Why Cybersecurity Will Never Be the Same After the Russian Invasion

After the Russian invasion of Ukraine, the world of business will never be the same again. Deputy Attorney General (DAG) Lisa Monaco recently said that the world’s “geopolitical landscape is more challenging and complex than ever. The most prominent example is of course Russia’s invasion of Ukraine.” It is “nothing less than a fundamental challengeContinue reading “Why Cybersecurity Will Never Be the Same After the Russian Invasion”

June 22, 2022 by Kristin HardyYou might think your run-of-the-mill privacy and cybersecurity training is sufficient. You might think that by “checking the box” on generic training you have fulfilled your duty and obligation to mitigate data privacy and cybersecurity attacks. You might think that general malware protection adequately secures your company’s data and you can move on with your everyday business efforts without concern.Think again.Human error continues to be the number one driver of data breaches. Over 85% of all data breaches are caused by an employee mistake. (Source: Psychology of Human Error by Stanford University Professor Jeff Hancock and Tessian, a cybersecurity firm.)“Human error” can take many forms from the use of stolen credentials and misuse of company information to phishing or malware links. Cybercriminals and hackers have developed advanced and creative tactics in efforts to access and steal confidential information. Malware attacks, for example, are attacks where hackers attempt to infiltrate networks, individual computers, and mobile devices with malicious software. An unassuming click to open a link or download software is all it takes to enable a malware attack. Social engineering tactics are often used  to get employees to send bank account information, provide usernames and passwords, among other confidential information. Psychological manipulation is the bread and butter of social engineering. Such efforts intentionally target human interactions by tricking persons into thinking they are receiving an email from a trusted source, perhaps a friend or a business partner. Email content may consist of an urgent request, portray legitimate branding to make the email appear trustworthy, request your “verification” of information, or pose as a boss or coworker.Employees need to be trained and continuously reminded to be mindful when conducting business. Technology can only take us so far in protecting businesses and securing information from cybersecurity attacks, especially with respect to social engineering. In the hustle and bustle of everyday business, it is easy to flit from email to email, shooting off quick responses without even glancing at the subject line, or the name or email address of the sender. Some of the simplest requests from a seemingly innocuous email can lead to the leak of very valuable information. Do you recognize the sender’s email address? Are there spelling mistakes in the content of the email? Is the company or individual name familiar to you?Cybersecurity attacks can be incredibly costly, causing financial, mental, and emotional heartache from the click of a button. Aside from financial ramifications, data breaches and cybersecurity attacks may reflect negatively on your business’s reputation, cause you to lose clients or customers, and may even lead to significant litigation proceedings and hefty government fines from breach of regulatory violations.The best approach in managing privacy and cybersecurity training is a proactive one. A primary goal should be to create a smarter, more attentive security culture within your business.Create a culture of awareness and attention to privacy and cybersecurity matters.Establish clear guidelines, expectations, and training for your employees regarding data security and privacy. Keep privacy and cybersecurity risks and related knowledge top of mind by providing bi-monthly or quarterly training or cyberattack campaigns to create a smarter, attentive security culture.Train employees to recognize and report (internally) social engineering tactics, phishing emails, and other scams.Train employees on the importance of specific categories of data (like Social Security numbers and credit card information).2. Emphasize that cybersecurity is everyone’s responsibility.Companies must stress the importance of privacy and cybersecurity to every employee in the company. It cannot be the sole responsibility of the IT department to keep company data secure. Even the best IT department practices can be undermined when employees fail to follow best practices regarding data management and cybersecurity risks. Employees must be trained to understand the importance of data management and cybersecurity risks to the company. Disclosing confidential and valuable information could trigger data breach notifications procedures under state and federal law and cause severe financial loss, and incalculable reputation damage to a company. Every employee needs to regard data management and cybersecurity risks as a priority. And, yes, employees should be held accountable for failures to comply with applicable policies and training.Develop an Incident Response Team (IRT). It’s a matter of when, not if.Be prepared. Develop an IRT if you don’t already have one. In today’s day and age where technology rules, a cyberattack is a matter of when, not if. Cybercriminals are persistent in their efforts: your time may be coming. It is advantageous to run simulations and train employees on how to handle a breach or some other cyberattack when it happens, for example:Confirm the breach and determine what information was compromised.Assess the severity of the damage.Prepare and begin the notification process (to parties subject to the breach), if applicable to the type of data that was comprised.Take actions to prevent a reoccurrence of the same incident by implementing more robust employee training, as well as technological security measures.The longer it takes to respond to a cyberattack, the more costly it becomes.The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances

Tamkeen signs with Beyon Cyber to train and hire cybersecurity specialists under SANS programJune 18, 2022Following the strategic agreement with the world-renowned provider of cybersecurity training, SANS Institute, Tamkeen signed a strategic cooperation with Beyon Cyber to provide quality job and training opportunities for 20 Bahraini cybersecurity professionals where they will be able to utilize their acquired knowledge and skills into practice in a real work environment. The signing took place during ELEVATE, a major technology forum hosted by the Beyon Cyber entities, which took place recently at the Ritz Carlton.This announcement is the first of more planned partnerships with key leaders in Bahrain’s private sector, designed with the purpose of providing the SANS cybersecurity graduates with quality training opportunities that can support their growth and development and enable them to build sustainable careers in a high-demand field. Cybersecurity professionals are currently among the most sought after in local and global job markets, hence the wide range of opportunities that will be available to Bahrainis attending the SANS Institute training courses.On this occasion, His Excellency Husain Mohamed Rajab, Chief Executive of the Labour Fund (Tamkeen), emphasized Tamkeen’s commitment to empowering the national workforce to become competitive both locally and internationally in alignment with the leadership vision and the national economic recovery plan. He stated: “We are pleased to partner with Beyon Cyber to foster quality opportunities for Bahrainis and we will continue to develop active partnerships within the Kingdom’s ecosystem to cater to the growth requirements of both enterprises and individuals. Supporting training and employment for Bahrainis provides our national workforce with sustainable career paths and builds an accessible talent pool for enterprises to tap into and power their productivity and sustainability, fulfilling our mandate of achieving a more productive private sector that drives national economic growth”Beyon Cyber is one of the key private cyber security organizations in Bahrain, and shared Tamkeen’s vision when it comes to empowering young Bahraini talent with the needed cyber security training. For his part, Beyon  Cyber CEO Dr. Shaikh Khalid bin Duaij Al Khalifa, said: “Tamkeen plays a vital role in the upskilling and development of Bahrainis to cater to the rapidly changing market demands and address growing skill gaps that challenge productivity and dynamism in enterprises. We strongly believe in the abilities of Bahraini talent and look forward to seeing them realize their full potential within our ranks.”This agreement is aligned with Tamkeen’s recent strategic transformation that aims to drive greater economic impact. As part of the transformation, Tamkeen rolled out 16 programs designed to help enterprises and individuals reach their highest potential, as well as several strategic partnerships with local and world-leading organizations to maximize the impact of these programs. As the transformation journey continues, Tamkeen will build on this momentum and introduce more programs and initiatives in response to the market needs.-Ends-

Hunters Named Snowflake Cybersecurity Partner of the YearLAS VEGAS, June 14, 2022 (GLOBE NEWSWIRE) — Snowflake Summit — Hunters today announced that it has been named the 2022 Cybersecurity Partner of the Year award winner by Snowflake, the Data Cloud company. The award was presented this week at Snowflake Summit 2022 ‘The World of Data Collaboration.’Hunters was recognized for the company’s achievements as part of the Snowflake Data Cloud, helping joint customers detect and respond to threats that matter across the attack surface faster and more reliably than Security Information and Event Management (SIEM) solutions. Hunters SOC Platform, which is Powered by Snowflake, removes the complex challenge of data engineering when ingesting security data into a Snowflake data lake, allowing security teams to focus on threat detection and response. Through built-in detection engineering, data correlation and automatic investigation, Hunters SOC Platform helps teams overcome volume, complexity and false positives.According to Aaron Cooper, SOC manager at TripActions, a global travel management company, “We leverage Hunters SOC Platform and Snowflake to unify data spread across security tools and run analysis and investigations while minimizing data ownership costs. Working with both platforms has allowed us to detect and respond to threats faster and more effectively,” he said.“Hunters is extremely proud to receive this recognition of being named Cybersecurity Partner of the Year by Snowflake,” said Chris Sullivan, head of Alliances and Channels at Hunters. “Over the past year, we’ve shown unique value to our joint customers by enabling security teams to adopt Snowflake’s data lake offering and achieve better efficiencies at the SOC.”“We are excited to announce Hunters as Snowflake’s Cybersecurity Partner of the Year,” said Omer Singer, head of Cybersecurity Strategy, Snowflake. “Hunters have delivered effective automation for security operations, from data collection to detection and response. By operationalizing the potential of the Snowflake Data Cloud for SOC workflows, Hunters is bringing real value to the Snowflake cybersecurity ecosystem and we look forward to strengthening our partnership in the service of our joint customers.”Hunters’ CEO Uri May, together with Aaron Cooper, will present at the Snowflake Summit session “Aligning Your Data Lake with Security Operations” on Wednesday, June 15th at 12:00 PM PT.Learn more about Hunters and Snowflake here. Hunters Named Snowflake Cybersecurity Partner of the YearAbout HuntersHunters SOC Platform empowers security teams to automatically identify and respond to security incidents across their entire attack surface. We enable vendor-agnostic data ingestion and normalization at a predictable cost. Our built-in detection engineering, data correlation, and automatic investigation helps teams overcome volume, complexity, and false positives. Hunters mitigates real threats faster and more reliably than SIEMs, ultimately reducing customers’ overall security risk. Learn how enterprises like Booking.com, Snowflake, Netgear and Cimpress leverage Hunters SOC Platform to empower their security teams at https://hunters.ai. Hunters is backed by leading VCs and strategic investors including Stripes, YL Ventures, DTCP, Cisco Investments, Bessemer Venture Partners, U.S. Venture Partners (USVP), Microsoft’s venture fund M12, Blumberg Capital, Snowflake, Databricks and Okta.Hunters was recognized as the SC Media 2021 Trust Award Finalist for Best Threat Detection Technology and winner of the CISO Choice Awards: Security Analytics and Security Operations.Media Contact:Deb MontnerMontner Tech PRdmontner@montner.com A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/fa9067b5-3b6f-4c32-9b98-0f2be70611da

33% of cybersecurity leaders name zero trust their top priorityThe Zero Trust Impact Report from Illumio and The Enterprise Strategy Group (ESG) surveyed 1,000 information technology (IT) and security professionals in eight countries about their cybersecurity landscapes and the impact of zero trust on their organizations.Prevalence of cyberattacks, ransomwareThe report discovered that 47% of security leaders do not believe they will be breached, despite increasingly sophisticated and frequent attacks. In the past two years alone, more than three-quarters of organizations surveyed (76%) have been attacked by ransomware and 66% have experienced at least one software supply chain attack. Respondents say software supply chain attacks (48%), zero-day exploits (46%) and ransomware attacks (44%) are the three cyber threats posing the most risk to their organizations. Thirty-six percent of respondents have been the victims of a successful ransomware attack over the past two years. What’s more, 82% of respondents who were victims of a successful attack paid a ransom, with the average ransom netting $495,000.In the Executive Order on Improving the Nation’s Cybersecurity, the Biden administration made clear the importance of zero trust strategies for U.S. organizations facing cyberattacks. Ninety percent of security leaders report zero trust is one of their top three cybersecurity priorities, and 33% say zero trust is their top cybersecurity priority.Thirty-nine percent of all security spending over the next 12 months is earmarked to advance zero trust initiatives, according to the report.For more information, click here.

TypeScript is bringing 2 incredible new features to the table, stay on top of what’s coming!TypeScript 4.7This upcoming TypeScript version will bring a lot of new features and improvements to the language, but there are 2 in particular that I found especially interesting:1- Instatiation Expressions2- extends Constraints on infer Type VariablesNew features valueIf you are anything like me and enjoy creating complex type definitions that provide great levels of Developer Experience to you and your co-workers, then you should absolutely be on top of these new features, as they will ease the way you write those type definitions, by A LOT.Reduce your types verbosity;For anyone that has written more than a handful of generic functions, this new feature is probably something that could have saved you from writing “crappy” JS workarounds to get some types going.Instantiation Expressions will allow us to get a generic type, without the “instantiation” part 🤯type Dog = {name: stringisGoodBoy: boolean;}type Cat = {name: string}function getBigPet(pet: T){return {…pet, big: true}}// 1- Need to have a typed param to pass 👎const dog: Dog = {name: “Jake”, isGoodBoy: true}// 2- Need to create an arrow function 👎const getBigDog = () => getBigPet(dog);Before this upcoming version, there was really no way to leverage a generic function’s type, which led many of us to create workarounds by writing unnecessary JS code. ❌type Dog = {name: stringisGoodBoy: boolean;}type Cat = {name: string}function getBigPet(pet: T){return {…pet, big: true}}// Can “instantiate” on the fly ✅const getBigDog = getBigPet;// No need to bring in any extra types ✅type BigCat = ReturnType>So, what Instantiation Expressions bring to the table, is the simplicity with which one can retrieve a generic function’s type without any sort of workarounds or creating any extra JS code.PROSNo need to write JS code just for the sake of typing;extends Constraints on infer Type VariablesThis new feature is something that will help anyone to write way less verbose types when depending on inferred type constraints.It basically acts as an early return statement that we (developers), many times use in languages like JavaScript to immediately move away to the “false” logical path, when some conditional is met.// A type that returns the First and Last elements of the Number type // 😔😔😔 This feels overwhelming…type FirstAndLastNumber = T extends [infer Head,…any,infer Tail]? Head extends number? Tail extends number? [Head, Tail]: never: never: never;Before this upcoming feature, there was no way to do an “early check” on the inferred types, and because of that, we ended up creating very verbose and “scary” types. ❌After 4.7// The “same” type as before 🤯🤯🤯type FirstAndLastNumber = T extends [// 1- Add the extends constraint hereinfer Head extends number,…any,// 2- Add the extends constraint hereinfer Tail extends number] ? [Head, Tail]: never;extends Constraints on infer Type Variables really simplifies the process of defining types that rely on inferred type variables – more than a syntax change, this feature really takes the mental model of creating types one step closer to the one we use in “real programming”.PROS1- Cleaner and less verbose types;2- Lowers the complexity barrier for others to touch this otherwise “monstrosity” type;3- TypeScript compiler will be faster because it can return earlier;ConclusionBy taking advantage of TypeScript’s 4.7 version new features, you will be able to lower the complexity of type definitions by a lot, making it way easier for anyone to understand and even develop on top of those types.P.S. You can already try these new features in the TypeScript PlaygroundMake sure to follow me on twitter if you want to read about TypeScript best practices or just web development in general!TypeScript is bringing 2 incredible new features to the table, stay on top of what’s coming!TypeScript 4.7This upcoming TypeScript version will bring a lot of new features and improvements to the language, but there are 2 in particular that I found especially interesting:1- Instatiation Expressions2- extends Constraints on infer Type VariablesNew features valueIf you are anything like me and enjoy creating complex type definitions that provide great levels of Developer Experience to you and your co-workers, then you should absolutely be on top of these new features, as they will ease the way you write those type definitions, by A LOT.Reduce your types verbosity;For anyone that has written more than a handful of generic functions, this new feature is probably something that could have saved you from writing “crappy” JS workarounds to get some types going.Instantiation Expressions will allow us to get a generic type, without the “instantiation” part 🤯type Dog = {name: stringisGoodBoy: boolean;}type Cat = {name: string}function getBigPet(pet: T){return {…pet, big: true}}// 1- Need to have a typed param to pass 👎const dog: Dog = {name: “Jake”, isGoodBoy: true}// 2- Need to create an arrow function 👎const getBigDog = () => getBigPet(dog);Before this upcoming version, there was really no way to leverage a generic function’s type, which led many of us to create workarounds by writing unnecessary JS code. ❌type Dog = {name: stringisGoodBoy: boolean;}type Cat = {name: string}function getBigPet(pet: T){return {…pet, big: true}}// Can “instantiate” on the fly ✅const getBigDog = getBigPet;// No need to bring in any extra types ✅type BigCat = ReturnType>So, what Instantiation Expressions bring to the table, is the simplicity with which one can retrieve a generic function’s type without any sort of workarounds or creating any extra JS code.PROSNo need to write JS code just for the sake of typing;extends Constraints on infer Type VariablesThis new feature is something that will help anyone to write way less verbose types when depending on inferred type constraints.It basically acts as an early return statement that we (developers), many times use in languages like JavaScript to immediately move away to the “false” logical path, when some conditional is met.// A type that returns the First and Last elements of the Number type // 😔😔😔 This feels overwhelming…type FirstAndLastNumber = T extends [infer Head,…any,infer Tail]? Head extends number? Tail extends number? [Head, Tail]: never: never: never;Before this upcoming feature, there was no way to do an “early check” on the inferred types, and because of that, we ended up creating very verbose and “scary” types. ❌After 4.7// The “same” type as before 🤯🤯🤯type FirstAndLastNumber = T extends [// 1- Add the extends constraint hereinfer Head extends number,…any,// 2- Add the extends constraint hereinfer Tail extends number] ? [Head, Tail]: never;extends Constraints on infer Type Variables really simplifies the process of defining types that rely on inferred type variables – more than a syntax change, this feature really takes the mental model of creating types one step closer to the one we use in “real programming”.PROS1- Cleaner and less verbose types;2- Lowers the complexity barrier for others to touch this otherwise “monstrosity” type;3- TypeScript compiler will be faster because it can return earlier;ConclusionBy taking advantage of TypeScript’s 4.7 version new features, you will be able to lower the complexity of type definitions by a lot, making it way easier for anyone to understand and even develop on top of those types.P.S. You can already try these new features in the TypeScript PlaygroundMake sure to follow me on twitter if you want to read about TypeScript best practices or just web development in general!

SSH

PRESS RELEASE: Cinia and SSH expand their cooperation in delivering cybersecurity solutionsCinia and SSH have jointly agreed to develop and offer their Finnish and international customers advanced cybersecurity solutions. In cooperation with SSH, Cinia will provide new services for the processing and transfer of sensitive data and for ensuring access management and control, especially inContinue reading “SSH”

Veteran Cybersecurity Expert, Michael Orozco Joins MorganFranklin ConsultingAddition of Accomplished Industry Leader Continues to Strengthen Cybersecurity Practice to Help Clients Navigate Emerging ThreatsWASHINGTON, May 25, 2022–(BUSINESS WIRE)–MorganFranklin Consulting, a leading finance, technology, and cybersecurity advisory and management firm that specializes in solving complex transformational challenges for its clients, today announced the addition of cybersecurity expert Michael Orozco to serve as a Managing Director and Advisory Services Leader in its cybersecurity practice.”We are thrilled to have Michael join the MorganFranklin team and harness his expertise to help our clients build and deploy mission critical cybersecurity initiatives,” said Keith Hollender, a partner in MorganFranklin’s cybersecurity practice. “As cyber criminals and nation-states launch ever more sophisticated attacks and technology rapidly evolves, cybersecurity must be a top priority for all organizations. Michael will help our clients address the growing challenges that are spurred on by these changes.”Michael brings more than two decades of experience in cyber defense, nation-state attacks, cyber risk mitigation, financial crime, incident response, and regulatory compliance. He has worked extensively across the United States, Eastern and Western Europe, Latin America and speaks fluent Spanish, intermediate French and Russian, and elementary Korean. With a background in the financial services, life sciences and pharmaceutical industries, Michael is also an expert at navigating emerging challenges driven by digital transformation, operations modernization, and blockchain technology. He has extensive experience advising boards of directors as well as through in-depth technical architecture work. He is also a hands-on capable subject matter expert having earned his CISA, CDPSE, CGEIT, CRISC, PMP, and AWS Certified Solution Architect Professional credentials.”I’m excited to use my unique expertise to help MorganFranklin continue to accelerate its growth as a premier consultancy,” said Michael Orozco. “This company is dedicated to helping solve the most pressing cybersecurity challenges for clients and to prepare them for emerging threats on the horizon. That is a mission I am proud to be a part of.”Prior to MorganFranklin, Michael was a partner leading cybersecurity, risk, and resilience efforts for KPMG. He has also held global leadership positions at Accenture and other consulting firms, where he built and led global teams focused on mission critical security programs. In addition, Michael has received U.S. Congressional awards from the U.S. Senate, U.S. House of Representatives, and citations from the State of New York and the Borough of Brooklyn for his national cybersecurity efforts.MorganFranklin’s cybersecurity practice provides end-to-end client services that include program strategy governance, risk and compliance; identity and access management; cybersecurity operations; incident response; business and technology resilience; risk intelligence; and a complete portfolio of managed security services.MorganFranklin’s cybersecurity practice leaders, including Michael Orozco, will be onsite at RSA Conference in San Francisco June 6-9, 2022. To schedule a personalized discussion, email: CyberBD@morganfranklin.com. For more information visit: www.morganfranklin.com/cybersecurityMorganFranklin Consulting is a management advisory firm that works with leading businesses to address critical finance, technology, cybersecurity and business objectives. The firm’s areas of expertise also include on-demand technical accounting, financial reporting, assistance with IPO, M&A, and SPAC transactions, finance transformation, risk advisory, supply chain services, and the implementation of enterprise & cloud applications including NetSuite, Microsoft ERP, OneStream, and more. MorganFranklin is headquartered in the Washington D.C. area with regional offices in New York, Philadelphia, Atlanta, Raleigh, Charlotte, Nashville, Dallas, Los Angeles, and San Francisco. The firm supports clients across the globe. For more information visit: www.morganfranklin.comAbout VacoVaco delivers critical talent solutions to clients by providing consulting, project resources, executive search, direct hire and strategic staffing solutions with expertise in numerous areas including accounting and finance, technology and operations. In addition to Vaco, the family of brands includes MorganFranklin Consulting, Vaco’s methodology-driven global consulting platform; Pivot Point Consulting, a best in KLAS healthcare IT solutions provider; and Focus Search Partners, a retained executive search practice. Since its founding in 2002, Vaco has grown to serve more than 12,000 clients across the globe with 10,000 employees. Vaco has been named to Inc. magazine’s list of the fastest-growing private companies for the past 15 years and was named to Forbes’ 2018, 2019, 2020 & 2021 lists of America’s Best Recruiting Firms. For more information on Vaco visit: www.vaco.comView source version on businesswire.com: https://www.businesswire.com/news/home/20220525005349/en/

Design a site like this with WordPress.com
Get started