    March 13, 2023
    By Rahul Mahna
    In 2023, the cost of cybercrime reached a whopping $8 trillion. Experts expect cybercrime costs to businesses to increase to $10.5 trillion over the next two years.
    Cyber breaches cost businesses thousands of dollars each year, often due to common cybersecurity mistakes.
    Luckily, preventing these common mistakes is simple. If businesses do not have the skills internally, they can work with an outsourced managed IT service provider to safeguard their networks, applications and other digital assets.
    We’ve compiled a list of the top ten most common cyber threats and mistakes impacting businesses in 2023 to give businesses a running start.
    1.  Relying on Antivirus Software Alone
    Antivirus solutions have been the gold standard in cybersecurity for many years. This technology scans company files for known viruses. Some antivirus products also feature malware threat response services.
    However, as cyber criminals’ tactics have evolved, so have the technologies used to stop them. While they are still helpful for modern businesses, a business’s cybersecurity strategy should not rely on antivirus software alone.
    For example, endpoint detection and response (“EDR”) and extended detection and response (“XDR”) are solutions to detect potential threats. They offer an automated response, to protect businesses even after hours.
    2.  Not Understanding Risk Profiles
    Businesses may think an IT breach will not happen to them. In fact, cyberattacks happen all the time. They may not even know that a hack has happened in their workplace until it is too late.
    This is why it is so critical for businesses to understand their risk of breaches. Doing a risk analysis can show where their IT security strategy is working and where it needs work.
    Understanding risk profiles can help businesses prepare for the unexpected.
    A risk analysis is best done by an independent third party. Businesses should select a vendor who is reliable, has extensive knowledge in audits and will perform an analysis that does not just follow a stated framework, but is personalized to the specific circumstances of the business.
    3.  Over-Reliance on IT Departments
    Cybersecurity may be within an IT department’s wheelhouse. However, breaches affect everyone in the workplace. As such, a business’s cybersecurity strategy should be all hands on deck.
    Often, there is a strong reliance on the IT department, as it relates to threat detection and response to an incident; however, all  employees should be actively working to help prevent these breaches from happening in the first place.
    Employees need to be trained in cybersecurity basics. Some of the most common cybersecurity mistakes happen when employees use public wi-fi connections, click on phishing links and fail to monitor webcams.
    It is also essential to inform employees about the most critical assets of the business. For example, if handling sensitive personal information,  employees should be aware of the regulations surrounding it and not fall into common cybersecurity mistakes.
    4.  Not Seeing Cybersecurity as an Investment
    A robust cybersecurity system is an investment in a business’s future. Unfortunately, many business owners do not see it that way. Instead, they consider the costs of IT security a financial burden.
    With fines for breaches and PR nightmares with customers, businesses need to realize that the benefits of a strong cybersecurity strategy far outweigh the costs. In fact, a sound plan could help them bypass their competitors.
    Businesses will remain more competitive to their customers when they know their information will be protected. Prospective employees will prefer those firms as well. They will know their work is secure on a highly protected system.
    5.  Falling for Cyber Scams
    Cyber scams are on the rise and they are more dangerous than ever, because businesses and employees are often unaware of common tactics. Some of the most important scams to look out for are:
    Phishing emails; Malware and ransomware scams; and Insider cyber threats.
    Phishing attacks are arguably the most common of these. These scams happen when criminals send emails or texts to company devices. The user will be directed to download an attachment or click on a link in the email or text.
    These types of criminals can be persuasive. For example, they may use another company’s branding or email addresses to make the scam look more authentic.
    The COVID-19 pandemic also gave rise to new types of online scams. For example, many scammers have started posing as fake non-profits or health organizations to prey on people’s generosity.
    6.  Not Updating Networks and Software
    Did you know that failing to update your systems and applications can increase the risk of a breach? If not, it’s no wonder, considering what a headache doing company-wide updates can be.
    Yet, products are made by humans, and humans are error prone. Updates to systems help reduce errors by including new updates to close loopholes and protect from vulnerabilities.
    With frequent software updates, businesses can stay ahead of cybercriminals. Without them, they could be at risk for coordinated cyberattacks by criminals who target companies that do not update their products regularly.
    7.  Neglecting Employee Training
    Basic cybersecurity training is not enough for employees anymore. Employees are often the first point of contact for hackers. After all, hackers know that employees are the least knowledgeable about cyberattacks.
    Part of employee training is also incorporating formal cybersecurity policies. Schedule training sessions to discuss and emphasize these policies during the workday.
    Rules to include in a business’s formal policy include using company devices on public wi-fi networks, downloading unauthorized software on company devices and not sharing company devices with non-employees.
    Create an employee checklist to make sure businesses hit all the most important subjects. For example, teach workers how to properly dispose of data and equipment. And train employees to back up this data in a way that won’t compromise its security.
    8.  Not Using Two-Factor Authentication
    Two-factor authentication, also known as 2FA or multi-factor authentication (“MFA”), is a security strategy used to log into systems. 2FA creates an extra layer of security over sensitive data.
    To do 2FA, businesses need a password and second login method. For example, some systems may require them to log into a system using an authentication code sent to an employee’s email or phone.
    Hackers cannot get the code needed to log in without access to an employee’s email or phone. The more difficult businesses make it for a cybercriminal to get into their systems, the less likely they are to try.
    9.  Reusing Passwords
    Does your business use the same password or passwords for all their systems? If so, two-factor authentication may not be sufficient protection. The same is true of shorter passwords and passwords that are not randomly generated.
    When creating passwords, try randomly generated strings of numbers and letters, uppercase and lowercase. Also, avoid using patterns in keywords. That includes patterns like ‘abcd’ and ‘1234.’
    Other password security best practices include using longer passwords. Experts recommend using passwords with 16 characters or more. Also, consider using password managers to store and retrieve login information securely.
    Another thing to consider with passwords is who needs access to them. For example, do all the employees need access to every system at the business? If not, consider creating one-time passwords for situations when non-regular users need access to a particular system.
    10.  Not Thinking About Prevention
    The best way to prevent costly breaches at a workplace is to prevent them from happening in the first place. These tips on our list can help. But what happens if businesses do not have an IT department or CIO to prevent cyberattacks? Learn about what managed cybersecurity solutions for companies are and how businesses can use external services to augment what they have.
    Are You Making These Common Cybersecurity Mistakes?
    Businesses lose millions of dollars to the above cybersecurity mistakes each year. You do not have to be one of them. It’s important for businesses to train their IT departments and employees and follow basic cybersecurity protocols to shore up their operational cyber plans.
     
    Rahul Mahna is a Partner in the firm and leads the Outsourced IT Services team with over 20 years of experience in IT technologies, software development and cybersecurity services.
    Transform, Build, Innovate and Connect
    ©2023 Eisner Advisory Group LLC. All rights reserved.
    “EisnerAmper” is the brand name under which EisnerAmper LLP and Eisner Advisory Group LLC, independently owned entities, provide professional services in an alternative practice structure in accordance with applicable professional standards. EisnerAmper LLP is a licensed CPA firm that provides attest services, and Eisner Advisory Group LLC and its subsidiary entities provide tax and business consulting services.
    “EisnerAmper” is the brand name under which EisnerAmper LLP and Eisner Advisory Group LLC provide professional services. EisnerAmper LLP and Eisner Advisory Group LLC practice as an alternative practice structure in accordance with the AICPA Code of Professional Conduct and applicable law, regulations and professional standards. EisnerAmper LLP is a licensed independent CPA firm that provides attest services to its clients, and Eisner Advisory Group LLC and its subsidiary entities provide tax and business consulting services to their clients. Eisner Advisory Group LLC and its subsidiary entities are not licensed CPA firms. The entities falling under the EisnerAmper brand are independently owned and are not liable for the services provided by any other entity providing services under the EisnerAmper brand. Our use of the terms “our firm” and “we” and “us” and terms of similar import, denote the alternative practice structure conducted by EisnerAmper LLP and Eisner Advisory Group LLC.

    source

  • LSU will start training students for its own cybersecurity center – 225 Baton Rouge


    #225BATONROUGE

    LSU is establishing two student-run security operations centers, or SOCs, to provide the university’s Baton Rouge and Shreveport campuses with cybersecurity protection and response.
    To staff the SOCs, the university announced it has signed an agreement with cybersecurity firm TekStream to provide training to the students at the same level it trains its own employees on cyberattacks, analysis, network defense, policy and escalation, and real-time response tactics to actual incidents.


    Losses from cyberattacks have seen a five-fold increase over the past five years, according to the latest data reported by the FBI Internet Crime Complaint Center. Higher education is one target of the malicious online attacks, as evidenced by the suspected cyberattack that recently caused campuswide internet disruptions at Southeastern Louisiana University, as reported by Louisiana Illuminator.
    The initiative is being funded out of the $2.5 million the Legislature approved in 2022 for cyber education and research at the Baton Rouge and Shreveport campuses. Read the announcement.
    This story originally appeared in a March 8 issue of Daily Report. To keep up with Baton Rouge business and politics, subscribe to the free Daily Report e-newsletter here.

    source

  • 2023: SUNY Canton Cybersecurity Program Named NSA National … – SUNY Canton

    Home > News > 2023 > Cyber NSA
    Published:
    SUNY Canton’s four-year Cybersecurity Program continues its unparalleled growth with a new U.S. National Security Agency (NSA) designation.
    The NSA and Department of Homeland Security recently informed the Center for Criminal Justice, Intelligence and Cybersecurity that it has received a National Center of Academic Excellence in Cyber Defense (CAE-CD) designation. Cybersecurity previously received NSA Program of Study Validation approximately six months ago.
    Jacob Harding works on a project in the Cybersecurity lab.
    “A highly skilled cybersecurity workforce is a strategic national security advantage,” said NSA CAE Program Manager Annie Becker. “The United States Government will continue to invest in and enhance programs that build the domestic talent pipeline, from primary through postsecondary education.”
    The program met the increasing demands to serve the nation and contribute to protecting the National Information Infrastructure. A National Cyber Strategy authored in 2018 outlined the critical shortage of professionals with cybersecurity skills and highlighted the importance of higher education as a solution to defending America’s cyberspace.
    SUNY Canton: NSA Center of Academic Excellence in Cyber Defense
    “The CAE-CD designation signifies SUNY Canton’s excellence and assures students and employers that the Cybersecurity program aligns with national standards for cyber defense,” said School of Science Health and Criminal Justice Dean Michele A. Snyder. “It also recognizes that we can actively contribute to the cybersecurity community locally and nationally.”
    Cybersecurity has become one of the largest programs at the college, with about 202 total students enrolled as of Fall 2022. This growth represents a more than 1400% increase from the original enrollment of 13 students when the program began in 2018. It is second only to the college’s Healthcare Management program, which has 242 total enrollments. Both programs are available entirely online with select in-person or flex class options.
    Cybersecurity has become so large that the college has created a department within the School of Science, Health and Criminal Justice to handle the influx of students and offer expanded learning opportunities.
    According to Associate Professor Kambiz Ghazinour, Ph.D., reasons for the rapid growth include increased cyber threats exacerbated by the COVID-19 pandemic, greater dependency on technology, new governmental regulatory requirements, and increasing awareness of privacy and risks associated with cybercrime.
    “Understanding cybersecurity is no longer just an option; it’s necessary for the future. As technology advances, so do the threats and vulnerabilities that come with it,” Ghazinour said. “As academics and educators, we have a responsibility to not only teach the current state of cybersecurity but also to evolve and adapt to stay ahead of the curve. Only then can we truly prepare the next generation of professionals to defend against the ever-growing threat landscape.”
    Ghazinour also oversees the college’s Advanced Information Security and Privacy (AISP) Research Lab, which provides students with the opportunity to get familiar with cutting-edge industry research. “Our students present their research articles to prestigious peer-reviews conferences and gain valuable knowledge that will help them with both future employment and graduate studies,” he said.
    SUNY Canton has joined the ranks of several other New York colleges with NSA accreditation, such as Rochester Institute of Technology, the University at Buffalo, and the University at Albany. Canton’s CJIC has established agreements with UAlbany’s College of Emergency Preparedness, Homeland Security, and Cybersecurity, which offers students a convenient pathway to pursue graduate degrees at an accelerated pace.
    As Northern New York’s premier college for career-driven bachelor’s degrees, associate degrees and professional certificate programs, SUNY Canton delivers quality hands-on programs in engineering technology, management, and healthcare fields. It is home to the Center for Criminal Justice, Intelligence and Cybersecurity. Faculty members are noted for their professional real-world experience in addition to outstanding academic credentials. As SUNY’s leader in online education, SUNY Canton OnLine offers hundreds of flexible and convenient courses as well as 23 online degree programs. The SUNY Canton Kangaroos 15 traditional athletic teams compete at the NCAA Division III level as part of the North Atlantic Conference. SUNY Canton also features varsity esports and cheerleading.
    Cybersecurity NSA Michele Snyder Kambiz Ghazinour
    34 Cornell Drive
    Canton, NY 13617
    © 2022 SUNY Canton | Web Accessibility | Privacy Statement | Non-Discrimination/Title IX

    source

  • TSCHE to introduce cyber security course for degree students – Telangana Today

    Decision to introduce a course on cyber security in degree colleges has been taken during a meeting convened by TSCHE

    Hyderabad: Given the sharp rise in cybercrime, the State Universities will not just be creating awareness but also prepare cyber warriors to tackle and prevent cybercrimes. Towards this, the universities will be offering the cyber security course at the undergraduate (degree) level from the next academic year i.e., 2023-24.
    This new course designed and developed by experts from the Osmania University and NALSAR University of Law can be chosen by any undergraduate student irrespective of their coursework. Students pursuing BSc or BA courses in the degree colleges can also take up this new elective, which will have two credits.
    Decision to introduce a course on cyber security in degree colleges has been taken during a meeting convened by Telangana State Council of Higher Education (TSCHE) Chairman Prof. R Limbadri with Revenue Principal Secretary, Commissioner of Technical and Collegiate Education Navin Mittal and Vice Chancellors of six conventional universities in the State here on Thursday.
    “Not just creating awareness on the cybercrimes, the new cyber security course will help students with employability opportunities,” Prof. Limbadri said.
    Apart from cyber security, the university will also be offering BSc (Honours) Computer Science as a major and artificial intelligence and machine learning as minor subjects from the next academic year.
    Another decision was that private affiliated degree colleges will be granted generic affiliation instead of course-wise affiliation from the next academic year. This meant all the BSc Life Sciences or Physical Sciences will be given a single affiliation instead of course-wise as is being done now. The affiliation process will be through university management system.
    During the meeting, officials reviewed the bucket system that enable students choose their subject as per their interest.
    To ensure standards in the higher education system, it was also decided to encourage all higher educational institutions in the State to go for National Assessment and Accreditation Council (NAAC) grading. The TSCHE will be providing a seed fund of Rs.1 lakh to the colleges desirous to go for the grading. It will also hold workshops and seminars with resource persons from the NAAC Bangalore on creating awareness on the grading system.
     
    © Copyrights 2022 TELANGANA PUBLICATIONS PVT. LTD. All rights reserved. Powered by Veegam

    source

  • Want data security? Concentrate on cybersecurity training, RangeForce raises $20M – VentureBeat

    Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More

    Security awareness is an organization’s greatest defense against threat actors.  Yet, research shows that last year, 80% of organizations suffered one or more breaches that they could attribute to a lack of cybersecurity skills and/or awareness. 
    As a result, cybersecurity training is one of the easiest ways that an organization can protect its data from threat actors. That’s why cybersecurity training and upskilling providers like RangeForce, which today announced it has raised $20 million as part of a series B financing round, are receiving growing interest from investors. 
    RangeForce’s solution provides organizations with a cloud-based platform to assess, refine and validate cyber-readiness with content mapped to industry frameworks such as MITRE ATT&CK and D3FEND. Through RangeForce’s platform, security teams can practice containing simulated attacks in a staged environment. 
    More broadly, this funding indicates that security awareness is playing a critical role in helping organizations maintain their data security. After all, employees not only need to have the awareness to spot common threats like phishing emails and social engineering scams, but security teams also need to learn how to remediate breaches ASAP to minimize the damage. 
    Transform 2023
    Join us in San Francisco on July 11-12, where top executives will share how they have integrated and optimized AI investments for success and avoided common pitfalls.
     
    Security awareness has grown ever more important over the past few years, as more and more cybercriminals have turned to manipulating employees with phishing emails and social engineering scams to give up information. Research from Verizon shows that 82% of breaches involve the human element. 
    “While the skill shortage plagues cybersecurity, attackers are not letting up. As a result, overloaded cybersecurity teams struggle to build and validate key defensive skills when it matters most: before an attack,” said Taavi Must, CEO and cofounder of RangeForce. 
    Preventing breaches now comes down to focusing on mitigating human risk. “Humans are the weakest link in cybersecurity. By strengthening human defense readiness with RangeForce, organizations reduce their cyber-risk and their human capital spend,” Must said. 
    RangeForce’s approach is focused on enabling employees to develop the hands-on cyberskills they need via simulated breach exercises, so they can identify and respond to social engineering threats and phishing scams. 
    Cybersecurity Ventures estimates that the overall market for security awareness training products and services will be worth $10 billion annually by 2027. 
    One of RangeForce’s main competitors, Immersive Labs, has raised $66 million in funding for a cyberworkforce-resilience platform that provides security teams with cyberevent simulations and cybersecurity labs to measure an organization’s cyber knowledge. 
    Another competitor is Cyberbit, which raised $70 million in funding from Charlesbank in 2020. Cyberbit’s platform enables security teams to undergo cyberattack simulations to identify gaps in their incident response capabilities via a readiness score. 
    Must argues that the key differentiator between RangeForce and other competitors is its continuous cyber-readiness assessment capabilities. 
    “RangeForce is designed to teach learners, providing enough support to snare consistent and continuous improvement, Must said. “We guide learners through a concept and ensure their comprehension, rather than just assessing their knowledge.”
    VentureBeat’s mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.
    Want must read news straight to your inbox?
    © 2023 VentureBeat. All rights reserved.

    source

  • HUB Cyber Security Israel : Request for Class Action Certification – Form 6-K – Marketscreener.com

    Request for Class Action Certification
    On March 6, 2023, a request was sent to HUB Cyber Security Ltd. (the “Company”) for approval of a class action which was filed in the Tel Aviv District Court - the Economic Department against the Company and its officers and directors (“request for approval” and “defendants”, respectively). The subject of the request for approval, according to what is claimed in it, is that over a period of time from March 2022 until February 2023 the Company published immediate reports in Israel to the Israel Securities Authority and the securities exchanges in Israel, that it had received an irrevocable investment commitments of $50 million in a PIPE financing (the “PIPE Financing”) that was to be consummated simultaneously with the closing of the Company’s business combination with Mount Rainier Acquisition Corp (“Mount Rainier”).
    The reason for which the request for approval was submitted is an alleged violation of the provisions of Israeli securities laws about disclosure and violations of the duties of care and negligence of the office-holders of the Company in representing to investors that they did indeed have a commitment from investors to complete the PIPE Financing and that the PIPE Financing ultimately failed to fund at the closing of the business combination at the published pro forma value of $1.28 billion.
    The group that the applicant seeks to represent in the request for approval includes all those who purchased shares of the Company from March 23, 2022, the date that the Company announced the proposed business combination with Mount Rainier, through February 23, 2023, the last day of trading of the Company on the Tel Aviv Stock Exchange. The assessment of the claimed damage as part of the approval request is NIS 91.24 million.
    As of the date of this report, the Company is still examining the claim and therefore, at this stage, is unable to assess the chances of the claim being approved as a class action and/or its scope, and if approved, whether it will have a material impact on the Company’s results of operations or financial condition.
    Attachments
    Disclaimer
    HUB Cyber Security Israel Ltd. published this content on 07 March 2023 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 07 March 2023 21:27:25 UTC.

    source

  • The US launches National Cybersecurity Strategy and other … – World Economic Forum

    The White House has announced a new cybersecurity strategy in the latest effort by the US government to bolster its cyber defences amid a steady increase in hacking and digital crimes targeting the country.
    The strategy, which is intended to guide future policy, urges tighter regulation of existing cybersecurity practices across industries and improved collaboration between the government and private sector.
    It seeks to broadly improve industry accountability over the cybersecurity of American critical infrastructure, such as hospitals and dams.
    The Biden administration has also announced a new plan to improve the digital defences of public water systems.
    The water system plan, which recommends a series of rules placing more responsibility for securing water facilities at state level, follows several high-profile hacking incidents in recent years.
    New Zealand has become the latest nation to limit use of the video-sharing app TikTok on devices with access to the parliamentary network, amid cybersecurity concerns.
    As of 20 March, 10 economies had taken steps to ban the app, including the US and UK, which has banned TikTok on government phones with immediate effect.
    The UK government asked the National Cyber Security Centre to look at the potential vulnerability of government data from social media apps and risks around how sensitive information could be accessed and used.
    The US government’s Committee on Foreign Investment in the United States (CFIUS), a powerful national security body, in 2020 unanimously recommended ByteDance divest TikTok because of fears that user data could be passed on to China’s government.
    In early March, legislators from both major US parties introduced a bill to ban the app in the United States. Congress previously passed a bill in December 2022 to ban TikTok on federal devices.
    TikTok said on 20 March the app now has 150 million monthly active users in the US, up from 100 million in 2020.
    In late February, the European Union’s two biggest policy-making institutions – the European Commission and the EU Council – banned TikTok from staff phones for cybersecurity reasons.
    One of Australia’s top government bureaucrats has demanded Russia crack down on the large number of cybercriminals operating in the country, saying their actions posed a threat to national security. Canberra is currently reforming its cybersecurity policy following a raft of cyberattacks on some of the country’s largest companies.
    The move comes after more Australian firms were targeted with cyberattacks. Actions targeting digital payments and lending firm Latitude Group Holdings bring the total number of attacks to 12 since September 2022.
    The top US markets regulator has proposed a suite of new policies designed to harden the financial system against hacking, data theft and systems failure. The Securities and Exchange Commission’s five members voted at a public meeting to propose rules on protecting consumer financial data, preventing hacking at stock exchanges and broker-dealers, and buttressing the resiliency of market infrastructure.
    China has announced plans for a national data bureau, describing it as part of an effort to coordinate data resources in the country and to achieve a vision of “digital China” conceived by President Xi Jinping. Analysts at Chinese investment bank Citic Securities say areas to watch include data processing and data encryption.
    Experts are warning that cybercriminals and scammers are taking advantage of the urgent need for aid in south-eastern Türkiye and north-western Syria, following the devastating earthquake in February – launching fake online donation platforms and charities to swindle donors out of their money.

    President Joe Biden’s new National Cybersecurity Strategy outlines steps the government is taking to secure cyberspace and build a resilient digital ecosystem that is easier to defend than attack – and that is open and safe for all. Here’s an in-depth look at the plan, including how the World Economic Forum’s cybersecurity efforts support the priorities identified.
    In a fast-evolving digital ecosystem, decision-makers in government, industry, academia and civil society need to anticipate and address tomorrow’s cybersecurity challenges to stay ahead of the curve. We’ve identified seven key insights, tensions, and trade-offs that will likely shape the future of cybersecurity and that can help an organization better prepare to face cyberthreats.

    In this era of “polycrisis” with renewed threats from growing geopolitical tensions, achieving cyber-resilience is one of the biggest cybersecurity challenges: it is not a one-time or a one-actor effort, a harmonized approach that stretches across borders and businesses is necessary.
    About Us
    Events
    Media
    More from the Forum
    Partners & Members
    Language Editions
    Privacy Policy & Terms of Service
    © 2023 World Economic Forum

    source