Cyber Threat
Latest stories
- in News
BWXT’s Tom McCabe on Addressing Cyber Threats, Advancing Transparency
Tom McCabe, a senior vice president and general counsel at BWX Technologies, told Vision Magazine in an interview about the company’s efforts to address potential cybersecurity threats posed by adversaries.
Use of AI, Machine Learning Evident in Top 10 Firms to Watch in Cybersecurity Market
The top 10 cybersecurity firms to watch in 2019 reflect the use of artificial intelligence, machine learning, analytics and other technologies to help speed up cyber threat detection and response to such threats, Forbes reported Sunday.
- in News
Verizon: Cyber Espionage, Privilege Misuse, Miscellaneous Errors as Top 3 Breach Patterns in Public Sector
A new Verizon report says cyber espionage, error by insiders and privilege misuse accounted for 72 percent of data breaches in the public sector. Verizon analyzed over 41K security incidents and more than 2K data breaches from 86 countries for the 2019 Data Breach Investigations Report and found that 16 percent of breaches occurred in the public sector.
Mitre to Perform Cyber Product Assessments via ATT&CK Evaluations Program
Mitre will assess cybersecurity platforms based on techniques used by a threat group called APT29 through the ATT&CK Evaluations program. The program uses ATT&CK, a knowledge base of threat actors’ tactics and techniques based on published vulnerability reports and observations, Mitre said Wednesday.
AWS’ Brett McMillen on Cloud Adoption in Federal Government
Brett McMillen, director of federal government at Amazon Web Services, told FedScoop in a video interview posted Wednesday that the company has seen meaningful progress in federal information technology modernization as agencies realize the benefits of cloud adoption.
Symantec’s Ken Durbin: Formjacking, Supply Chain Among Security Concerns in Federal Gov’t
Ken Durbin, senior strategist of global government affairs and cybersecurity at Symantec, wrote in a Fifth Domain opinion piece published Friday about several security threats that federal agencies should be aware of.
Forcepoint’s Richard Ford: Understanding Human Behavior Could Help Manage Cyber Risks
Richard Ford, chief scientist at Forcepoint, wrote in a Fifth Domain opinion piece published Wednesday that organizations seeking to address cybersecurity risks should shift their focus towards human behavior amid evolving threats.
- in News
Raytheon’s Jon Check: Agency CISOs Should Advance Optimization to Make Cyber Budget Go Further
Jon Check, senior director of cyber protection solutions at Raytheon’s intelligence, information and services business, said agency chief information security officers seeking to make their cybersecurity funds stretch further should look at their priorities. Check wrote in a GCN article published Thursday that agency CISOs should assess their hiring approach and determine whether their cyber tools are updated and capable to address the current security threats.
- in News
Forcepoint’s Matt Moynahan on Insider Threats
Forcepoint CEO Matt Moynahan said insider threats to organizations start with access, privilege and the threat actors’ intentions, Federal News Network reported Friday. “The definition of insider becomes very blurry with things like digital transformation [or] movement to the cloud. Attackers are getting in, identities and credentials are being stolen, and the human being has become one of the primary vectors of attack,†he told Cyber Chat host Sean Kelley.
- in News
Perspecta Labs’ Tony Bogovic on Three Strategies to Defend Network Infrastructure Against DDoS Attacks
Tony Bogovic, vice president of advanced consulting and engineering at Perspecta Labs, has said government agencies and companies should implement strategies to protect and defend network infrastructure against distributed denial-of-service attacks and other cyber threats. Bogovic wrote in an article published Tuesday on Fifth Domain that one of the strategies agencies could adopt is to disperse or decentralize high-value information assets and servers that are being targeted by threat actors.