Category: Uncategorized

  • These are the best UK cities for cybersecurity jobs – UKTN (UK Technology News

    When we think of cybercrime, we tend to think of hackers breaking into confidential files, scammers conning innocent civilians, or sophisticated gangs targeting multinational companies – or even government departments.
    The flip side of this is a soaring demand for cybersecurity jobs to keep on top of the well-documented rise in cybercrime affecting businesses and consumers.
    According to The CyberEdge 2022 Cyberthreat Defense Report (CDR) 81.4% of organisations in the UK experienced at least one cyber attack in 2021, compared to 71.1% in the previous annual findings.
    According to government reports, there are now over 1,800 cybersecurity firms with operations in the UK. This includes tech and professional services giants such as Darktrace, EY, and Sophos, as well as smaller firms like 10Duke, Becrypt, and Activereach.
    In the last 12 months, the sector’s revenue has grown to more than £10bn for the first time. But what is driving this growth aside from the growing number of cyberattacks?
    First up is investment. Last year was a record for external investment into the sector – with over £1bn raised by firms across the UK.
    In addition to this, the UK government is championing cybersecurity across the board with various initiatives. These include Cyber ASAP, which supports academics to commercialise their research, and Tech Nation Cyber, which is the UK’s first cyber scale-up programme. It supports companies poised for substantial growth at home and abroad. The Cyber101 programme delivers bootcamps around the country to help cyber SMEs develop essential business skills.
    The biggest contributing factor is probably the UK’s highly educated workforce. According to the Department for Digital, Culture, Media & Sport, more than 6,000 new jobs were added to the UK’s 50,000-strong cyber workforce over the last few years. It looks like this acceleration won’t be slowing down anytime soon.
    The global cybersecurity market is projected to bring in over $500bn by 2030, according to a new study by Grand View Research Inc. So, if you want a career that’s got great earning potential (£46,255 average salary according to Indeed), sound job prospects, and plenty of room for growth then consider cybersecurity.
    But, where are the top cybersecurity cities in the UK, and what companies are hiring at the moment? Let’s take a look.
    According to the United Nations Global Cybersecurity Index, London is the best city in Europe for cybersecurity professionals. But why?
    London is home to defence companies including BAE Systems, Thales, Lockheed Martin Corporation, and Northrop Grumman. Along with these well-known companies comes a huge amount of investment and networking opportunities.
    The city also has a steady pipeline of talent from top universities such as King’s College and nearby Cambridge. In fact, 27% of the UK’s cybersecurity workforce is based here.
    If you’d like to join them, there is a compliance officer, VP role available at investment bank Citi. The right candidate will need a bachelor’s degree, knowledge of compliance laws, and strong interpersonal skills.
    Reading’s proximity to London and Heathrow airport has long attracted major multinationals, including Microsoft and Oracle. However, its startup community is also growing.
    One of Reading’s big homegrown cybersecurity success stories is Datasift. Founded in 2010, Datasift is a privacy-by-design data and analytics platform. It was acquired by San Francisco-based Meltwater in March 2018, helping to cement the city’s cybersecurity bona fides.
    The University of Reading has also been instrumental in encouraging tech companies and startups. In 2018, the university established the Thames Valley Science Park.
    If you’d like to work in Reading, Liberty Global is on the hunt for a senior cybersecurity analyst who can demonstrate taking ownership of, and responsibility for resolving issues. To apply, you’ll need experience working within a security operations centre, Splunk reporting and analysis, as well as experience in SIEM operation and configuration.
    Wales has a thriving cybersecurity sector. The country has two universities, Cardiff and USW, that are recognised by the National Cyber Security Centre as Academic Centres of Excellence in either research or teaching.
    Earlier this year, the Welsh government announced that a new cyber innovation hub to help Wales become a global leader in this sector will be launched, thanks to £3m investment from the Welsh Government.
    The hub is being led by Cardiff University with partners including Airbus, Alacrity Cyber, CGI, Thales NDEC, and Tramshed Tech, and will train more than 1,000 cyber-skilled individuals by 2030.
    Starling Bank is hiring in Cardiff for a senior penetration tester. You’ll work with some of the industry’s most talented cybersecurity professionals to protect customers, company assets, and systems using the latest technologies and techniques.
    Want to work in the burgeoning cybersecurity sector? Find your next role on the UKTN Job Board
    This article is part of a paid partnership with careers marketplace Jobbio to share the most exciting UK tech jobs with UKTN readers.

    source

  • Cybersecurity skills shortage has led to a talent war between … – FedScoop

    Unlocking Data as a Strategic Asset – Presented by ICF

    Driving Cloud-first Strategies in the Public Sector – Presented by AWS

    Accelerating Modern Government – Presented by KPMG

    5G-Powered Smart Bases – Presented by Verizon
    By

    The Commerce Department has been forced to poach cybersecurity employees from other agencies in the federal government, the agency’s CIO André Mendes said.
    “We’re basically hiring people from one federal agency to another. We’re stealing people from each other, that’s what it’s come down to,” Mendes told FedScoop.
    “It’s a very, very tough situation with cybersecurity hiring. It’s extremely difficult getting the right people with the right skills right now,” said Mendes who spoke at the FedTalks tech conference on Wednesday, hosted by FedScoop.
    The hiring challenges are likely due to a tight labor market and a severe shortage of skilled cyber engineers and analysts.
    CyberSeek, a recruiting website for cybersecurity jobs in the U.S., funded by the Commerce Department, estimates there are currently 714,548 open cybersecurity jobs nationwide, which includes positions in the public and private sector. 
    In the public sector or the government, the website estimates there are almost 39,000 vacant cyber jobs and 69,322 cybersecurity experts currently employed.
    There has been a huge surge in cybersecurity job openings in the past year, following a series of massive attacks in the the last two years on the computer systems of the federal government, the Colonial Pipeline, and the meat producer JBS that have brought mainstream awareness to the need for increased cybersecurity within the government and the private sector.
    Alongside difficulties hiring cybersecurity experts, Mendes also said the federal government has struggled with holding its tech vendors and contractors accountable for cybersecurity flaws and issues.
    “All federal agencies have to hold their vendors accountable in terms of susceptibilities. So that when you sell a product to the federal government, you have to give some assurances that the product performs as indicated, and does not unduly expose you to cybersecurity attacks because of flaws that are inherent in its scope,” Mendes said.
    The President’s National Security Telecommunications Advisory Committee (NSTAC) on Tuesday put forward proposals that would require all executive civilian branch agencies to monitor operational technology systems in real-time.
    Mendes said the presidential proposals would help improve cybersecurity but would receive strong pushback from the tech industry and IT vendors.
    “The administration has just started with the process and there will be an enormous amount of lobbying against it by vendors trying to minimize its effect. Vendors will do their best to minimize their exposure to change because they don’t want to have the accountability, they haven’t had accountability in the past, so why should they have it now? But the reality is that in the current environment, we can’t afford not to have accountability,” Mendes said.
    Shortly after becoming the Commerce Department CIO in 2020, Mendes said that he would like to see greater accountability within the federal government regarding agency IT budgets due to “black hole” spending related to regulatory frameworks or modernization.
    Mendes said he has worked in the past few years to use his almost $4.0 billion a year budget in a more efficient manner with less spending on IT tools and resources.
    “We can show definite cost avoidance to a large degree by virtue of more collaboration within the agency in the past couple of years,” Mendes said.
    “We’re leveraging those dollars elsewhere, where they’re more driven towards the mission of the Commerce bureaus and official business and less towards IT infrastructure,” he added.
    Commerce spends approximately 30% of its budget on IT driven by heavy users like the National Oceanic and Atmospheric Administration, National Institute of Standards and Technology, U.S. Patent and Trademark Office, and Census Bureau. 
    Mendes, however, drove the International Trade Administration, where he served previously as CIO, to spend only 10% of its budget on IT because of its cloud-first environments and abstraction layers. 
    This allowed the agency to automate more processes and freed up employees for work more tied to mission areas like tariffs.

    source

  • Some Cybersecurity Pros Are Already Using ChatGPT With … – CRN

    While Microsoft is planning to widely deploy the AI chatbot within its product portfolio, some cybersecurity professionals are already tying together ChatGPT with the Microsoft Sentinel security analytics platform.
    While OpenAI backer Microsoft has very been clear that it has big plans for integrating its platforms with ChatGPT, some cybersecurity pros aren’t waiting on Microsoft.
    In recent days, several cybersecurity professionals have published information online about how to integrate the AI-powered chatbot with Microsoft Sentinel, the widely used Microsoft cybersecurity analytics platform.
    [Related: 5 Big Pros And Cons Of ChatGPT For Cybersecurity]
    “By harnessing the power of ChatGPT, I believe it is possible to speed up and simplify the incident handling process, making it more efficient and effective for all involved,” wrote IT security pro Antonio Formato in a post on Medium Monday.
    Another recent Medium post by cyber pro Zubair Rahim included step-by-step instructions for connecting ChatGPT with Microsoft Sentinel. “Integrating ChatGPT with Microsoft Sentinel for incident management offers numerous benefits such as automating responses, providing accurate and timely answers, and streamlining incident management workflow,” Rahim wrote.
    Microsoft Sentinel is among the company’s key cybersecurity offerings and now has more than 20,000 customers, up from 15,000 a year ago, Microsoft disclosed last week.
    The potential is definitely there for OpenAI’s ChatGPT to help security analysts, who work with SIEM (security information and event management) tools like Microsoft Sentinel, to help automate and expedite some of the typically manual analysis of security incidents, according to Michael Montagliano, CISO at Atlanta-based solution provider ProArch.
    At this early stage, though, more testing of the types of integration methods that are now being posted online is definitely necessary, which ProArch plans to do, Montagliano told CRN.
    “We are going to test that integration into Sentinel in a lab environment,” he said. “One of the things you have to be cautious about is is that accurate? Is it dependable?”
    Robert Boyce, Accenture’s global lead for cyber resilience services, told CRN last week that Accenture Security sees major potential in using ChatGPT’s capabilities for automating some of the work involved in cyberdefense. While there has been major attention paid to the possible nefarious uses of the chatbot by hackers, it’s clear that the tool “helps reduce the barrier to entry with getting into the defensive side as well,” Boyce said.
    Last week, Microsoft said it’s making a new “multiyear, multibillion-dollar investment” into OpenAI, which reportedly amounts to $10 billion. Microsoft had previously invested more than $3 billion into OpenAI starting in 2019, and OpenAI uses Microsoft Azure for its cloud infrastructure.
    Earlier this month, Microsoft announced the general availability of its Azure OpenAI Service, which leverages OpenAI technologies including GPT-3.5. The company noted that “customers will also be able to access ChatGPT—a fine-tuned version of GPT-3.5 that has been trained and runs inference on Azure AI infrastructure—through Azure OpenAI Service soon.”
    During Microsoft’s quarterly call with analysts last week, Chairman and CEO Satya Nadella said that the company plans to deploy OpenAI technology “across our consumer and enterprise products as we continue to push the state of the art in AI.”
    OpenAI, which is also behind the DALL-E 2 image generator, and whose backers include Microsoft, first introduced ChatGPT in late November. While it’s been massively popular among users, it’s come under fire from a number of critics, including some of Microsoft’s competitors. For instance, Amazon Web Services CTO Werner Vogels Tuesday slammed ChatGPT as being “not concerned about the truth.”
    Kyle Alspach is a Senior Editor at CRN focused on cybersecurity. His coverage spans news, analysis and deep dives on the cybersecurity industry, with a focus on fast-growing segments such as cloud security, application security and identity security.  He can be reached at kalspach@thechannelcompany.com.

    source

  • Your cybersecurity staff are burned out – and many have thought about quitting – ZDNet

    Most Popular
    A man looking tired and stressed out while sitting at his computer.
    Cybersecurity staff are feeling burnout and stressed to the extent that many are considering leaving their jobs. 
    According to research by VMware, 47% of cybersecurity incident responders say they’ve experienced burnout or extreme stress over the past 12 months.  
    While that’s slightly down compared with 51% the previous year, unsurprisingly the percentage of people who say the stress of working in cybersecurity has made them think about leaving their jobs has slightly increased. 
    Of this group, 69% say stress and burnout has resulted in them considering their position, compared with 65% in 2021. 
    Cybersecurity can be stressful work; not only do staff need to stay on top of threats posed by cyber criminals, ransomware gangs and even nation-state sponsored hacking campaigns, they also need to ensure their users are equipped with the right tools needed to stay safe – often while working with a restricted cybersecurity budget and a wider team who don’t always understand what they do.
    On top of that, there’s also the challenge of managing security vulnerabilities, particularly when significant new zero-day exploits emerge and get used by hackers – according to the survey, 62% of respondents encountered a zero-day exploit in the last 12 months, compared to 51% during the previous year. 
    Meanwhile, two thirds said the number of cyber attacks has increased since Russia’s invasion of Ukraine – something which cybersecurity agencies warned was a possibility when the war started.   
    SEE: A winning strategy for cybersecurity (ZDNET special report) 
    And all of this is happening while many cybersecurity teams are still dealing with the shift towards hybrid working, which while beneficial for many, also brings additional cybersecurity challenges which criminals will attempt to exploit. 
    If these pressures are pushing cybersecurity employees away from their jobs, that could have negative repercussions for everyone because fewer cybersecurity staff means it could make it easier for cyber criminals to breach networks – and remain inside them without being detected.  
    In order to help combat burnout, many businesses are implementing strategies designed to help cybersecurity personnel manage the balance between their work life and their home life.  According to 72% of respondents, the most helpful one of these is flexible hours, while investment in further education and access to therapy and coaching are also listed as helpful. 
    “Broadly speaking, companies are taking the right steps when it comes to easing burnout among cybersecurity professionals,” said Rick McElroy, principal cybersecurity strategist at VMware 
    “But solving this issue isn’t a simple, one-time fix. Now is the time to really double down on wellness efforts, such as flexible hours, more education, and coaching and therapy,” he added. 
    MORE ON CYBERSECURITY

    source

  • 10 Most Common Types of Cyber Attacks Today – CrowdStrike

    Kurt Baker – February 13, 2023
    A cyber attack is an attempt by cybercriminals, hackers or other digital adversaries to access a computer network or system, usually for the purpose of altering, stealing, destroying or exposing information.
    Cyberattacks can target a wide range of victims from individual users to enterprises or even governments. When targeting businesses or other organizations, the hacker’s goal is usually to access sensitive and valuable company resources, such as intellectual property (IP), customer data or payment details.
    Malware — or malicious software — is any program or code that is created with the intent to do harm to a computer, network or server. Malware is the most common type of cyberattack, mostly because this term encompasses many subsets such as ransomware, trojans, spyware, viruses, worms, keyloggers, bots, cryptojacking, and any other type of malware attack that leverages software in a malicious way.
    A Denial-of-Service (DoS) attack is a malicious, targeted attack that floods a network with false requests in order to disrupt business operations.
    In a DoS attack, users are unable to perform routine and necessary tasks, such as accessing email, websites, online accounts or other resources that are operated by a compromised computer or network. While most DoS attacks do not result in lost data and are typically resolved without paying a ransom, they cost the organization time, money and other resources in order to restore critical business operations.
    The difference between DoS and Distributed Denial of Service (DDoS) attacks has to do with the origin of the attack. DoS attacks originate from just one system while DDoS attacks are launched from multiple systems. DDoS attacks are faster and harder to block than DOS attacks because multiple systems must be identified and neutralized to halt the attack.
    Phishing is a type of cyberattack that uses email, SMS, phone, social media, and social engineering techniques to entice a victim to share sensitive information — such as passwords or account numbers — or to download a malicious file that will install viruses on their computer or phone.
    Common phishing attacks include:
    Spoofing is a technique through which a cybercriminal disguises themselves as a known or trusted source. In so doing, the adversary is able to engage with the target and access their systems or devices with the ultimate goal of stealing information, extorting money or installing malware or other harmful software on the device.
    Spoofing can take different forms, which include:
    CrowdStrike’s findings show that 80% of all breaches use compromised identities and can take up to 250 days to identify.
    Identity-driven attacks are extremely hard to detect. When a valid user’s credentials have been compromised and an adversary is masquerading as that user, it is often very difficult to differentiate between the user’s typical behavior and that of the hacker using traditional security measures and tools.
    Some on the most common identity-based attacks include:
    Code injection attacks consist of an attacker injecting malicious code into a vulnerable computer or network to change its course of action. There are multiple types of code injection attacks:
    A supply chain attack is a type of cyberattack that targets a trusted third-party vendor who offers services or software vital to the supply chain. Software supply chain attacks inject malicious code into an application in order to infect all users of an app, while hardware supply chain attacks compromise physical components for the same purpose. Software supply chains are particularly vulnerable because modern software is not written from scratch: rather, it involves many off-the-shelf components, such as third-party APIs, open source code and proprietary code from software vendors.
    IT teams that solely focus on finding adversaries external to the organization only get half the picture. Insider threats are internal actors such as current or former employees that pose danger to an organization because they have direct access to the company network, sensitive data, and intellectual property (IP), as well as knowledge of business processes, company policies or other information that would help carry out such an attack.
    Internal actors that pose a threat to an organization tend to be malicious in nature. Some motivators include financial gains in exchange for selling confidential information on the dark web, and/or emotional coercion using social engineering tactics. On the other hand, some insider threat actors are not malicious in nature but instead are negligent in nature. To combat this, organizations should implement a comprehensive cybersecurity training program that teaches stakeholders to be aware of any potential attacks, including those potentially performed by an insider.
    Learn more about the different types of social engineering attacks to better understand how to prevent and remediate against each one. Read: 10 Types of Social Engineering Attacks
    DNS Tunneling is a type of cyberattack that leverages domain name system (DNS) queries and responses to bypass traditional security measures and transmit data and code within the network.
    Once infected, the hacker can freely engage in command-and-control activities. This tunnel gives the hacker a route to unleash malware and/or to extract data, IP or other sensitive information by encoding it bit by bit in a series of DNS responses.
    DNS tunneling attacks have increased in recent years, in part because they are relatively simple to deploy. Tunneling toolkits and guides are even readily accessible online through mainstream sites like YouTube.
    An IoT attack is any cyberattack that targets an Internet of Things (IoT) device or network. Once compromised, the hacker can assume control of the device, steal data, or join a group of infected devices to create a botnet to launch DoS or DDoS attacks.
    [According to the Nokia Threat Intelligence Lab, connected devices are responsible for nearly one-third of mobile network infections – more than double the amount in 2019.]
    Given that the number of connected devices is expected to grow rapidly over the next several years, cybersecurity experts expect IoT infections to grow as well. Further, the deployment of 5G networks, which will further fuel the use of connected devices, may also lead to an uptick in attacks.
    What are Internet of Things (IoT) Devices?
    Devices include traditional endpoints, such as computers, laptops, mobile phones, tablets and servers, as well as non-traditional items, such as printers, cameras, appliances, smart watches, health trackers, navigation systems, smart locks or smart thermostats.

    A comprehensive cybersecurity strategy is absolutely essential in today’s connected world. From a business perspective, securing the organization’s digital assets has the obvious benefit of a reduced risk of loss, theft or destruction, as well as the potential need to pay a ransom to regain control of company data or systems. In preventing or quickly remediating cyberattacks, the organization also minimizes the impact of such events on business operations.
    Finally, when an organization takes steps to deter adversaries, they are essentially protecting the brand from the reputational harm that is often associated with cyber events — especially those that involve the loss of customer data.
    Below are some recommendations we offered in our 2022 Global Threat Report to help organizations improve their security posture and ensure cybersecurity readiness:
    Download the 2022 Global Threat Report to find out how security teams can better protect the people, processes, and technologies of a modern enterprise in an increasingly ominous threat landscape.
    Kurt Baker is the senior director of product marketing for Falcon Intelligence at CrowdStrike. He has over 25 years of experience in senior leadership positions, specializing in emerging software companies. He has expertise in cyber threat intelligence, security analytics, security management and advanced threat protection. Prior to joining CrowdStrike, Baker worked in technical roles at Tripwire and had co-founded startups in markets ranging from enterprise security solutions to mobile devices. He holds a bachelor of arts degree from the University of Washington and is now based in Boston, Massachusetts.

    source

  • The highest paying jobs in the cyber security industry? – HackRead

    Find out which are the highest-paying jobs in the cyber security industry that businesses need so desperately.

    Cyber security is an ever-expanding and rapidly growing field, with no sign of slowing down anytime soon. As businesses become more reliant on online services and digital products, the need for cyber security professionals increases.  But who are these professionals? What do they do?
    Experts from job aggregator Jooble affirm that there are many job opportunities in the field of cyber security which pay well. Let’s dive into the world of cybersecurity jobs to explore which job pays what.
    As the highest-paid executive in the cyber security sphere, CISOs can earn up to $200k plus bonuses for their expertise. As businesses become increasingly dependent on technology, the need for strong cybersecurity strategies and solutions is more pressing than ever before.
    CISOs are responsible for leading their teams to develop security policies, implement technologies, and monitor threats. They also serve as an important point of contact between organizations and the outside world, helping ensure that data and networks remain safe. With so much responsibility, it’s no surprise that CISOs are in great demand.
    Cyber Security Architects are responsible for designing and implementing security plans and systems, as well as assessing potential risks. They can earn up to $150k per year depending on experience and the size of their organization.
    Cyber Security Architects also ensure that all necessary safety protocols are in place and regularly review the security of their systems. They are also responsible for creating disaster recovery plans, in case of an attack or other security breach.
    Cyber Security Architects have a diverse set of skills, from technical know-how to process design, that all come together to create a secure network environment. The combination of these various pieces allows them to protect a company from the ever-evolving cyber threats of today and tomorrow.

    3. Security Analyst

    A Security Analyst is a professional who is responsible for protecting an organization’s data, networks, and systems from security threats. They use their knowledge of information security best practices to identify potential vulnerabilities, then create and implement solutions that mitigate risk and defend against attacks.
    In addition, they are often involved in developing policies and procedures that ensure compliance with government regulations related to data security. Security Analysts also monitor network traffic and audit logs for signs of malicious activity, as well as provide technical support to end-users who are experiencing security issues.
    By staying up to date on the latest industry trends and tools, they can ensure that their organization’s networks remain safe from cyber threats. They can earn up to $125k plus bonuses depending on experience.
    An Ethical Hacker is a computer and network security professional who helps protect organizations by identifying potential threats and vulnerabilities in the system. They use their knowledge of hacking techniques to simulate cyber-attacks and assess how secure an organization’s infrastructure is.
    By doing this, they can identify areas of risk, develop appropriate countermeasures, and help prevent malicious attacks. Ethical Hackers are also known as ‘white hats’ or ‘good guys’ because they use their technical skills to protect rather than exploit networks.
    They may work for organizations in-house or provide consulting services externally. As well as having a detailed understanding of hacking techniques and technologies, an Ethical Hacker must also have strong communication and problem-solving skills in order to be effective. They can earn up to $115k per year.

    A Security Engineer is responsible for the implementation and maintenance of an organization’s security systems. They may also design, implement, test, and maintain security solutions to protect computer networks from unauthorized access.
    Security Engineers plan and develop secure networks within their organizations, as well as review existing systems for vulnerabilities. Additionally, they are in charge of ensuring that all security systems remain up to date to protect against potential threats.
    In short, Security Engineers ensure that sensitive data is kept safe and secure in the digital world. They are essential for any business wanting to stay ahead of the game when it comes to cybersecurity. Without their expertise and dedication, organizations would be at serious risk of cyber attacks and data loss. They typically make up to $110k per year.
    It is a hotly discussed topic in current times. With the ever-evolving technology landscape, it is paramount that companies keep an eye on emerging cyber threats and invest in systems to effectively protect their operations. Organizations need to understand the importance of not only investing in state-of-the-art cybersecurity solutions but also having the right personnel to put these solutions into action.
    The cybersecurity industry has been growing exponentially in recent years, and this trend is expected to continue into the future. As new forms of technology develop, so too will cyber threats as hackers become increasingly sophisticated. Companies must be prepared to protect their data by investing in personnel with specialized skills, as well as systems that are tailored to their industry.
    The future of cyber security is also dependent on government policy and regulations. As new laws are put in place, companies must comply with them or risk facing hefty fines or even criminal charges if they do not take appropriate security measures. It is therefore essential that organizations look ahead to ensure they stay up-to-date with the latest laws and regulations.

    The future of cyber security is bright, with the industry offering a wealth of opportunities for those willing to invest in the training required to become an expert in this field. Cybersecurity professionals are highly sought after and can expect to be rewarded well for their knowledge and skills.
    Cybersecurity is an important and growing industry, with a high demand for qualified professionals. The jobs listed in this article are some of the highest paying in the field, so if you’re looking to make a career change or upgrade your skillset, this could be the perfect time to do it.

    Super secure VPN
    Minimal data logging
    Favorable privacy policy
    Visit IPVanish
    HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.
    Hackread.com is among the registered trademarks of Gray Dot Media Group Ltd. Company registration number 12903776 in regulation with the United Kingdom Companies House. The registered address is 85 Great Portland Street, London, England, W1W 7LT The display of third-party trademarks and trade names on the site do not necessarily indicate any affiliation or endorsement of Hackread.com. If you click an affiliate link and buy a product or service, we may be paid a fee by that merchant.

    source

  • How Japan Is Modernizing Its Cybersecurity Policy • Stimson Center – Stimson Center

    The war in Ukraine began during and influenced the revision process of the NSS. The war has the characteristics of a hybrid war, consisting of physical combat, information warfare, and cyber warfare, and has had a major impact on the national security discussion in Tokyo. The Liberal Democratic Party (LDP) proposal for the NSS revision released in April 2022 describes an urgent need to develop a posture for information warfare, as “in light of Russia’s aggression against Ukraine this year, preparation for information warfare is an urgent issue.” In response to the debate on the need to deal with information warfare, the new NSS describes the creation of an organization within the government to deal with information warfare as “a new structure will be established within the Government to aggregate and analyze the situation on disinformation originated abroad.”
    On December 16, 2022, the Japanese government approved a cabinet decision on security-related strategic documents: the National Security Strategy (NSS), National Defense Strategy (NDS), and Defense Buildup Program (DBP). The NSS is the principle for Japan’s national security strategy for the next 10 years, defining diplomatic and defense strategies in response to the new security environment. The NDS, renamed from the National Defense Program Guideline, defines the Japan Self-Defense Force’s (JSDF) defense strategy for the next decade, setting goals for national security and outlining approaches and means to achieve them. The DBP, renamed from the Mid-term Defense Program, indicates a medium- to long-term development plan that includes the level of defense capability and the procurement plan.
    The revision of the NSS marks a major turning point in Japan’s post-World War II national security policy. The following six points are its major changes. First, it points out the fundamental changes in the security environment, especially China’s military rise becoming a threat to Japan’s security; second, it calls for raising the defense budget to 2% of GDP in FY2027; third, it plans for procuring missiles with a range of about 1,000 km and possessing a counterattack capability; fourth, in the cyber domain, it plans to introduce active cyber defense; fifth, it specifies the procurement of various types of unmanned weapons, and the sixth, it supports expanding exports of defense equipment.
    In line with the revised strategy, the DBP has been completely revised, and defense expenditures of 43 trillion yen will be allocated over five years starting in 2023.
    There are two significant changes in the cyber area of this new NSS: the development of a posture for information warfare and the introduction of active cyber defense in cybersecurity.
    The war in Ukraine began during and influenced the revision process of the NSS. The war has the characteristics of a hybrid war, consisting of physical combat, information warfare, and cyber warfare, and has had a major impact on the national security discussion in Tokyo. The Liberal Democratic Party (LDP) proposal for the NSS revision released in April 2022 describes an urgent need to develop a posture for information warfare, as “in light of Russia’s aggression against Ukraine this year, preparation for information warfare is an urgent issue.” In response to the debate on the need to deal with information warfare, the new NSS describes the creation of an organization within the government to deal with information warfare as “a new structure will be established within the Government to aggregate and analyze the situation on disinformation originated abroad.”
    Reflecting the new NSS, in the FY2023 budget, the Ministry of Foreign Affairs plans to use artificial intelligence (AI) to enhance monitoring of the information space and strengthen intelligence analysis. The Ministry of Defense is also planning to introduce an automatic information gathering and analysis system using AI technology to grasp the situation of information warfare.
    Regarding the issue of active cyber defense, the LDP proposal, describing the cyber response strategy as “necessary to consider the implementation of active cyber defense against the attacker,” was simply carried into the NSS as follows: “Japan will introduce active cyber defense for eliminating in advance the possibility of serious cyberattacks.” To implement active cyber defense, the National center for Incident readiness and Strategy for Cybersecurity (NISC) will be restructured to establish a new cybersecurity organization, which will coordinate policies in the field of cybersecurity and will command the cyber units of the JSDF and the police.
    The number of cyber personnel in the current MTDP is around a thousand, but in response to the direction in the DBP, the Ministry of Defense will train 4,000 cyber “warriors” and provide 16,000 JSDF personnel with cyber training in five years.
    In addition, several laws will be revised to implement active cyber defense. It is likely the Telecommunications Law and the Unauthorized Computer Access Prohibition Law will be revised in the near future to enable the Japanese government to conduct administrative interception, which is allowed in Western countries but not in Japan.
    Admiral Dennis Blair, the former U.S. Director of National Intelligence, described Japan’s cyber team as “minor league” at the LDP’s security subcommittee last year. If the cybersecurity posture described in the strategy documents is realized, Japan’s cyber team will be promoted to a triple-A team, if not a major league team.
    The new NSS, surprisingly, sets very high goals: “the response capabilities [of Japan] in the field of cybersecurity should be strengthened equal to or surpassing the level of leading Western countries.” Once an active cyber defense system is in place, Japan, like the U.S., will be able to monitor cyberattacks, identify attackers (attribution), and take countermeasures against attacks as a series of cyber defenses.
    In the DBP, it is stated that the JSDF will promote cooperation and interoperability in cross-domain operations, including space, cyber, and electromagnetic operations, to further strengthen the joint integrated deterrence capability of Japan and the United States. It also states that the cyber threat-hunting capabilities of the SDF’s cyber units will be strengthened, which means that the SDF’s cyber units will have cyber counterattack capabilities soon.
    In the event of a Taiwan contingency, it is highly likely that hybrid warfare, combining military and non-military means to achieve military objectives, will be implemented. If the posture stipulated in the new strategic documents is in place within five years, Japan will have the capability and structure to fight in cyberspace. Further, the JSDF’s cyber units will share the mission with the U.S. military’s cyber command to defend cyberspace.
    Jun Osawa is a Senior Research Fellow at the Nakasone Peace Institute.
    Copyright The Henry L. Stimson Center
    Privacy Policy

    source

  • Laid Off by Big Tech? Cybersecurity is a Smart Career Move – Security Intelligence

    Big technology companies are laying off staff as market conditions change.
    The move follows a hiring blitz initially triggered by the uptick in pandemic-powered remote work — according to Bloomberg, businesses are now cutting jobs at a rate approaching that of early 2020. For example, in November 2022 alone, companies laid off more than 52,000 workers. Companies like Amazon and Meta also plan to let more than 10,000 staff members go over the next few years.
    As noted by Stanford Graduate School of Business Professor Jeffrey Pfeffer, part of this push to cut positions stems from a bursting bubble of business valuations. Pfeffer makes it clear, however, that in many cases, the cause here is imitative behavior. When one company starts laying off staff, others follow in what he calls a “social contagion”.
    Regardless of the underlying reason, many skilled IT professionals now find themselves out of a job. But it’s not all digital doom and gloom. There’s one tech sector that’s still struggling to find talented staff: Cybersecurity.
    Here’s why making the move to infosec may be a smart career move for former big tech staff.
    According to data from Cyber Seek, more than a million IT professionals are currently part of the cybersecurity workforce. This number has been steadily growing over the past few years. Despite the uptick, however, there are still more than 750,000 open cybersecurity positions across the country. In states such as Florida, Texas and California, there are anywhere between 25,000 and 83,000 job openings available.
    The reason for this growing gap is simple: Cybersecurity threats are on the rise, and there aren’t enough skilled professionals to meet increasing demand. From the ongoing risks of ransomware to emerging attack vectors created by work-from-home policies and the adoption of anywhere, anytime resource access, companies now face a myriad of old and new threats that can quickly derail business operations.
    For IT professionals recently laid off from big tech jobs, the move to cybersecurity can feel like a strange shift. Consider a software engineer or application developer out of a job and looking for new opportunities. They may bypass infosec openings simply because they’re not sure security would be a good fit.
    They’re not wrong. While cybersecurity is on the same spectrum as other IT opportunities, it comes with a different approach. Conflict rather than consistency is at the heart of these protective positions. Despite its significant departure from other roles, it offers a unique opportunity for growth.
    Put simply? Having an adversary fuels innovation. Instead of working on projects with a consistent path between point A and point B, cybersecurity staff must be ready to respond at a moment’s notice. Even as they’re busy implementing strategies and solutions to detect attackers earlier and mitigate malware impacts, they’re also the first line of defense against attacks in progress.
    As a result, these roles aren’t for everyone but offer a compelling career choice for those looking to challenge themselves.
    Cybersecurity-specific certifications and training can help staff stand out to recruiters and make the transition to new roles easier. But existing qualifications also play a role in helping IT professionals make the transition.
    Consider a software engineer with two decades worth of experience who was recently laid off from their job. While their skill in coding, testing and revision may not seem immediately applicable to cybersecurity, they bring a unique set of benefits to the table.
    Take the common example of a ransomware attack. Cybersecurity teams prepare for these attacks using a combination of threat intelligence solutions and incident detection tools that help shorten the time between attack and discovery. Over time, however, attackers learn — and grow. The existence of Ransomware-as-a-Service (RaaS) marketplaces showcases the commitment of malicious actors to collaborate when it benefits their ability to break down business defenses.
    In practice, this means that existing controls may slowly begin to fail as attackers enhance their approach. Our laid-off software engineer, however, can compile new code in-house to boost existing solutions and frustrate attacker efforts.
    Of course, it’s one thing to consider a move to cybersecurity. It’s another to take the plunge and start putting out applications.
    One way to help streamline the shift is with certification-based training. Consider that of the more than one million currently employed cybersecurity professionals, 213,000 hold the CompTIA Security+ certification, and 94,000 have completed the Certified Information Systems Security Professional (CISSP) course. What’s more, 140,000 of the currently unfilled security positions are asking for CISSP, while 100,000 want CompTIA Security+ completion.
    Not only do courses such as Security+ offer a great introduction to cybersecurity processes and priorities, but they also pave the way for advancement within new organizations. What’s more, many of these certification options are now available as online, self-paced courses that let IT professionals decide how and when they learn best.
    Another option for laid-off tech staff is applying for positions that include paid training to get them up to speed. A quick query of the job search site Simply Hired turns up more than 600 positions that don’t require previous cybersecurity experience and provide paid training.
    Undoubtedly layoffs will stabilize and IT hiring will eventually begin again in earnest. However, this is cold comfort for technology professionals who find themselves facing the unpleasant reality of possible unemployment.
    As one digital door closes, however, another opens. And strangely enough, it’s one that sees technology experts finding ways to keep network doors shut tight against potential attackers. Although the move to cybersecurity isn’t for everyone, the skills acquired in previous positions combined with the compelling task of adapting to an adversary’s movements make this lateral shift a great way for IT pros to capitalize on current strengths and build new skill sets that set them up for ongoing career stability.
    4 min readAs the U.S. looks to bolster electric vehicle (EV) adoption, a new challenge is on the horizon: cybersecurity. Given the interconnected nature of these vehicles and their reliance on local power grids, they’re not just an alternative option for getting…
    9 min readJames Kilner contributed to the technical editing of this blog. Nethanella Messer, Segev Fogel, Or Ben Nun and Liran Tiebloom contributed to the blog. Although in the PC realm it is common to see financial malware used in web attacks…
    3 min readYou’re likely familiar with the names of common malware strains such as MOUSEISLAND, Agent Tesla and TrickBot. But do you know how new malware threats get their names? As a cybersecurity writer, I quickly add new strains to my vocabulary.…
    IBM’s Advanced Threat Detection and Response Team (ATDR) has seen an increase in the malware family known as information stealers in the wild over the past year. Info stealers are malware with the capability of scanning for and exfiltrating data and credentials from your device. When executed, they begin scanning for and copying various directories that usually contain some sort of sensitive information or credentials including web and login data from Chrome, Firefox, and Microsoft Edge. In other instances, they…
    The art of cyber crime is in a constant state of flux and evolution. Simply staying on pace with these trends is a significant part of the CISO’s job. Today’s modern CISO must ensure they are always prepared for the next big trend and remain ahead of adversaries. As we begin to navigate 2023, the security landscape has transformed from a year ago, let alone a decade ago. The Russian invasion of Ukraine, emerging technologies like Web3 and AI, and…
    As new cybersecurity threats continue to loom, the industry is running short of workers to face them. The 2022 (ISC)2 Cybersecurity Workforce Study identified a 3.4 million worldwide cybersecurity worker gap; the total existing workforce is estimated at 4.7 million. Yet despite adding workers this past year, that gap continued to widen. Nearly 12,000 participants in that study felt that additional staff would have a hugely positive impact on their ability to perform their duties. More hires would boost proper…
    As we move deeper into a digitally dependent future, the growing concern of data breaches and other cyber threats has led to the rise of the Chief Information Security Officer (CISO). This position is essential in almost every company that relies on digital information. They are responsible for developing and implementing strategies to harden the organization’s defenses against cyberattacks. However, while many organizations don’t question the value of a CISO, there should be more debate over who this important role…
    Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.

    source

  • How to build a career in cybersecurity? – Economic Times

    Don’t miss out on ET Prime stories! Get your daily dose of business updates on WhatsApp. click here!
    The Indian capital market regulator has asked local hedge funds to declare their futures and option (F&O) trades and the underlying stocks on which such equity derivative positions were built.
    The Adani Group will seek to refinance about $1.2 billion worth of foreign-currency bonds ahead of maturity and prune discretionary capital expenditure, key finance executives at the conglomerate told investors during a conference call late Thursday. Further, the group will prepay all loans against shares over the next few weeks.
    Poland is going beyond just being a transit state for transfer of Pakistani arms to Ukraine, with a Polish entity signing a memorandum of understanding (MoU) with a Pakistani company for supply of defence equipment to Kyiv.
    Download The Economic Times News App to get Daily Market Updates & Live Business News.
    ETPrime stories of the day



    Trending Now
    Popular Categories
    Hot on Web
    In Case you missed it
    Top Calculators
    Top Searched Companies
    Top Definitions
    Top Commodities
    Top Prime Articles
    Top Story Listing
    Top Slideshow
    Top Trending Topics
    Top Videos
    Private Companies
    Popular Articles
    Most Searched Articles
    Trending Articles
    Follow us on:
    Find this comment offensive?
    Choose your reason below and click on the Report button. This will alert our moderators to take action
    Reason for reporting:
    Your Reason has been Reported to the admin.
    Log In/Connect with:
    Will be displayed
    Will not be displayed
    Will be displayed
    Stories you might be interested in

    source

  • Accenture Exec: ChatGPT May Have Big Upside For Cybersecurity – CRN

    While the AI-powered chatbot has been shown to make life easier for hackers, ChatGPT ‘helps reduce the barrier to entry with getting into the defensive side as well,’ Accenture’s cyber resilience lead tells CRN.
    Even as a growing number of researchers find that OpenAI’s ChatGPT could be a powerful ally to hackers, the tool may also have the potential to transform the work of security operations teams.
    Researchers at Accenture Security have been trying out ChatGPT’s capabilities for automating some of the work involved in cyber defense, and the initial findings around using the AI-powered chatbot in this way are promising, according to Accenture’s global lead for cyber resilience services, Robert Boyce.
    After taking in data from a security operations platform, ChatGPT has shown the ability to “actually create for us a really nice summary — almost like an analyst’s report — of what you would expect a human analyst to do as they’re reviewing it,” Boyce told CRN.
    [Related: ChatGPT Malware Shows It’s Time To Get ‘More Serious’ About Security]
    These potential applications of ChatGPT for cyber defense deserve attention to round out the picture amid the numerous research reports suggesting that the tool can be misused to enable cyberattacks, he said.
    On Thursday, researchers from threat intelligence firm Recorded Future became the latest to share findings that suggest ChatGPT can in fact assist cybercriminals with writing better phishing emails and developing malware. “ChatGPT lowers the barrier to entry for threat actors with limited programming abilities or technical skills,” the Recorded Future researchers said in the report.
    But it’s not just the malicious actors who can use ChatGPT as a research and writing assistant, as it’s clear that the tool “helps reduce the barrier to entry with getting into the defensive side as well,” said Boyce, who is also a managing director at Accenture Security in addition to heading its cyber resilience services.
    Typically, after an analyst gets an alert about a potential security incident, they start pulling other data sources to be able to “tell a story” and make a decision on whether they think it’s a real attack or not, he said.
    That often entails a lot of manual work, or requires using a SOAR (security orchestration, automation and response) tool to be able to pull it together automatically, Boyce said. (Many organizations find SOAR tools to be difficult, however, since they require additional specialized engineers and the introduction of new rules for the security operations center, he noted.)
    On the other hand, the research at Accenture suggests that taking the data outputs from a security information and event management (SIEM) tool and putting it through ChatGPT can quickly yield a useful “story” about a security incident. Using ChatGPT to create that narrative from the data, Boyce said, “is really giving you a clear picture faster than an analyst would by having to gather the same information.”
    He cautioned that the researchers haven’t done extensive testing on this application so far. And “you would have to do more work to make it really, really meaningful,” Boyce said.
    But the potential is there. For years, the security operations space “has been stagnant in a lot of ways because of the immense amount of information coming at an analyst, and because of the enrichment that has to happen before they can make good decisions,” he said. “It’s always been overwhelming. It’s information overload.”
    And while many cybersecurity professionals are overburdened, there also aren’t nearly enough of them, as the massive shortage of skilled security pros continues.
    ChatGPT, however, holds the promise of automating some of work of overwhelmed security teams while also helping to “erase some of the noise from the signal,” Boyce said. “This helps us be able to maybe get to the signal faster, which is an exciting prospect.”
    Kyle Alspach is a Senior Editor at CRN focused on cybersecurity. His coverage spans news, analysis and deep dives on the cybersecurity industry, with a focus on fast-growing segments such as cloud security, application security and identity security.  He can be reached at kalspach@thechannelcompany.com.

    source