CISA

OpenText Joins the Joint Cyber Defense Collaborative to Enhance U.S. Government Cybersecurity

Retrieved on: 
星期二, 二月 13, 2024

WATERLOO, ON, Feb. 13, 2024 /PRNewswire/ -- OpenText™ (NASDAQ: OTEX), (TSX: OTEX), has been named a member of the U.S. Government public-private cybersecurity initiative, Joint Cyber Defense Collaborative (JCDC). This collaborative effort, established by the Cybersecurity and Infrastructure Security Agency (CISA), is dedicated to elevating the cybersecurity posture of the U.S. government and its strategic international partners.

Key Points: 
  • OpenText's Innovative Approach to Threat Intelligence Empowers Cyber Defenders and Strengthens U.S. Government Cybersecurity Resilience
    WATERLOO, ON, Feb. 13, 2024 /PRNewswire/ -- OpenText™ (NASDAQ: OTEX), (TSX: OTEX), has been named a member of the U.S. Government public-private cybersecurity initiative, Joint Cyber Defense Collaborative (JCDC).
  • This collaborative effort, established by the Cybersecurity and Infrastructure Security Agency (CISA), is dedicated to elevating the cybersecurity posture of the U.S. government and its strategic international partners.
  • "OpenText is honored to join the JCDC and contribute to its mission of enhancing the cybersecurity of the U.S. government and its allies," said Mark Barrenechea, OpenText CEO and CTO.
  • "Partnering with the JCDC provides OpenText the opportunity to help anchor and elevate cyber defense for this nation," says Kevin E. Greene, Public Sector, OpenText Cybersecurity .

RSA Conference Releases Initial 2024 Keynote Speaker Lineup

Retrieved on: 
星期二, 二月 13, 2024

SAN FRANCISCO, Feb. 13, 2024 /PRNewswire/ -- RSA Conference™, the world's leading cybersecurity conferences and expositions, today announced its initial lineup of keynote speakers for its upcoming Conference, taking place at the Moscone Center in San Francisco from May 6-9, 2024.

Key Points: 
  • SAN FRANCISCO, Feb. 13, 2024 /PRNewswire/ -- RSA Conference™, the world's leading cybersecurity conferences and expositions, today announced its initial lineup of keynote speakers for its upcoming Conference, taking place at the Moscone Center in San Francisco from May 6-9, 2024.
  • Dozens of prominent cybersecurity experts and innovators are slated to speak at RSA Conference 2024 from May 6-9.
  • "The Art of Possible is the theme for Conference this year and that's embodied throughout the lineup for our keynote program in 2024," said Linda Gray Martin, Senior Vice President, RSA Conference.
  • White, Former Commander, U.S. Fleet Cyber Command and U.S. Tenth Fleet
    For more information about the keynote program and to stay up to date with what's happening at RSA Conference 2024, please visit our website at https://www.rsaconference.com/usa .

Amici Support NCLA’s Stance at Supreme Court in Major Social Media Censorship Injunction Case

Retrieved on: 
星期一, 二月 12, 2024

NCLA is asking the Supreme Court to uphold a preliminary injunction granted by the Fifth U.S.

Key Points: 
  • NCLA is asking the Supreme Court to uphold a preliminary injunction granted by the Fifth U.S.
  • Circuit Court of Appeals that bars White House, CDC, FBI, Cybersecurity and Infrastructure Security Agency, and Surgeon General’s office officials from significantly encouraging social media platforms to censor lawful speech.
  • NCLA thanks amici for speaking out in defense of Americans’ First Amendment rights.
  • — Foundation for Individual Rights and Expression, National Coalition Against Censorship, and First Amendment Lawyers Association
    “What makes this example of jawboning the most dangerous ever to reach the court is social media platforms’ social function.

Cybercriminals are creating their own AI chatbots to support hacking and scam users

Retrieved on: 
星期四, 二月 8, 2024

But those with criminal intentions could also exploit and subvert these technologies, posing a threat to ordinary citizens.

Key Points: 
  • But those with criminal intentions could also exploit and subvert these technologies, posing a threat to ordinary citizens.
  • Criminals are even creating their own AI chatbots, to support hacking and scams.
  • There are an increasing variety of ways that generative AI systems like ChatGPT and Dall-E can be used by criminals.

Malicious chatbots

  • Entire malicious variants of large language models are also emerging.
  • It has been used to create fake dating profiles capable of chatting to unsuspecting victims on Tinder, Bumble, and other apps.
  • The US CISA security agency has also warned about generative AI’s potential effect on the upcoming US presidential elections.
  • Privacy and trust are always at risk as we use ChatGPT, CoPilot and other platforms.

Leaky ship

  • These vulnerabilities place person’s privacy or a business’s most-prized data at risk.
  • More widely, this could contribute to a lack of trust in AI.
  • Various companies, including Apple, Amazon and JP Morgan Chase, have already banned the use of ChatGPT as a precautionary measure.
  • ChatGPT and similar LLMs represent the latest advancements in AI and are freely available for anyone to use.
  • Nurse receives funding from The Engineering and Physical Sciences Research Council (EPSRC), The Research Institute for Sociotechnical Cyber Security, and The National Cyber Security Centre (NCSC).
  • He is affiliated with Wolfson College, University of Oxford as a Research Member, CybSafe as the Director of Science and Research, and The Royal United Services Institute (RUSI) as an Associate Fellow.

Pervasive OT & IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

Retrieved on: 
星期四, 二月 8, 2024

SAN FRANCISCO, Feb. 8, 2024 /PRNewswire/ -- The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to OT and IoT environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to access networks and cause these anomalies.    

Key Points: 
  • Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to access networks and cause these anomalies.
  • The most concerning of these network anomalies, which can indicate highly sophisticated threat actors being involved, increased 19% over the previous reporting period.
  • According to the findings, malicious IoT botnets remain active this year, and botnets continue to use default credentials in attempts to access IoT devices.
  • Nozomi Networks Labs "OT & IoT Security Report: Assessing the Threat Landscape" provides security professionals with the latest insights needed to re-evaluate risk models and security initiatives, along with actionable recommendations for securing critical infrastructure.

Cyber Insurance Market Growing Dramatically, Triple-I Finds

Retrieved on: 
星期三, 二月 7, 2024

Direct written premiums for cyber insurance worldwide could rise to $23 billion by 2025, with U.S. businesses paying about 56% of the total, according to the Insurance Information Institute’s (Triple-I) latest Issues Brief, published today.

Key Points: 
  • Direct written premiums for cyber insurance worldwide could rise to $23 billion by 2025, with U.S. businesses paying about 56% of the total, according to the Insurance Information Institute’s (Triple-I) latest Issues Brief, published today.
  • “Two primary factors may be at work,” stated Triple-I’s Cyber Insurance: State of the Risk , when explaining the trend.
  • Given more than half of these premiums are paid by U.S. businesses, the National Association of Insurance Commissioners (NAIC) and the U.S.
  • Nonetheless, they need more robust data on attacks and breaches in order to predict and manage liability,” Triple-I’s Issues Brief concluded.

NCLA Asks Supreme Court to Uphold Injunction Against Government Social Media Censorship

Retrieved on: 
星期二, 二月 6, 2024

The injunction would bar officials from the White House, CDC, FBI, Cybersecurity and Infrastructure Security Agency (CISA), and Surgeon General’s office from coercing or significantly encouraging social media platforms to censor constitutionally protected speech.

Key Points: 
  • The injunction would bar officials from the White House, CDC, FBI, Cybersecurity and Infrastructure Security Agency (CISA), and Surgeon General’s office from coercing or significantly encouraging social media platforms to censor constitutionally protected speech.
  • In September, a Fifth Circuit panel upheld the key components of U.S. District Judge Terry Doughty’s July 4 preliminary injunction order, prohibiting named federal officials from coercing or significantly encouraging social media companies to suppress legal speech.
  • Though the U.S. Supreme Court has temporarily stayed the Fifth Circuit’s injunction, NCLA believes the Justices are ultimately unlikely to permit the egregious First Amendment abridgements this case has exposed.
  • In fact, much of the speech the government suppressed in this case—about Covid-19 and Hunter Biden’s laptop—was truthful.”
    — Mark Chenoweth, President and Chief Legal Officer, NCLA

U.S. Hearing on Destructive Critical Infrastructure Attacks Highlights Urgent Need for More Proactive Cyber-Physical System (CPS) Security Management and Protection

Retrieved on: 
星期三, 一月 31, 2024

And the risk that poses to every American requires our attention – now.”

Key Points: 
  • And the risk that poses to every American requires our attention – now.”
    The House hearing follows on the heels of another U.S. effort to tackle this growing threat.
  • According to Phosphorus’ research team, the most serious threat to critical systems doesn’t come from an exotic exploit, but rather from basic security oversights.
  • Phosphorus’ Gartner-recognized Unified xIoT Security Management Platform offers the industry’s only proactive approach to security management and breach prevention for the exploding OT/ICS, IIoT, IoT, and IoMT attack surface.
  • For more information, visit www.phosphorus.io or meet the company at upcoming conferences, including S4x24, RSA Conference, Black Hat and DEF CON.

Absolute Software Provides Organizations Impacted by Ivanti Zero Days and Additional Vulnerabilities with Free Support and Product Licenses for 90 Days

Retrieved on: 
星期六, 二月 3, 2024

Absolute Software , the leader in enterprise cyber resilience, is available to assist organizations impacted by Ivanti Connect Secure and Ivanti Policy Secure Zero Days and other vulnerabilities.

Key Points: 
  • Absolute Software , the leader in enterprise cyber resilience, is available to assist organizations impacted by Ivanti Connect Secure and Ivanti Policy Secure Zero Days and other vulnerabilities.
  • Help includes free Absolute Secure Endpoint and Absolute Secure Access product licenses and support for 90 days, along with the expertise needed to quickly deploy and scale replacement solutions across all endpoints.
  • Absolute solutions are not impacted by the Zero Days and other vulnerabilities recently disclosed and reported by Ivanti, other researchers, and the Cybersecurity & Infrastructure Security Agency (CISA).
  • For existing and new customers, additional and new Absolute licenses, onboarding, and support are available for 90 days at no cost.

MorganFranklin Consulting Welcomes Veteran Cybersecurity Expert Michael Welch

Retrieved on: 
星期二, 一月 23, 2024

MorganFranklin Consulting , a leading finance, technology, and cybersecurity advisory and management firm that specializes in solving complex transformational challenges for its clients, today announced the return of cybersecurity expert Michael Welch as the Managing Director and Sector Lead for Utilities, Industrial and Critical Infrastructure within the cybersecurity practice.

Key Points: 
  • MorganFranklin Consulting , a leading finance, technology, and cybersecurity advisory and management firm that specializes in solving complex transformational challenges for its clients, today announced the return of cybersecurity expert Michael Welch as the Managing Director and Sector Lead for Utilities, Industrial and Critical Infrastructure within the cybersecurity practice.
  • “We are thrilled to welcome Michael back to the MorganFranklin team and harness his expertise to help provide our clients with premier cybersecurity services,” said Keith Hollender, a partner in MorganFranklin’s cybersecurity practice.
  • “I’m excited to be back at MorganFranklin to provide clients with key industry insight, knowledge and focus that strengthens their cybersecurity postures,” said Michael Welch.
  • Michael received a Master of Business Administration specializing in project management and information security from the Keller School of Business.