Software Security
Article | March 28, 2024
Network with the best of the best cybersecurity experts at the top cybersecurity events in 2024 with cybersecurity conferences. Keep up with global security trends, challenges and best practices.
Contents
1. Setting the Stage: Cyber Security 2024 Events
2. A Sneak Peek: 2024’s Cybersecurity Events and Conferences
2.1 Cyber Security and Cloud Expo
2.2 RSA Conference 2024
2.3 InfoSec World
2.4 Nordic IT Security Event
2.5 Cyber Security World Asia
2.6 Cybersecurity Expo
2.7 Infosecurity Europe
2.8 Gartner Security & Risk Management Summit
2.9 CS4CA
2.10 2024 Cybersecurity Summit
3. The 2024 Expedition: Cybersecurity and Data Protection
Are you feeling left out in the cybersecurity domain, where changes happen every second? Fear not! Attending cybersecurity events in 2024 is your golden ticket to staying ahead of the curve.
1. Setting the Stage: Cyber Security 2024 Events
These cybersecurity events in 2024 are not just about listening to experts but are a treasure trove of networking opportunities, sharing ideas, and gaining insights that would otherwise require substantial effort and time for research. From the Cyber Security and Cloud Expo to the CS4CA event, these gatherings are intendedto provideprofessionals with the skills and resourcesthey need to elevate their cybersecurity approach.
So, mark your calendars for 2024 and prepare to experience a year of learning and growth in cybersecurity! Be part of the cybersecurity community that’s active locally and nationally at events across the globe. Remember, knowledge is power, and these events are your powerhouse. Don’t miss out!
2. A Sneak Peek: 2024’s Cybersecurity Events and Conferences
Are you ready to dive into the ocean of cybersecurity knowledge? Buckle up! The year 2024 is packed with a myriad of cybersecurity events that are just waiting for your participation.
These events are your one-stop-shop for everything cybersecurity, from GRC to the latest threats and defenses. So, grab this opportunity to learn from the best, network with peers, and stay updated in this fast-paced field.
Get ready to explore, learn, and grow in the world of cybersecurity. Your journey starts here!
2.1 Cyber Security and Cloud Expo
The Cyber Security and Cloud Expo, RAI Amsterdam, is a must-attend event for cybersecurity enthusiasts. Here's a brief overview:
Who it's for: The event is expected to attract over 7,000 attendees globally, including Chief Information Security Officers, Chief Information Officers, Chief Security Architects, Heads of Information Security, Chief Compliance Officers, Privacy Officers, and Data Protection Specialists.
Specialization: The event covers areas such as:
Zero Trust
Threat Detection and Response
Cyber Security Landscape
Identity and Access Management
Application Security
Hybrid Cloud strategies
Cloud Adoption
Cloud Transformation
Data Security
Disaster Recovery Strategies
Smart Cloud Security
When and where: The event will take place at RAI, Amsterdam, on 1-2 October 2024.
Agenda: More than 150 speakers will share their incomparable business knowledge and firsthand experiences at the conference through presentations, knowledgeable panel discussions, and fireside talks.
Notable speakers: Some of the notable speakers include:
Maikel Ninaber, Director, Cyber and Intelligence (C&I) at Mastercard
Arda Çirpili, Cyber Security Project Manager & Business Analyst at Rabobank
Piergiorgio Ladisa, Security Researcher PhD Student at SAP Labs France
René Pluis, Global Cyber Security Remediation Manager at Philips
Martin Sandren, IAM Product Lead at IKEA
Networking opportunities: During the VIP Networking Party, attendees will have the opportunity to interact with prominent people and have deep and important talks.
GRC in cybersecurity: The event will cover topics pertaining to governance, risk, and compliance (GRC) in cybersecurity. It will also include discussions on data security and protection, identity, privacy, compliance, GDPR and other regulations, and legal implications of cybersecurity breaches.
This event is a great opportunity to learn about the latest advancements in cybersecurity and cloud computing and to network with industry professionals.
2.2 RSA Conference 2024
The RSA Conference 2024 is a must-attend event for cybersecurity professionals. Here's a snapshot of what you can expect:
Who it's for: The conference is crafted for cybersecurity professionals who seek to stay ahead of the curve in the cybersecurity space.
Specialization: Attendees and speakers specialize in various areas of cybersecurity, including threat intelligence, infrastructure security, and more.
When and where: The conference will take place at the San Francisco MosconeCenter from May 6 – 9, 2024.
Agenda: The conference will feature expert-led sessions, keynotes, in-depth learning labs, and more, covering the latest trends, threats, and solutions in cybersecurity.
Notable speakers: Some of the keynote speakers include:
Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA)
Vijay Bolina, CISO Head of Cybersecurity Research at Google DeepMind
Adam Cohen,Senior Director and Associate General Counsel – Cybersecurity at Capital One
Michael Sentonas,President of CrowdStrike
Networking opportunities: The conference provides numerous opportunities for networking, such as interactive sessions and an expo.Here, the attendees can connect with industry vendors, meet product experts, discuss challenges, and demonstrate the latest solutions.
GRC in cybersecurity: While specific sessions on governance, risk management, and compliance (GRC) are not mentioned in the available details, the conference typically covers a wide range of topics, and GRC is a crucial aspect of cybersecurity.
This event promises to be a rich learning experience, offering insights into the art of the possible in the dynamic field of cybersecurity.
2.3 InfoSec World
InfoSec World 2024 is one of the most sought-after information security conferences. It is a convergence of cybersecurity experts and thought leaders, shaping the future of cybersecurity through insightful discussions and innovative solutions.
Here’s its overview:
Who it's for: The event is for cybersecurity professionals, including CISOs, CTOs, COOs, CIOs, Developers, IAM Architects/Engineers, IAM Directors, Information Security Officers, IS/IT Directors/Managers, Product Managers, Security Architects, and Security Infrastructure Engineers.
Areas of Specialization: The attendees and speakers specialize in various areas of cybersecurity, including
Application Security
Cloud Security
Cyber Crime
Data Protection
DevSecOps
Governance, Regulation and Compliance (GRC)
Date, Time, and Place: The event will take place from September 23-25, 2024, at Disney’s Coronado Springs Resort, Lake Buena Vista, Florida.
Agenda and Topics: The event will feature world-class conference programming, enlightening keynotes, and a vibrant expo floor featuring the latest security solutions. Topics covered include cybercrime, data protection, DevSecOps, governance, regulation and compliance (GRC), and more.
Notable Speakers: Some of the notable speakers include:
Scott Shapiro, Founding Director of the Yale CyberSecurity Lab
Rachel Wilson, Managing Director and Head of Cybersecurity of Morgan Stanley Wealth Management
Iranga Kahangama, Assistant Secretary for Cyber, Infrastructure, Risk & Resilience of the U.S. Department of Homeland Security
Networking Opportunities:It provides a network of over 2,500 security professionals, offering ample opportunities for networking.
GRC in Cybersecurity:It covers topics related to governance, regulation, and compliance (GRC) in cybersecurity.
This event is a great opportunity for cybersecurity professionals to learn, network, and stay updated with the latest trends in the industry.
2.4 Nordic IT Security Event
Audience: The event is primarily for cybersecurity professionals who are keen on staying updated with the latest developments in the field. It's a platform for seasoned industry professionals to discuss business-critical topics.
Specialization: The attendees and speakers at this event come from various specializations within cybersecurity. This includes areas like threat intelligence, infrastructure security, and many more.
Date, Time, and Venue: The event is scheduled to take place on May 23, 2024, at the Stockholm Waterfront Congress Center.
Agenda: The conference will feature expert-led sessions, keynotes, and in-depth learning labs. These will cover the latest trends, threats, and solutions in cybersecurity.
Speakers: The event will host several notable speakers,including:
David Jacoby, an Ethical Hacker with over 25 years of experience
Mikko Hypponen, a globally recognized cybersecurity expert and Chief Research Officer for With Secure
Arnaud Wiehe, a thought leader in cybersecurity who has served as a CISO for multiple years
Patric J.M. Versteeg, a visionary executive passionate about revolutionizing information and cybersecurity management
Nir Chervoni, the Head of Data Security at Booking.com
Networking Opportunities: The conference provides numerous networking opportunities. This includes interactive sessions and an expo where attendees can connect with industry vendors, meet product experts, discuss challenges, and demo the latest solutions.
GRC in Cybersecurity: While specific sessions on governance, risk management, and compliance (GRC) are not mentioned in the available details, the conference typically covers a wide range of topics, and GRC is a crucial aspect of cybersecurity.
This event is a great opportunity for cybersecurity professionals to learn, network, and stay updated with the latest trends in the field. It's a platform that brings together the best minds in the industry to discuss and address the challenges faced by global communities in the 21st century.
2.5 Cyber Security World Asia
The Cyber Security World Asia is one of the cybersecurity conferences to attend in 2024 for these reasons:
Audience: The event is for professionals, business leaders, and cybersecurity enthusiasts.
Specialization: Attendees and speakers specialize in various areas of cybersecurity, including:
Zero trust
Data protection
DevSecOps
Date, Time, and Place: The event will take place on 9-10th October 2024 at Marina Bay Sands, Singapore.
Agenda and Topics Covered:Keynote addresses, panel discussions, interactive workshops, and networking opportunities will all be included in the conference. It will also cover the newest developments, difficulties, and tactics in cybersecurity.
Networking Opportunities: The event offers unique opportunities for networking and knowledge exchange, with the potential to create partnerships and collaborate with peers.
GRC in Cybersecurity: GRC (Governance, Risk, and Compliance) is a crucial aspect of cybersecurity. It aligns IT goals with business objectives while effectively managing cyber risks and achieving regulatory needs.
This event is a must-attend for anyone looking to stay updated on the latest in cybersecurity and network with industry professionals.
2.6 Cybersecurity Expo
Who is the event for: The Cybersecurity Expo is intended for a broad spectrum of attendees who are interested in the latest developments in the field. It includes cybersecurity professionals, business leaders, and enthusiasts.
Areas of Specialization: The attendees and speakers at the event specialize in various areas of cybersecurity. This includes but is not limited to zero trust security models, data protection strategies, and DevSecOps practices.
Date, Time, and Place: The event is scheduled to take place on 31st October 2024. The venue for the event is the QEII Centre, located in Broad Sanctuary, London, SW1P 3EE.
Agenda and Topics Covered:Plenty of different activities, such as interactive workshops, panel discussions, and keynote addresses, will be offered during the conference. These sessions will cover a wide range of topics, providing insights into the latest trends, challenges, and strategies in cybersecurity.
Notable Speakers: The event will feature a lineup of industry leaders from various organizations. Some of the confirmed speakers include representatives from Northrop Grumman, Counter Terrorism Policing, Jacobs, CGI, Matchtech, Mott MacDonald, and QinetiQ.
Networking Opportunities: The Cybersecurity Expo offers attendees unique opportunities for networking and knowledge exchange. This includes the potential to create partnerships and collaborate with peers from various sectors within the cybersecurity industry.
GRC in Cybersecurity: Governance, Risk, and Compliance (GRC) is a crucial aspect of cybersecurity. It involves aligning IT goals with business objectives, managing cyber risks, and meeting regulatory needs. GRC in cybersecurity is about ensuring that an organization’s IT systems and processes are aligned with its business objectives, managing cyber risks, and meeting all relevant industry and government regulations.
This event is a must-attend for anyone seeking to stay updated on the latest in cybersecurity and network with industry professionals.
2.7 Infosecurity Europe
The Infosecurity Europe is one of the best security conferences and events in the northern hemisphere for these reasons:
Who the event is for: Infosecurity Europe is for everyone in information security, from experts and engineers to innovators and industry leaders.
Areas of specialization: The attendees and speakers specialize in various areas of information security, including cybersecurity knowledge, infosec tools, and complex threat environments.
Date, time, and place: The event will take place from 4-6 June 2024 at ExCeL London.
Agenda and topics covered: The conference program covers a wide range of topics in information security. It includes keynote sessions, panel discussions, fireside chats, and interviews. The 2024 conference program is yet to be announced.
Networking opportunities: The event provides opportunities to connect with emerging and established international suppliers worldwide. It also allows attendees to grow new relationships through diverse networking opportunities.
GRC in cybersecurity: While the specific topics for the 2024 event are not yet announced, GRC (Governance, Risk, and Compliance) is a crucial aspect of information security and is likely to be covered.
2.8 Gartner Security & Risk Management Summit
The Gartner Security and Risk Management Summit is a must-attend cybersecurity summit for security and risk management leaders. Here's what you need to know:
Who it's for: The summit is designed for Chief Information Security Officers, Security Operations, Risk Management Leaders, IAM Leaders, Security Architects, Technical Professionals, Infrastructure Security Leaders, and Data and Application Security Leaders.
Specialization: The attendees and speakers specialize in cybersecurity, risk management, infrastructure security, application and data security, and more.
When and where: The summit will take place on June 3 – 5, 2024, in National Harbor, MD.
Agenda: The summit will cover topics like:
the impact of Generative AI on security
cybersecurity value drivers
infrastructure security
cybersecurity board reporting
Networking opportunities: The summit provides opportunities for networking through roundtables, peer conversations, end-user case studies, and social engagements. There's also a dedicated program called the CISO Circle for chief information security officers. It will cover keynote speaker speeches, Magic Quadrant sessions and market guides, solution provider sessions, workshops, midsize enterprise programs, and diversity, equity, and inclusion sessions.
GRC in cybersecurity:The summit will cover a broad range of topics in cybersecurity, which may include Governance, Risk, and Compliance (GRC).
This event is a great opportunity to learn from leading experts, share experiences, and gain insights into the latest trends and strategies in cybersecurity and risk management.
2.9 CS4CA
The CS4CA is one of the top security conferences in 2024. It focuses on the aspects mentioned in the following:
Audience: The CS4CA event is designed for IT & OT security professionals from critical infrastructure sectors across the globe.
Specialization: The attendees and speakers specialize in cybersecurity for critical assets, with a focus on industries like Energy, Agriculture, Oil & Gas, Manufacturing, Aviation, Transport, and more.
Date, time, and place: The CS4CA event is scheduled to take place at different locations throughout 2024. These include:
Houston, Texas (March 26th - 27th)
Singapore (April 3rd - 4th)
Calgary, Canada (June 11th - 12th)
London, UK (September 24th - 25th)
Agenda and topics covered: The event will address key challenges in cybersecurity, such as managing risks, ensuring cyber resilience, and implementing effective governance, risk, and compliance (GRC) strategies.
Notable speakers: The event features a line-up of expert speakers, including:
John Ellis (CISO, Bupa)
Manjunath Pasupuleti (CISO, ENNOVI)
Roshan Daluwakgoda (CISO, Eastern Health)
Andrew Ginter (VP Industrial Security, Waterfall Security Solutions)
Networking opportunities: The event provides ample opportunities for networking, learning, and collaboration among senior IT and OT stakeholders.
GRC in cybersecurity: The event covers the importance of a good Governance, Risk, and Compliance (GRC) strategy in overcoming cybersecurity risks.
This event is a must-attend for anyone looking to enhance their knowledge and network in the field of cybersecurity.
2.102024 Cybersecurity Summit
The 2024 Cybersecurity Summit is going to be one of the most attended information security events and conferences.
Here is an overview of it:
Who the event is for: The summit is for cybersecurity professionals, from novices to experts, looking to acquire practical knowledge and fresh perspectives.
Areas of specialization: The attendees and speakers are specialized in various areas of cybersecurity, including:
Cyber threat intelligence (CTI)
Digital trust
Audit
Governance
Privacy
Security
Emerging technologies
Date, time, and place: The summit is scheduled to take place from January 29 – February 5, 2024. The event will be held in Washington, DC, and also virtually.
Agenda and topics covered: The summit will cover a wide range of topics, challenging traditional CTI assumptions and offering new perspectives.
Networking opportunities: The summit provides an excellent platform for networking, bringing together cybersecurity executives and CISOs from all corners of the country.
GRC in cybersecurity: The sources do not specify if the event will cover governance, risk management, and compliance (GRC) in cybersecurity.
This event is a must-attend for anyone looking to stay updated in the ever-evolving field of cybersecurity.
3. The 2024 Expedition: Cybersecurity and Data Protection
As we set sail on the 2024 expedition, the cybersecurity scene is more dynamic than ever. The rise of Generative AI (GenAI) is transforming operational practices, offering both challenges and opportunities. Ransomware 2.0, with its double extortion and data theft, is introducing a new level of complexity. The expanding attack surface due to the exponential growth of connected devices is amplifying vulnerabilities. Preventing cyber security incidents with the help of robust red teaming and pentesting has become more important than ever before.
Amidst these challenges, the importance of a comprehensive cybersecurity strategy that aligns with company objectives and regulatory compliance remains paramount. The journey ahead is challenging, but with vigilance and adaptability, we can navigate the evolving cybersecurity frontier. Stay tuned for the notable cybersecurity events in 2024 with rich global cyber expertise.
Read More
Data Security
Article | February 12, 2024
I would like to share my experience with you and talk about viruses created for Mac devices and how to deal with them. You may say that there are no Mac viruses as Apple does not allow it. However, I may say that there are plenty of nasty malware types like adware that open new tabs in your browser, redirect you to irrelevant pages and show numerous popups.
Yes, these are not real viruses. Adware like Search Marquis cannot clone itself and infect other connected devices. It cannot encrypt your files or cause any other harm. Its activity is related only to web redirects and excessive advertising. At the same time, who knows which rogue websites adware may land you on next time. It may happen that you end up on a phishing website where cyber crooks harvest personal information that leads to identity theft.
Fake antiviruses
I strongly recommend removing all adware that penetrated your device. But there is a problem here. If you want to get rid of Mac adware, you cannot quickly find a solution. If you go to google and search there how to get rid of Mac malware, you will see that all top results offer you to buy and install some shady software. In reality, these Mac antiviruses do nothing, as we know that the Apple ecosystem does not allow apps to access other apps' data. No antivirus can really scan and check your files.
How to remove Mac malware
Solution 1:
If your system is infected with adware and you do not know how to get rid of it, you may try to call Apple and ask what to do. You can find their phone number here: support.apple.com/en-gb/HT201232#us-ca.
Solution 2:
Another option is to try your luck on Apple communities. Thousands of tech enthusiasts help uses with their problems there. Here is a sample thread: discussions.apple.com/thread/8226644.
Solution 3:
There are other options too. Apple operating systems are not very difficult to use, and any person can remove adware manually by going through step-by-step guides posted on numerous malware removal websites. Here is a guide by BitAdvisors.com on how to remove Search Marquis malware.
Most rogue software works by exploiting bugs and vulnerabilities in your computer's operating system. And macOS has its own bugs too. To fix these vulnerabilities, Apple periodically releases operating system updates. To date, macOS has not proved attractive enough for cybercriminals and evil developers to flood it with malware.
Protection tips
To stays away from any surprises, it is recommended to update your OS as well as all apps installed regularly.
You should never install apps from unofficial app stores not controlled by Apple.
One of the ways for adware to penetrate your Mac computer is through bundled installs. You download and install a very useful app that is often free, but in reality, you get several apps. People never read user agreements written in small print. There it can be noted that you agree to install additional tools and provide some rights to them. Whenever you install something, be careful and read user agreements, and do not miss additional unnecessary software.
Do not install any software without urgent necessity. Any additional software widens the attack surface.
To be able to do bad things, current Mac malware requires users to perform some actions – grant rights. So, be careful with allowing any app to access your data, change settings, etc.
One more wise move is to make backups. iCloud or ordinary flash drives will help you not lose your data in case of a system glitch or malware attack.
Final advice - do use VPNs. Your connection will be encrypted, and attackers will not be able to find where you are actually located or what data your traffic consists of.
Read More
Identity Management
Article | February 14, 2024
Global leaders want to carve out specific areas of critical infrastructure to be protected under international agreements from cyber-attacks. But where does that leave others?
There are ‘four or five steps you could take that could significantly mitigate this risk,’ Falk said. These are patching, multifactor authentication and all the stuff in the Australian Signals Directorate's Essential Eight baseline mitigation strategies. …”
Back in April of this year, a BBC News headline read, "The ransomware surge ruining lives."
And that was before the cyber-attacks on critical infrastructure sectors like Colonial Pipeline, meat-processing giant JBS, the Irish Health Service and so many others.
And when President Biden met with Russian President Putin last month in Geneva, he declared that certain critical infrastructure should be “off-limits” to cyber-attacks.
“We agreed to task experts in both our countries to work on specific understandings about what is off-limits,” Biden said. “We’ll find out whether we have a cybersecurity arrangement that begins to bring some order.”
As an initial positive step forward, this cyber defense policy makes sense. In fact, most global experts applaud these moves and efforts to better protect and clarify international crimes in cyberspace.
Previous administrations going back to George W. Bush have taken aggressive steps to ensure critical infrastructure is protected in the U.S. and around the world through actions involving people, process and technology, both offline and online. The 16 critical infrastructure sectors identified by DHS/CISA can be found here.
Still, many questions remain regarding this new policy: Will all global governments actually agree on the wording? More importantly, even if they do agree, how will the agreements be enforced? Also, what happens if some countries continue to allow criminals to attack these critical infrastructure sectors from their soil?
And my main question goes further: Even if all of these agreements and actions are 100 percent agreed upon and enforced, which most people don’t believe will happen, does this imply that every organization not covered under these 16 critical infrastructure sectors can be openly attacked without a response? Is this giving into cyber criminals for everyone else?
For example, would K-12 schools or small businesses be “fair game” and not off limits? Could this actually increase attacks for any organization not considered on the CISA list?
No doubt, some will say that schools are a part of government, and yet there are private schools. In addition, if we do cover all others somehow, perhaps as a supplier of these 16 sectors, doesn’t that make the “off-limits” list essentially meaningless?
Essentially, where is the line? Who is included, and what happens when some nation or criminal group crosses the line?
These questions became more than an intellectual thought exercise recently when the Kaseya ransomware attack impacted more than 1,500 businesses, without, in their words, impacting critical infrastructure.
CBS News reports, “Still, Kaseya says the cyber-attack it experienced over the July 4th weekend was never a threat and had no impact on critical infrastructure. The Russian-linked gang behind the ransomware had demanded $70 million to end the attack, but CNBC reported that the hackers reduced their demands to $50 million in private conversations.
"The Miami-based company said Tuesday that it was alerted on July 2 to a potential attack by internal and external sources. It immediately shut down access to the software in question. The incident impacted about 50 Kaseya customers.”
OTHER RECENT RANSOMWARE NEWS
Meanwhile, in a bit of a surprise, ransomware group REvil disappeared from the Internet this past week, when its website became inaccessible.
As Engadget reported, “According to CNBC, Reuters and The Washington Post, the websites operated by the group REvil went down in the early hours of Tuesday. Dmitri Alperovitch, former chief technology officer of the cyber firm CrowdStrike, told The Post that the group's blog in the dark web is still reachable. However, its critical sites victims use to negotiate with the group and to receive decryption tools if they pay up are no longer available. Visitors to those websites now see a message that says ‘A server with the specified host name could not be found.’"
CNBC reported: “There are 3 main possibilities for the criminal gang’s disappearance — each of which carries good and bad news for U.S. efforts to combat the ransomware scourge emanating from Russia.
The Kremlin bent under U.S. pressure and forced REvil to close up shop.
U.S. officials tired of waiting for Kremlin cooperation and launched a cyber operation that took REvil offline.
REvil’s operators were feeling the heat and decided to lay low for a while.
"This situation may send a message to some of the players that they need to find a less-aggressive business model, which could mean avoiding critical infrastructure, or it could mean avoiding U.S. targets.”
Also, the Biden administration announced several other measures to combat ransomware: “The Biden administration will offer rewards up to $10 million for information leading to the identification of foreign state-sanctioned malicious cyber activity against critical U.S. infrastructure — including ransomware attacks — and the White House has launched a task force to coordinate efforts to stem the ransomware scourge.
"It is also launching the website stopransomware.gov to offer the public resources for countering the threat and building more resilience into networks, a senior administration official told reporters.”
And yet, many experts are still predicting that ransomware will continue to grow in the near future. For example, TechHQ wrote that “identifying the culprits often isn't as big an obstacle as apprehending them.”
To show recent growth of ransomware attacks, Fox Business offered details on a Check Point report this past week that “ransomware attacks surge, growing 93 percent each week.”
Also: “'The ransomware business is booming. We’re seeing global surges in ransomware across every major geography, especially in the last two months,' said Lotem Finkelstein, head of threat intelligence at Check Point Software. 'We believe the trend is driven by scores of new entrants into the ransomware business.'"
For more background on this hot topic, a few weeks back I appeared on MiTech News to discuss the ransomware crisis.
FINAL THOUGHTS
I’d like to close with this article which offers a slightly different perspective on ransomware from ZDNet Australia:
“The threat of ransomware dominates the cyber news right now, and rightly so. But this week Rachael Falk, chief executive officer of Australia's Cyber Security Cooperative Research Centre, made a very good point.
Ransomware is ‘Totally foreseeable and preventable because it's a known problem," Falk told a panel discussion at the Australian Strategy Policy Institute (ASPI) on Tuesday.
‘"It's known that ransomware is out there. And it's known that, invariably, the cyber criminals get into organisations through stealing credentials that they get on the dark web [or a user] clicking on a link and a vulnerability," she said.
‘We're not talking about some sort of nation-state really funky sort of zero day that's happening. This is going on the world over, so it's entirely foreseeable.’"
Article Orginal Source:
https://www.govtech.com/blogs/lohrmann-on-cybersecurity/as-ransomware-surge-continues-where-next-for-government
Read More