Cybergovernance Journal Update – 8/5/16

by | Aug 5, 2016

With signs of a “cyber jihad” coming because of a mature hacking marketplace, organizations need to do more than rely on automated malware detection systems to protect themselves. They need to engage in comprehensive cybersecurity planning.

Cyber Risk: Nowhere to Run, No Place to Hide

Cybergovernance Journal, August 1
The psychological need to be perceived as competent and avoid embarrassment is universal, but when it blocks achievement of higher cyber resilience, it can’t be allowed to drive organizational behavior…

Read Article

INFOGRAPHIC: Cybersecurity Planning is Finally Demystified

Entrepreneur, July 24
DHR International has put together an infographic that outlines four easy tactics you can implement to improve your company’s information security, three critical steps to take after a data breach and examples of major companies that suffered at the hands of Internet hackers…

Read Article

Should There Be an International Cyber Treaty?

Just Security, August 3
Stepping out of the laws of war rhetoric, the most ambitious and probably the most productive approach to cyber threats would be to push toward the framing of a cyber-specific treaty to help protect democratic political processes and domestic self-government at home and abroad…

Read Article

Think Tank: The “Cyber Jihad” is Coming

CNBC, June 15
Dark web marketplaces and forums make malware and tech expertise widely available and — with plenty of hackers for hire and malware for sale — technical skills are no longer required. A large-scale attack could be just around the corner…

Read Article

Academics Build Early-Warning Ransomware Detection System

Threat Post, July 14
In a test against nearly 500 real-world ransomware samples from 14 distinct families, CryptoDrop detected 100 percent of attacks with relatively little file loss (a median loss of 10 files).

Read Article

Final OMB A-130 Revisions Focus on Cybersecurity, Privacy

Federal Times, July 27
The document was last updated in 2000, which itself came 15 years after the policy was established in 1985. (There were revisions to the policy within that first 15-year window.) OMB published a draft revision in October 2015 and has spent the last year going through comments and polishing the final version…

Read Article

Subscribe
Be notified of new Journal entries in your email box or Follow us on Twitter.

Loading