• How Cyber Safe is Your Drinking Water Supply?
    by BrianKrebs on June 21, 2021 at 6:36 pm

    Amid multiple recent reports of hackers breaking into and tampering with drinking water treatment systems comes a new industry survey with some sobering findings: A majority of the 52,000 separate drinking water systems in the United States still haven't inventoried some or any of their information technology systems -- a basic first step in protecting networks from cyberattacks.

  • The Future of Machine Learning and Cybersecurity
    by Bruce Schneier on June 21, 2021 at 11:31 am

    The Center for Security and Emerging Technology has a new report: “Machine Learning and Cybersecurity: Hype and Reality.” Here’s the bottom line: The report offers four conclusions: Machine learning can help defenders more accurately detect and triage potential attacks. However, in many cases these technologies are elaborations on long-standing methods — not fundamentally new approaches — that bring new attack surfaces of their own. A wide range of specific tasks could be fully or partially automated with the use of machine learning, including some forms of vulnerability discovery, deception, and attack disruption. But many of the most transformative of these possibilities still require significant machine learning breakthroughs. ...

  • 5 Critical Steps to Recover From a Ransomware Attack
    by noreply@blogger.com (The Hacker News) on June 21, 2021 at 4:46 pm

    Hackers are increasingly using ransomware as an effective tool to disrupt businesses and fund malicious activities. A recent analysis by cybersecurity company Group-IB revealed ransomware attacks doubled in 2020, while Cybersecurity Venture predicts that a ransomware attack will occur every 11 seconds in 2021. Businesses must prepare for the possibility of a ransomware attack affecting their

  • 7 ways technical debt increases security risk
    by John Edwards on June 21, 2021 at 9:00 am

    Two in three CISOs believe that technical debt, the difference between what's needed in a project and what's finally deployed, to be a significant cause of security vulnerability, according to the 2021 Voice of the CISO report, sponsored by Proofpoint.To read this article in full, please click here(Insider Story)