Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Microsoft Multiple 0-Day Attack – Tenable Comment
Experts Reaction On Malaysia Airlines 9 Years Old...
IoT Security In The Spotlight, As Research Highlights...
Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber...
Expert Reaction On Solarwinds Blames Intern For Weak...
Expert Reaction On Go Is Becoming The Language...
Three Reasons The Security Industry Is Protecting The...
Experts On Google Voice Outage
Preparing For Tomorrow – Why Weathering The Initial...
The Cybersecurity Disconnect: Remote Working Highlights The Need...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Matias Katz
CEOfeature_status*/ ?>
Byos

Comments Dotted : 3
June 01, 2020

Over Half Of Work-from-home Staff Believe Riskier Cybersec Behaviors Are Ok – Experts Reaction

Some basic steps businesses can take to protect themselves against cyber threats.
There are often dozens of unmanaged devices connecting to our home networks: personal laptops, cellphones, gaming consoles, and home IoT. Any of these devices represent an entry point for attackers; once they've compromised an edge device, chances are high this compromise will spread laterally throughout the home network. And once an attacker or malware gets into a device, they often go undetected, seizing or manipulating data with the ultimate goal of moving from the single remote laptop or.....Read More
There are often dozens of unmanaged devices connecting to our home networks: personal laptops, cellphones, gaming consoles, and home IoT. Any of these devices represent an entry point for attackers; once they've compromised an edge device, chances are high this compromise will spread laterally throughout the home network. And once an attacker or malware gets into a device, they often go undetected, seizing or manipulating data with the ultimate goal of moving from the single remote laptop or tablet into the big prize: the company network and servers. Some basic steps businesses can take to protect themselves against cyber threats include enforcing strong policies that: - Employees never respond to any email asking for personal information, - Keep software applications and operating systems up to date, - Create strong passwords and enable two-factor authentication across all devices and accounts, - For added layers of protection, adopt endpoint micro-segmentation to protect devices from insecure public and home Wi-Fi networks.  Read Less
Like(2)  (0)

Linkedin Message

@Matias Katz, CEO, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Some basic steps businesses can take to protect themselves against cyber threats...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/over-half-of-work-from-home-staff-believe-riskier-cybersec-behaviors-are-ok-experts-reaction

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Matias Katz, CEO, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Some basic steps businesses can take to protect themselves against cyber threats...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/over-half-of-work-from-home-staff-believe-riskier-cybersec-behaviors-are-ok-experts-reaction

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
May 21, 2020

70%~ of Organizations will increase post-COVID-19 cybersecurity budgets – 4 cybersecurity experts on LearnBonds findings

Malware and lateral network movement, exploits and brute force attacks are common threats.
The idea of the corporate perimeter has vanished overnight and the security technologies used to protect the central corporate network have become somewhat obsolete - employees are connecting from their home, meaning they are accessing corporate resources from untrusted, insecure Wi-Fi networks. The shift to a perimeter-less, Zero Trust security strategy has been accelerated out of necessity, which would fall in line with the increased spending prediction. Organizations are forced to adapt to.....Read More
The idea of the corporate perimeter has vanished overnight and the security technologies used to protect the central corporate network have become somewhat obsolete - employees are connecting from their home, meaning they are accessing corporate resources from untrusted, insecure Wi-Fi networks. The shift to a perimeter-less, Zero Trust security strategy has been accelerated out of necessity, which would fall in line with the increased spending prediction. Organizations are forced to adapt to this new "work from anywhere" mentality. Employees working from home don’t have the same firewalls, network-based intrusion detection systems, and other defenses they have in the office. This means that malware and lateral network movement, exploits and brute force attacks are common threats. There are also often dozens of unmanaged devices connecting to our home networks: personal laptops, cellphones, gaming consoles, and home IoT. Any of these devices represent an entry point for attackers; once they\'ve compromised an edge device, chances are high this compromise will spread laterally throughout the home network. And once an attacker or malware gets into a device, they often go undetected, seizing or manipulating data with the ultimate goal of moving from the single remote laptop or tablet into the big prize: the company network and servers. Some basic steps businesses can take to protect themselves against cyber threats:
  • Keep software applications and operating systems up to date,
  • Create strong passwords and enable two-factor authentication across all devices and accounts,
  • Enforce policies stating that employees must never respond to any email asking for personal information, and
  • For added layers of protection, adopt endpoint micro-segmentation to protect devices from insecure public and home Wi-Fi networks.
  Read Less
Like(9)  (0)

Linkedin Message

@Matias Katz, CEO, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Malware and lateral network movement, exploits and brute force attacks are common threats...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/70-of-organizations-will-increase-post-covid-19-cybersecurity-budgets-4-cybersecurity-experts-on-learnbonds-findings

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Matias Katz, CEO, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Malware and lateral network movement, exploits and brute force attacks are common threats...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/70-of-organizations-will-increase-post-covid-19-cybersecurity-budgets-4-cybersecurity-experts-on-learnbonds-findings

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
March 23, 2020

Byos Re New Mirai Variant Targeting IoT Devices – Micro-Segmenting Can Eliminate Risk

This is the concept behind hardware-enforced isolation.
It’s worth remembering that if devices are micro-segmented, attackers cannot gain remote access to it because the device itself would not be discoverable in the network, therefore making it invisible. This is the concept behind hardware-enforced isolation - no device should be exposed to the network without an extra hardware layer of protection, eliminating the possibility of attackers using vulnerabilities found inside of the host device.
Like(3)  (0)

Linkedin Message

@Matias Katz, CEO, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"This is the concept behind hardware-enforced isolation...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/byos-re-new-mirai-variant-targeting-iot-devices-micro-segmenting-can-eliminate-risk

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Matias Katz, CEO, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"This is the concept behind hardware-enforced isolation...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/byos-re-new-mirai-variant-targeting-iot-devices-micro-segmenting-can-eliminate-risk

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Sam Curry, Chief Security Officer, Cybereason

"Total transparency is needed and they need to hone in on more specific details and be completely transparent with Enrich members. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Florian Thurmann, Technical Director, EMEA , Synopsys Software Integrity Group

"Your organisation won’t be able to determine which of their employees has made a given change in the system. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Alan Grau, VP of IoT , Sectigo

"Best-practices for IoT device security include strong authentication and secure software updates. "

IoT Security In The Spotlight, As Research Highlights Alexa Security Flaws

Jake Moore, Cybersecurity Specialist, ESET

"Sensitive data such as this leaked into dark web forums can have damaging consequences. "

Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber Attack

Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic

"Password hygiene should be part of employee training and cyber awareness training. "

Expert Reaction On Solarwinds Blames Intern For Weak Passwords

Natalie Page, Cyber Threat Intelligence Analyst, Sy4 Security

"Currently Golang produce’s a much lower detection rate against security software. "

Expert Reaction On Go Is Becoming The Language Of Choice For Criminals To Design Malware

Chris Hickman, Chief Security Officer, Keyfactor

"A certificate expiration on its own is not necessarily a security response incident. "

Experts On Google Voice Outage

Adam Enterkin, SVP, EMEA, BlackBerry

"Even the best cybersecurity teams have had major challenges this last year. "

Expert Reaction On GCHQ To Use AI In Cyberwarfare

Jamie Akhtar, CEO and Co-founder, CyberSmart

"Universities are home to some of the world’s most cutting-edge research. "

Comment: Hackers Break Into ‘Biochemical Systems’ At Oxford Uni Lab Studying Covid-19

Jake Moore, Cybersecurity Specialist, ESET

"Honourable criminal hacking is still illegal and comes with some of the same intentions of standard unethical hacking. "

Expert Reaction On Private Data Leaked From Far-right Platform Gab

Dan Panesar, Director UK & Ireland, Securonix Inc.

"Even unsophisticated attacks can cripple digital engagement efforts. "

NPower Shutsdown App After Hackers Steal Customer Bank Info

Sam Curry, Chief Security Officer, Cybereason

"Oxford's researchers have likely spent months working on, they will see a big payday. "

Hackers Break Into ‘Biochemical Systems’ At Oxford Uni Lab Studying Covid-19

Adam Palmer, Chief Cybersecurity Strategist , Tenable

"The attack against the Npower app is just the most recent example of cybercriminals. "

NPower Shutsdown App After Hackers Steal Customer Bank Info

John Vestberg, President and CEO, Clavister

"In the new era of remote working, security needs to span on premise and the cloud. "

NPower Shutsdown App After Hackers Steal Customer Bank Info

Martin Jartelius, CSO , Outpost24

"Password managers are helpful but two-factor authentication should ideally be something most sites offer today. "

NPower Shutsdown App After Hackers Steal Customer Bank Info

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel