Cybersecurity Agenda – Breaking Down Stereotypes

December 13, 2018
Cybersecurity News

Take a glance at the most discussed cybersecurity topics of the week.

12- and 13-year-old girls got involved in code-tracking and problem-solving in order to investigate the features of the computer science. Place your finger and send hackers info. Is biometrics a solution?

Polka-dot dress, nice bows for braids and … coding in progress!?

Sky news on December 9, 2018

If you came to the recent contest ran by the National Cyber Security Centre (NCSC), you would be definitely surprised. 12- and 13-year-old girls got involved in code-tracking and problem-solving in order to investigate the features of the computer science and opportunities this subject provides for their future.

As for the Piggot School in Berkshire, the concept of competition worked perfectly. Four girls made up the winning team for 2018, beating 4,500 other students from across the UK, and it has inspired younger pupils to follow in their footsteps.

By the way, only 11% of the global workforce are women, although their analytical capabilities and stress resistance may become a real force in a cybersecurity landscape.

Place your finger and send hackers info. Is biometrics a solution?

Threatpost on December 11, 2018

Talking about a false sense of security and cybersecurity trends to keep in mind, we mentioned biometrics as one of the controversial methods of authentication. Here is another interesting point of view.

Indeed, nowadays customers have moved to online shopping, opening their data to wide-scale breaches. It seemed like biometrics has become the surefire solution to the problem in terms of protecting clients’ information, uniting ‘what you have’, ‘what you know’, and ‘what you are’ in one approving human action. However, security challenges do still exist. For example, recently researchers have cracked voice authentication systems by recreating any voice using under ten minutes of sample audio.

Thus, when it comes to building a strong cybersecurity policy, companies should remember that there is no silver bullet and stick to a blended approach to reduce cybersecurity gap and fight hackers.

Work done, have fun – cybersecurity to-do list beyond holidays

Security Intelligence on December 6, 2018

Have you already decorated your Christmas Tree? Yep, we also can hardly think about work right before the festive season. But while you relax, hackers make a mess! Have a look at cybersecurity to-do list before going on holidays:

  1. Take a baseline measurement of your network traffic. Record the normal amounts of traffic over a period of days to discover any suspicious traffic peaks./li>
  2. Run a penetration test before it is too late. Moreover, manual testing should be performed in addition to automated scanning.
  3. Check your log files for anomalies.
  4. Balance your network and website traffic. Beware of distributed denial-of-service (DDoS) attacks, flooding your website or network with more traffic than it can handle.
  5. Plan and practice your incident response strategy. The more timely and coordinated an organization’s response to an incident, the faster it can mitigate its impact.

Contact us

NO SPAM.
WE RESPECT YOUR PRIVACY.
*Average response time is 6 hours
More on:
Admins (45) Audit (24) CIO (18) DDoS (7) Defense (71) Education organization (67) Incident response (21) K-12 (50) Pentesting (7) Risk management (26) Team (46) Technology (90) Threats (72)