Cybersecurity

Mastercard Enhances Cybersecurity Consulting Practice with Cyber Front Threat Simulation PlatformWith cybercrime expected to cost $10.5 trillion annually by 2025, innovating cybersecurity remains critical across industries “facing rapid digitization.”The tool will “help businesses and governments enhance their cybersecurity operational resilience as part of Mastercard’s growing Cybersecurity & Risk consulting practice.”Cyber Front, an always-on platform, “helpsContinue reading “Cybersecurity”

Security Innovation Donates Cybersecurity Training Platform to Shaw UniversityPhilanthropic Partnership enriches University’s Computer Science degree with Cyber Operations Concentration.WILMINGTON, Mass., May 25, 2022 (GLOBE NEWSWIRE) — Security Innovation, a pioneer in software security assessment and training, announced today a partnership with Shaw University, a historically black college/university (HBCU). The software security training platform features an extensive catalog of online courses, hands-on labs, and authentic cyber ranges. The partnership supports Shaw’s commitment to addressing the cybersecurity job shortage, which presently stands at nearly 3 million unfilled positions globally. The Shaw University Center for Cybersecurity Education and Research also will help improve the lack of diversity in the industry by creating new cybersecurity professionals from under-represented demographic populations.Shaw students will get full access to CMD+CTRL Base Camp, the same training platform used by Security Innovation’s enterprise customers, including some of the most recognizable global brands. Students will be trained on the most pressing security issues facing our increasingly software- and cloud-dependent world.Information Security AnalystCyber Threat HunterSecurity Operations AnalystThe learning methodology used in Security Innovation’s training platform is similar to what higher education institutions have used for decades to build skills in a timely, effective way: learn, practice, and master. Shaw will integrate these products as an integral part of classroom education, labs, and capstone projects for its new cybersecurity programs. “This partnership with Security Innovation is a significant step toward preparing our students to be leaders in the cybersecurity industry,” said Dr. Paulette Dillard, President of Shaw University. “By collaborating with a leader in security training, our students will have access to state-of-the-art software, training, and technology, which is crucial for workplace readiness on Day 1.”“As a university spin-off itself, Security Innovation recognizes the value of educating students on cybersecurity so they graduate with skills that are in demand,” said Ed Adams, CEO of Security Innovation. “This partnership builds on our decade-long commitment to diversify the cyber security industry so we are better able to defend critical infrastructure. There are good social, economic, and geopolitical reasons for launching this partnership with Shaw University.”About Shaw UniversityShaw University, located in Raleigh, North Carolina, is the first historically Black institution of higher education founded in North Carolina and is among the oldest in the nation. The University was founded in 1865 by Henry Martin Tupper. Dr. Paulette Dillard currently serves as the University’s 18th President. For more information, visit www.shawu.edu.About Security InnovationSecurity Innovation is a pioneer in software security and literally wrote the book on How to Break Software Security. Since 2002, organizations have relied on the company’s assessment and training solutions to secure software wherever it runs. Recognized 6x on the Gartner Magic Quadrant for computer-based security training, the company’s flagship product CMD+CTRL Base Camp combines role-based courses with hands-on cyber ranges to build skills that stick. For more information, visit securityinnovation.com or connect on LinkedIn or Twitter.About CMD+CTRL Base Camp Training PlatformBase Camp is the industry’s most dynamic and integrated solution for building software security skills. Accessible from a single portal, learners can follow individualized Learning Journeys, which can be created for any role or experience level across the entire software development lifecycle. These natural learning progressions enable users to learn security concepts with courses, practice those skills in hands-on labs, and finally master those skills through competition in our Cyber Range. With over 3.5 million users, Base Camp helps all software security stakeholders address the risk of today’s tech stacks – flawed design, defenseless code, expanded attack surface, and misconfigured deployments.Media ContactMaureen RobinsonMarketing Directormrobinson@securityinnovation.com978.390.3299

inifinte tanks to God! A.I.event at uyo was successful. we thank you for being part of this wonderful event. Big thanks to all sponsors, tech team’s and members of DSN for supporting us as we contribute to the A.I. community at uyo akwa ibom state. we treasure your contribution and time with us! Big tanks to @kvng-odesy,, for full support. i want to publicly appreciate my team, we’ve been working tirelessly to the contributions to our building community, as always, thanks. we look forward to seeing you next time, future collaborations from your side🤝

Tailoring the Cybersecurity Message for Small Orgs, ResidentsCybersecurity guidance needs to be designed so small organizations can easily identify next steps to take, and awareness campaigns should put practices into language layfolk can understand, experts say.May 24, 2022 by Jule Pattison-GordonCybersecurity takes a whole-of-society approach, and ensuring that everyone is part of the journey relies on having a communication strategy that meets small organizations and everyday residents where they’re at, said speakers at a recent Institute for Security and Technology (IST) special event on ransomware.PRACTICAL PRIORITIESThere’s plenty of cybersecurity advice swirling about — perhaps too much. Organizations can get easily overwhelmed by all the different advice and regulatory frameworks, leaving them at a loss as to where to start their improvement efforts, said Phyllis Lee, senior director of Controls at the Center for Internet Security (CIS).There’s an element of realism and practicality that needs to be part of these conversations:“In the real world, we know that almost no organizations are actually patching every single vulnerability everywhere in the environment,” said Eric Goldstein, executive assistant director for cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA).Players in the space therefore need to help entities with their priorities. CISA aims to do this in part by creating its catalog of Known Exploited Vulnerabilities, which lists out which — out of all the vulnerabilities out there — are the ones its actually seeing malicious actors take advantage of, so organizations don’t get lost trying to tackle everything.CIS also aims to help organizations identify the cybersecurity controls that will give them the most bang for their buck. Last October, it released a new guidance called Implementation Group 1 (IG1). This guideline outlines core cyber hygiene steps that are low-cost to implement but still make a difference against many of the techniques used in ransomware attacks and other top threats. Organizations with more resources and greater need for security can step it up by adopting additional steps outlined in its Implementation Groups 2 and 3.And basic steps can carry a lot of weight.“Most of the time, [the bad guys] are using really basic tools and techniques that have been used over and over and over again,” said Cyber Threat Alliance President and CEO Michael Daniel.He and Lee both said it’s important to remind organizations that any steps they take to improve their cyber defenses matter and not to feel like it’s hopeless if they can’t adopt all the recommendations in one go.COMMUNICATION OUTSIDE THE CYBER BUBBLEThe cybersecurity community also needs to ensure that it’s reaching audiences beyond those likely to turn up to a cybersecurity conference, said Goldstein. This is an issue that impacts everyone and getting all ears may mean bringing cybersecurity conversations to non-cyber industry conferences as well as spreading word through local media, he said.Daniel also recommended reaching out to organizations that particular audiences already work with, such as chambers of commerce to reach small businesses or bar associations to reach legal groups.Government agencies also want to improve how they talk to residents, who can reduce risks if they know how to stay safe.“One of the most important things we can do is help the American people build resilience,” said CISA Director Jen Easterly.When trying to connect with layfolk, it’s essential to break out of using buzzwords and jargon to instead offer clear, easy-to-follow explanations, Easterly said.“If you’re speaking nerd-speak to the American people — for example, ‘multifactor authentication,’ — their eyes glaze over,” Easterly said.There’s a simpler, more effective way of getting across the same idea, she said: “Really, at the end of the day it’s ‘more than a password.’”SECURITY BY DESIGN?Asking users to adopt more secure behaviors is only part of the challenge. National Cyber Director Chris Inglis has previously urged those who create technology to design their offerings to be more secure and shift more of security responsibility and risk off of the small entities and individuals using the tools and onto their own shoulders.Palo Alto Networks Vice President of Public Sector John Davis saw cybersecurity as an area requiring new efforts from both end users and those who provide them tools. Security practitioners and end users may fail to realize just how important it is to follow low-cost cybersecurity basics like changing passwords on a recurring basis, regularly updating systems and adopting multifactor authentication, he said, and suggested a national awareness campaign could be part of the effort to change this.But Davis also said that technology companies have work to do, too, because the tools they offer can be hard to use well. Users today are working with a vast array of technologies, and often need to juggle a variety of security solutions that each protect one aspect of the environment and which aren’t designed to integrate with each other.“Cybersecurity technologies are becoming more difficult to understand and harder to use,” Davis said.Tech firms that design their offerings with customers’ safety in mind can blunt the impact of insecure user habits. Many cyber attackers make use of leaked, stolen or easy-to-crack passwords, and Easterly praised efforts by members of the FIDO Alliance to make passwordless login methods. That organization aims to develop and promote alternate methods of authentication.“We want to move in that direction, so we make it easy on consumers to just be able to seamlessly protect themselves,” she said.

Cybersecurity: What to know in an ever-evolving digital landscape

We’re in an era where the vast majority of our finances are managed online, from bank accounts to credit cards. Our email addresses, passwords and credit card numbers are linked to streaming services for music and entertainment, and it is common to use services like Venmo and Zelle to transfer funds quickly. Technology makes lifeContinue reading “Cybersecurity: What to know in an ever-evolving digital landscape”

on our way to the event center. we can’t wait to see you! 17th – 25th- May. 𝗔𝗿𝘁𝗶𝗳𝗶𝗰𝗶𝗮𝗹 𝗶𝗻𝘁𝗲𝗹𝗹𝗶𝗴𝗲𝗻𝗰𝗲 𝗮𝗻𝗱 𝗗𝗮𝘁𝗮 𝗦𝗰𝗶𝗲𝗻𝗰𝗲’𝘀 𝗲𝘃𝗲𝗻𝘁 𝗕𝗮𝘁𝗰𝗵 (4). location at uyo akwa ibom State😁

Design a site like this with WordPress.com
Get started