A selection of this week’s more interesting vulnerability disclosures and cyber security news. Another week of quite astounding news, and I will lead with a really interesting story from a side where many of us don’t get to tread (perhaps thankfully), though his closing question is very disconcerting…
When election interference is discussed, you probably think of “fake news” social media plots or hacked voting machines that manipulated outcomes. The truth is much more complicated. Election interference can come in many forms and have consequences that last long after an election cycle. Fortunately there are security measures elected officials, campaigns, and anyone with access to voter information can – and should – take to defend against election interference.
Formula 1 is a serious business. It takes years of expertise and practical foot work to design, build and operate a winning Formula 1 team. It's easy to think that success depends on the car and the technology. But in reality, a cutting edge engine in the best car in the world can’t win a race alone. Without an expert driver and a highly experienced and dedicated support team, you just can’t finish first.
The definition of “operational risk” is variable but it generally covers the risk of loss resulting from inadequate or failed internal processes, people and systems or from external events. I, however, want to re-examine this general definition, so that the definition of operational risk takes into account all the cybersecurity-related risks that are currently plaguing organizations today. With the current definition, one cannot quantify internal processes and people.
Today, I’m excited to announce that AlienVault® Open Threat Exchange® (OTX™) has grown to 100,000 global participants, representing 36% percent year-over-year growth. AlienVault OTX, launched in 2012, is the world’s first free threat intelligence community that enables real-time collaboration between security researchers and IT security practitioners from around the world.
In the world of globalization, technology is being capitalized in every walk of life. People are transforming their routine works into machine-based automated tasks. The same is happening in the case of cybersecurity. SOAR solution, as one of the most effective cybersecurity solutions, provides security orchestration, automation, and response that help security analysts to manage and respond to numerous alarms at rapid speed.