CDSA News Headlines
Weekend Vulnerability and Patch Report, September 1, 2019 (Citadel Information Group)
Important Security Updates Apple iOS: Apple has released version 12.4.1 to address highly critical vulnerabilities. Updates are available from the device under Settings. Appl... More
Protecting Smart Cities (TechNative)
The benefits are clear: Smart cities will be more convenient, more efficient, and more pleasant to live in and visit. However, smart cities are also a bit of a double-edged sword, ... More
4 Questions CISOs Need to Ask About Enterprise Cybersecurity (Security Intelligence)
Effective internal cybersecurity depends on chief information security officers (CISOs) and other security leaders knowing exactly what’s happening on their network and how it im... More
Survey’s Surprise Finding: Only Half of Organizations Believe They Can Stop Cyberattacks (DXC Technology Blog)
If they are being honest with you, any CISO will tell you that they are well aware of the fact that their organization can be breached. None, at least none that I know, would conte... More
The Importance of Training: Cybersecurity Awareness as a Firewall (Forbes)
The top funding priorities for chief information security officers (CISOs) in the coming year reveal a fundamental challenge facing enterprises today: They need more talent, and th... More
Illumio Achieves Federal Common Criteria Certification for Enterprise Security Management (CDSA)
Illumio announced that it has completed the rigorous and comprehensive security testing and evaluation for Common Criteria certification. Illumio's solution is now the first segmen... More
Staying Ahead of Insidious New Breeds of Cyberattacks (Digitalist)
The whole industry of cybercrime has become increasingly sophisticated, not to mention far more comprehensively funded. There are several new breeds you might not be aware of.... More
Why You Should Make Cybersecurity a Company Culture and How to Do It (Forbes)
Cyberattacks though commonly reported as sophisticated, often are not. They are surprisingly simple and usually financially motivated. It seems so often that the media report that ... More
Artificial Intelligence: A Tool or a Threat to Cybersecurity? (ReadWrite)
Security threats to businesses have always been there -now it only shifted from physical to cyberspace. So, today’s business world revolves around “data,” which adds intrinsi... More
The Many Roles of the CISO as Viewed as ‘Star Trek’ Characters (Security Intelligence)
Looking back at the most central characters, each brought their own unique set of skills and expertise to the Enterprise. This range of capabilities mimics the multifaceted role of... More
Illegal Streaming Services Prompt Multiple Indictments (THR)
Eight individuals behind two of the largest illegal streaming services in the U.S. have been indicted on charges of conspiring to violate federal criminal copyright law, the Depart... More
Weekend Vulnerability and Patch Report, August 25, 2019 (Citadel Information Group)
Important Security Updates Skype: Skype has released Skype 8.51.0.86. Updates are available from the program or Skype’s website.... More
How Video Became a Dangerous Delivery Vehicle for Malware Attacks (Security Intelligence)
Most employees have some awareness about malware attacks. Many probably know that you should never open an executable file from a stranger or install a thumb drive found in the par... More
DXC Technology Extends Service Management, Security Operations Capabilities With Acquisition of Syscom (CDSA)
DXC Technology announced the acquisition of Syscom, a leading ServiceNow partner, to extend the reach and scale of its security operations and service management capabilities. The ... More
EY Report: Cybersecurity Concerns Prevent Companies From Adopting New Technology (UK Tech)
A new report published by EY shows that over two thirds (67%) of companies feel that cybersecurity concerns prevent them from adopting new technology to grow their business faster.... More
Has Your Business Considered Biometric Security? (Tech HQ)
Biometric security is often hailed an immutable solution in an age under the constant shadow of cybersecurity risks. A combination of technology and the verification of unique, phy... More
Securing and Protecting Your IoT Network (TechGenix)
Even the slightest misconfiguration or poor security practices can serve as a point of entry for cyberattacks, security breaches, and data theft. Since IoT is a network of connecte... More
Why It’s Time to Converge Physical Security and Cybersecurity (Buildings)
IoT-enabled HVAC systems are more energy efficient, reliable and user-friendly for your occupants. But because of those cloud-enabled features, they’re also a target for hacking ... More
Cybersecurity: 3 Ways CXOs Can Guard Against Insider Threats (TechWire Asia)
Insider threats have always posed quite a challenge to cybersecurity specialists looking to defend a company’s data and infrastructure. In the digital world, while external attac... More
Cybersecurity and Economic Uncertainty (Tech HQ)
Can society live with constantly compromised data? It’s a valid question because there’s every indication that we are doing so currently, and will continue to do so.... More