BayPay Members Blogs

This additional resource is sponsored by The BayPay Forum.

Two US Towns Pay $1.1m Ransom To Hackers

A view in the direction of Riviera Beach in Florida
image
Image copyright Getty Images Image caption More than one town in Florida has been bit by ransomware lately A town in Florida has paid $500,000 (£394,000) to hackers after a ransomware...
Continue reading
  0 Comments
0 Comments

Sen. Wyden Asks NIST to Develop Secure File Sharing Standards

Sen. Wyden Asks NIST to Develop Secure File Sharing Standards
Encryption & Key Management , Governance , IT Risk Management Senator Says Current Methods Offer Inadequate Protections( @Ferguson_Writes ) • June 25, 2019     U.S. Sen. Ron Wyden, D-Ore. ,...
Continue reading
  0 Comments
0 Comments

Chinese Hackers Play Operator With Global Telcos

Chinese Hackers Play Operator With Global Telcos
image
image
Cyberwarfare / Nation-state attacks , Fraud Management & Cybercrime , Governance Cybereason Says Theft of Subscribers' Call Metadata Could Be Linked to Chinese APT Group( euroinfosec ) • June 25, 2019...
Continue reading
  0 Comments
0 Comments

Alleged AlphaBay Moderator Faces Racketeering Charge

Alleged AlphaBay Moderator Faces Racketeering Charge
image
Cybercrime , Fraud Management & Cybercrime Investigation Into Shuttered Darknet Site Continues( @Ferguson_Writes ) • June 24, 2019     An alleged moderator of the AlphaBay underground marketplace has been indicted...
Continue reading
  0 Comments
0 Comments

DHS: Conflict With Iran Could Spur 'Wiper' Attacks

DHS: Conflict With Iran Could Spur 'Wiper' Attacks
image
Cyberwarfare / Nation-state attacks , Fraud Management & Cybercrime , Multi-factor & Risk-based Authentication US Reportedly Responded to Drone Downing With Cyber Strike( jeremy_kirk ) • June 24, 2019    The...
Continue reading
  0 Comments
0 Comments

Live Webinar | Top Social and Digital Threats Facing Financial Institutions

Live Webinar | Top Social and Digital Threats Facing Financial Institutions
Cybercrime as-a-service , Fraud Management & Cybercrime , Social Engineering Presented by ZeroFOX     60 Minutes     In the last several years, Financial Services organizations have undergone rapid digital...
Continue reading
  0 Comments
0 Comments

The Evolution of IAM in the Cloud

) • June 25, 2019     15 Minutes    More organizations are deploying single sign-on mechanisms when they move to software-as-a-service applications to help enhance authentication and control access, says...
Continue reading
  0 Comments
0 Comments

Risk and Resilience: Finding the Right Balance

) • June 25, 2019     15 Minutes    Finding the right balance between risk and resilience is a challenge for every cybersecurity project, and that's why such efforts must...
Continue reading
  0 Comments
0 Comments

Developing a Robust Third-Party Risk Management Program

) • June 24, 2019     10 Minutes    Too many organizations around the world take a "bare minimum" approach to third-party risk management, says Jonathan Ehret, founder of the...
Continue reading
  0 Comments
0 Comments

Medical Device Cybersecurity: The Top Challenges

) • June 24, 2019     10 Minutes    Identity and access management continues to be a top medical device cybersecurity challenge, says security expert Mark Sexton of the consultancy...
Continue reading
  0 Comments
0 Comments

Amazon Granted Patent For Surveillance Drones Service

screen-shot-2015-10-28-at-3-29-55-pm.png
Surveillance drones patent figure
Surveillance drones patent figure
A new patent shows how drones can keep an eye out on a home while making deliveries.  CNET For years, Amazon has shown off how it'll use drones to deliver items...
Continue reading
  0 Comments
0 Comments

Anonymous Hacker Exposed After Dropping USB Drive While Throwing Molotov Cocktail

Anonymous logo
In a bizarre investigation, Belgium police have identified a member of the Anonymous Belgium hacker collective while investigating an arson case at a local bank. The perpetrator, a 35-year-old man from...
Continue reading
  0 Comments
0 Comments

U.S. Launched Cyberattacks On Iranian Intel Sites

President Trump may have pulled back at the 11th hour from airstrikes on Iranian radar and military targets, but U.S. Cyber Command did hit cyber targets within the Iranian intelligence apparatus...
Continue reading
  0 Comments
0 Comments

Presidential Warnings Easy To Spoof

Alert
Image copyright Fema Image caption The presidential alert system was first tested in 2018 America's messaging system that sends presidential warnings about impending emergencies is "easy" to spoof, warn researchers. Cyber-security...
Continue reading
  0 Comments
0 Comments

The Role of DNS in Cybersecurity

Governance , IT Risk Management , Security Operations Stuart Reed of Nominet on Improving Visibility( @nickster2407 ) • June 21, 2019     Stuart Reed, vice president, product, Nominet DNS is cybersecurity's...
Continue reading
  0 Comments
0 Comments

NASA's Jet Propulsion Lab a Frequent Hack Victim: Audit

NASA's Jet Propulsion Lab a Frequent Hack Victim: Audit
image
3rd Party Risk Management , Critical Infrastructure Security , Cyberwarfare / Nation-state attacks Report Outlines 10 Years' Worth of Serious Incidents( @Ferguson_Writes ) • June 21, 2019    NASA's Jet Propulsion...
Continue reading
  0 Comments
0 Comments

Privileged Attack Vectors: Key Defenses

Privileged Access Management , Security Operations BeyondTrust's Karl Lankford on Mitigating the Unmanaged Privilege Threat( euroinfosec ) • June 21, 2019     Karl Lankford, director of solutions engineering, EMEA, BeyondTrust Attackers...
Continue reading
  0 Comments
0 Comments

Hacked With Words: Email Attack Sophistication Surges

Cybercrime , Fraud Management & Cybercrime , Governance Barracuda's Michael Flouton on Social Engineering, Account Takeover and More( euroinfosec ) • June 21, 2019     Michael Flouton, vice president of email...
Continue reading
  0 Comments
0 Comments

Migrating to the Cloud: Top Security Lessons

) • June 21, 2019     10 Minutes    As health insurer Wellmark Blue Cross Blue Shield migrates its systems, data and applications to the cloud, the top security lesson...
Continue reading
  0 Comments
0 Comments

Facebook's Cryptocurrency Plan Scrutinized

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of...
Continue reading
  0 Comments
0 Comments