HOW IBM IS ADOPTING AUTOMATION IN CYBERSECURITY

Analytics Insight | May 25, 2019

HOW IBM IS ADOPTING AUTOMATION IN CYBERSECURITY
It might be a bold modern lifestyle in 2019 but at the same time, it’s a darn startling one for IT security professionals. Just take a look at some recent Gartner evaluations of the current security scenario. By 2020, 60% of digital organizations will endure real service disappointments, because of the powerlessness of IT security groups to manage the digital threat. By 2020, 60% of big business data security spending plans will be assigned for rapid detection and response approaches, which is an expansion from less than 30% in 2016. By 2018, 25% of corporate data traffic will stream legitimately from cell phones to the cloud, bypassing enterprise security controls. Through 2018, over half of IoT device producers won’t almost certainly address risks from poor authentication practices. The fourth IBM cybersecurity survey uncovers how ill-equipped organizations are for a cyber attack. In spite of widespread acknowledgment that a strong cybersecurity plan can spare organizations critical harms in the wake of an assault, the survey demonstrates that numerous companies still don’t have an episode response plan set up and those that do have a solution are not trying it often.

Spotlight

Not so long ago, technology that could learn and solve problems on its own was found only in science fiction. Today, devices with these advanced capabilities are emerging all around us, representing the latest wave of rapid progress. Artificial intelligence (AI) is redefining our way of life, enabling machines to do what people once thought only humans could do. It is also revolutionizing the way we do business.

Related News

Google and KPMG Security Experts Share Their Insights on COVID-19 Related Cyber Scams

Google | May 18, 2020

Google and KPMG online security observers share their insights for securing accounts and access, even while operating from remote locations. Hackers and other cybercriminals tend to look at crises as opportunities, and COVID-19 has proven to be the mother of all crises as not only are systems . Cyber scams based on COVID-19 have become prevalent in recent months, as hackers look to capitalize on the virus-driven uncertainty affecting individuals, enterprises . COVID-19 has created previously unthinkable consequences for our society. Organised crime has been quick to respond, mounting large scale orchestrated campaigns to defraud banking customers, preying on fear and anxiety related to COVID-19. Further, as governments prepare stimulus packages in response to the pandemic and begin providing fiscal support to their citizens, the risk of being defrauded by COVID-19 related scams will likely continue to rise. For the financial sector in particular there are great challenges. The industry has already begun to provide an unprecedented response, but are having to work through their own business continuity issues. The past two months have seen the largest ever migration of individuals to digital platforms and tools in order to stay connected, for both productivity and personal purposes. Millions turned to virtual tools such as videoconferencing apps, many utilizing them for the first time. At the same time, building closures and the rapid shift towards remote working policies left many enterprises and governmental organizations scrambling to ensure adequate measures had been taken to shield confidential data, private servers, and other exposed systems. Learn more: THE TIME HAS COME TO BRING IN AI, MACHINE LEARNING AND AUTOMATION IN CYBERSECURITY . “Our systems have also spotted malware-laden sites that pose as sign-in pages for popular social media accounts, health organizations, and even official coronavirus maps". ~ Mark Risher, Senior Director for Account Security . In an era of social distancing, it is fortunate that technology has evolved to a point that many services can be rendered completely online. Yet with each new helpful technological advancement, comes the possibility of introducing new online security risks. Hackers and other cybercriminals tend to look at crises as opportunities, and COVID-19 has proven to be the mother of all crises as not only are systems vulnerable due to quickly changing world circumstances, but everyone is constantly looking to digital means to keep them connected. “Such prolific fraud attempts out there, realization of what forms these COVID-19 scams take – and how they should be best handled – should be of urgent importance for both the organizations and the people who work for them. “ Fraudsters posing as members of domestic and international health authorities, such as the United States Centre for Disease Control and Prevention (CDC) or the World Health Organisation (WHO), targeting victims with emails including malicious attachments, links, or redirects to “updates” regarding the spread of COVID-19, new containment measures, maps of the outbreak or ways to protect yourself from exposure. Our systems have also spotted malware-laden sites that pose as sign-in pages for popular social media accounts, health organizations, and even official coronavirus maps.During the past couple of weeks, our advanced, machine-learning classifiers have seen 18 million daily malware and phishing attempts related to COVID-19, in addition to more than 240 million COVID-related spam messages. Right now, everyone is heavily reliant on their laptops or mobile phones to conduct their everyday needs such as online banking, shopping or donating to causes and charities. Criminals are not afraid to take advantage of that,” warned Tan Kim Chuan, Head of Forensic at KPMG in Malaysia. Mark Risher, Senior Director for Account Security, Identity, and Abuse at Google, says Google’s team of cybersecurity experts have encountered coronavirus-related cyber scams aimed at individuals, companies, and government administrations. Our Threat Analysis Group continually monitors for sophisticated, government-backed hacking activity and is seeing new COVID-19 messaging used in attacks, and our security systems have detected a range of new scams such as phishing emails posing as messages from charities and NGOs battling COVID-19, directions from “administrators” to employees working from home, and even notices spoofing healthcare providers. Learn more: DELOITTE EXTENDS ITS CYBERSECURITY SERVICES BY PARTNERING WITH PALO ALTO .

Read More

DATA SECURITY

Secure Cyber Defense Growing Its Miamisburg Operations With JobsOhio Support

businesswire | December 14, 2020

Secure Cyber Defense declared it will develop its Miamisburg tasks, adding 16 new workers throughout the following three years to help ensure organizations against digital assaults. JobsOhio gave the organization a $75,000 Workforce Grant to help the extension, which will build finance by $1.3 million. “At the start of 2019, we solidified our relationship with industry-leading cybersecurity technology company Fortinet. As our relationship with Fortinet has grown, we now have the ability to serve larger more complex enterprise companies with advanced technology, cybersecurity monitoring and analysis, and incident response capabilities. Growing our cybersecurity expertise and adding new team members will allow us to take advantage of these growth opportunities,” says Shawn Waldman, CEO of Secure Cyber Defense. Secure Cyber Defense keeps on developing as the requirement for improved network safety has expanded. Innovation organizations keep on battling to discover qualified engineers and investigators with network protection experience. The JobsOhio Workforce Grant guarantees organizations like Secure Cyber Defense can recruit and prepare talented online protection specialists. The expanding need for particular aptitudes makes proficient open doors in the quickly developing industry network safety field. “Every company in today’s digital world has to create a secure cyber environment and needs skilled cyber talent to guard their digital assets,” said Julie Sullivan, DDC Executive Vice President of Regional Development. “We’re excited Secure Cyber Defense is growing their operations here in the Dayton Region and adding jobs in this exciting and challenging field. The work they do highlights the region’s strength in cyber and digital transformation.” About Secure Cyber Defense: Located in Miamisburg, Ohio, Secure Cyber Defense is a Managed Security Services Provider for government agencies, education, manufacturing and financial service companies. The company provides continuous cybersecurity monitoring, analyzing digital environments for possible attacks to identify, prevent and respond to cyber threats. Utilizing Fortinet technology, vulnerability assessments, incident response planning, and expert continuous monitoring services, Secure Cyber Defense has the ability to scale custom solutions for any size organization. Secure Cyber Defense is an Advanced Fortinet Partner.

Read More

SOFTWARE SECURITY

The latest Capcom multinational to be hit by cyber-attack disruption

silicon | November 09, 2020

Occupant Evil and Street Fighter creator Capcom hit by assault that upsets inside frameworks, while scientists state Ragnar Locker ransomware bunch is to be faulted Japanese game creator Capcom has been hit by a security break that has disturbed its inner frameworks. Industry watchers said the assault may likewise have prompted the burglary of touchy corporate information, with Capcom apparently having been focused by the Ragnar Locker ransomware gathering. Capcom creates a portion of the gaming business' most popular titles, including Resident Evil and Street Fighter. The organization said it got mindful of the assault on Monday, 2 November, when it started encountering disturbance to interior frameworks including email and record workers. Disruption “Beginning in the early morning hours of November 2, 2020 some of the Capcom Group networks experienced issues that affected access to certain systems, including email and file servers,” the company said in an official statement. It said it had confirmed the disruption was due to “unauthorised access carried out by a third party”. Capcom said it handicapped parts of its organization to stop the assault's advancement. Toward the week's end the organization said it was proceeding to encounter email and web structure correspondences issues because of the assault's impacts on its workers. Capcom additionally said it was incidentally unfit to react to archive demands. The organization said there was no sign "as of now" that client data had been taken, and said internet ongoing interaction was not influenced. The game creator added that it is doing an examination with law requirement, while taking measures to reestablish its frameworks. Ragnar Locker A few security scientists said the assault was crafted by the Ragnar Locker ransomware pack. In a payment note distributed by Bleeping Computer, the pack professed to have taken 1TB of decoded inward information from workers in Canada, Japan and the US, and said it would delivery or sell the information if Capcom didn't pay a payment. The payoff note was apparently joined by screen captures of documents including representative end arrangements, Japanese international IDs, bank and temporary worker explanations and Active Directory clients. The note connected to a 24MB chronicle with additional archives including NDAs, pay bookkeeping pages, corporate interchanges and sovereignty reports. The information in the report was taken from a ransomware test recouped by analyst Pancak3, who affirmed the contribution of Ragnar Locker by means of Twitter. As indicated by Pancak3, the pack professes to have encoded 2,000 gadgets on Capcom's organizations and is requesting $11 million (£8.3m) in Bitcoin to unscramble them. Information robbery In the payoff note, Ragnar Locker claims it will erase the taken information on installment of a payment. Nonetheless, law implementation specialists prompt associations not to pay such payments as there is no assurance the hoodlums will hold to their promise. This year Ragnar Locker has completed significant hacks on Portuguese energy monster Energias de Portugal (EDP), requesting a $10.9m payment, and French coordinations organization CMA CGM, which prompted critical disturbance of the organization's activities. Analysts have noticed an expanding pattern toward joining ransomware assaults with the burglary of delicate corporate records. In April the DoppelPaymer posse delivered archives taken from contractual workers to SpaceX, Tesla, Boeing, Lockheed-Martin and the US Navy after their objectives wouldn't pay ransoms.

Read More

Spotlight

Not so long ago, technology that could learn and solve problems on its own was found only in science fiction. Today, devices with these advanced capabilities are emerging all around us, representing the latest wave of rapid progress. Artificial intelligence (AI) is redefining our way of life, enabling machines to do what people once thought only humans could do. It is also revolutionizing the way we do business.