WannaCry ransomware: Now the US says North Korea was to blame

North Korea was behind the WannaCry ransomware attack that caused chaos around the world earlier this year, according to the US government. “After careful investigation, the U.S. today publicly attributes the massive WannaCry cyberattack to North Korea,” Thomas Bossert, US Homeland security advisor, wrote in an article for the Wall Street Journal. “North Korea has acted especially badly, largely unchecked, […]

Trump’s national security strategy outlines ‘cyberspace’ goals

President Donald Trump unveiled a national security strategy on Monday that highlights his administration’s “America First” approach to the world and foreign policy. The sprawling 68-page document touches on a number of national security concerns, including economic ties with China and the lethality of the US nuclear arsenal, as well as a brief list of action items […]

Is a Good Offense the Best Defense Against Hackers?

Destruction, loss of data, intellectual property theft, fraud, embezzlement, disruption to business, restoration—globally, the costs of dealing with hacking are staggering. Yet under US law, it’s illegal to attack the hackers back. In February, a Georgia Republican introduced a bill to Congress to give legal protection to hacking victims who “hack back” at attackers. The […]

Why Cybersecurity Must Be an International Effort

In his keynote at Black Hat Europe, Chris Painter, the former and first-appointed cyber coordinator for the US State Department called for agreements across countries to improve government cybersecurity. He emphasized the need for countries to deal collectively with the threats they have in common. Security issues are usually bigger than one country, he said, […]

Should the US adopt GDPR?

Read Nick Ismail’s article about whether the United States should have GDPR-like data notification law on Information Age : Let’s face it: personal data just isn’t safe anymore. Equifax’s monumental breach proved this when it revealed roughly 145.5 million US customers may have had their information compromised (the full scope of how many individuals were […]

Despite increased budgets cyberattacks are getting costlier: Survey

Cybersecurity remains top of mind with three quarters of security leaders are more concerned about cybersecurity threats now than they were in 2016, according to the 2017 U.S. State of Cybercrime survey. Read about the 2017 U.S. State of Cybercrime survey which reveals that thirty-five percent of top security executives report to the CEO, and 50 […]

Heart-stopping cybersecurity threats — literally

When many Americans envision our nation’s cybersecurity vulnerabilities they imagine the susceptibilities of our nation’s physical infrastructure — a paralyzed power grid, a hijacked nuclear power plant — high-shock events that would decimate the lives of millions of Americans. Read Rep. Dave Trott of Michigan’s article about how fatal cyber threats can be for human lives […]

Equifax breach puts new energy into data legislation

Read Charlie Mitchell’s article about how the Equifax data breach had added impetus to the data protection legislation on Washington Examiner : The congressional itch to “do something” on cybersecurity is especially pronounced after the Equifax breach, but whether lawmakers will go large, small or not at all is decidedly unclear. Read his full article here.

Should the US Adopt a Data Breach Safety Net?

Read Ryan Black’s article whether the United States should adopt a data breach safety net on Healthcare Analytics News : In 2015, the largest health insurance provider in the United States suffered a data breach that compromised the personal information of 79 million people. The class action lawsuit against Anthem resulted in a $115 million settlement. […]

Legislative Efforts in the Wake of Maritime Cyberattacks

Read Michael Bahar and Brittany Cambre article about how United States government is acting on the rising maritime cyber attacks on Maritime Executive : In June the maritime industry experienced what many consider a particularly insidious form of cyber attack known as GPS Spoofing, where global positioning system data is subtly manipulated to the point […]