Friday, December 15, 2017

How is 2018 coming?

These are the last days for this year 2017. In the fight against cybercrime we have had a fairly even year. As the attacks have evolved, we have activated the shields and perfected our strategies to deal with cybercriminals. Currently the balance is quite balanced and we can say that we end the year holding up with the head held high the pulse to which the dark side has challenged us. This week, at CIGTR we want to review all the news that will influence us at the beginning of the year.


Wednesday, December 13, 2017

The value of a patient

The relationship between the doctor and the patient has evolved along with the medicine. Over the years, the rights that the patient has as a person with autonomy in making decisions about their health have increased. Broadly speaking, this right has been increasing and the patient has been taking control over his situation as a patient, in addition to achieving greater respect for your rights of privacy and privacy. Currently, with the recent cyberattacks against the health sector, this privacy is in danger.


When 1,300 American physicians are surveyed and more than 4 out of 5 claim to have experienced some kind of cybersecurity attack, it can be said, with little margin for error, that there is a problem that must be solved with some urgency. According to a study conducted by Accenture and the American Medical Association (AMA), the problem does not lie in the "if", but in the "when" there will be a cyberattack.


Monday, December 11, 2017

Thinking about the fine

Stepping on the accelerator is the first reaction when a car trip is made and for some reason the time is stuck on the heels. In case of becoming aware of what is being done, the first thought that usually comes to mind is the cost of the fine or even the way to avoid it. The existence of sanctions penalizes a behavior that, not only dangerous, can also be deadly.

In the cybersecurity sector when we talk about fines, what comes to our head is the GDPR and its imminent arrival in companies, and with it the sanctions. When talking about regulations it is important to highlight the voice of the experience through the interview that NNT, provider of cybersecurity solutions, made to David Froud. With more than 18 years of experience in information security, including regulatory compliance, privacy and data protection, David Proud currently serves as Project Leader for several Fortune / FTSE clients, conducting hundreds of on-site assessments. world level. 


Thursday, December 7, 2017

Reality or utopia?

If we take into account the existing books and films, the smart city has always been considered a distant chimera. Although there are cases of dystopian cities, in which this "intelligence" of the city leads to a loss of liberties on the part of citizens, there are many other cases in which this intelligent city appears as an idealized reality, far from the current one, in which decentralized communication, the perfect administration of resources and the improvement of functionality is an unattainable fantasy. But, what if we are not that far from that utopia?


This progress in managing resources has already reached companies, and more are those that every day want to point to the trend of the implementation of an IoT strategy within their companies. When making this change, security is the main concern for companies, according to professionals in the IT sector. This data comes from a survey published this week by Vanson Bourne, commissioned by Wi-SUN Alliance, which interviewed 350 executives involved in the decision making of the IT department in the United States, United Kingdom, Sweden and Denmark who are already investing in less an IoT (Internet of Things) project. The purpose of the survey is to help understand the way in which this type of strategy is perceived in the market and help plan future operations. Wi-SUN is an international non-profit organization with the mission of promoting interoperable IoT communications based on open global standards in industrial IoT, with special concern for public services and smart cities.


Monday, December 4, 2017

Do we cooperate?

It's been 48 years since man put his foot on the moon, but for all those passionate about the galaxy and the space stations there is something that has not changed: the lack of collaboration between countries makes evolution slower than could be. Recently, a piece of news was published that will surprise many: Russia and the US will sign an agreement with the aim of building a space station on the Moon. This installation aims to be the port of departure for manned missions to Mars. Will cooperation have come to the space race?


In the cybersecurity landscape new approaches are emerging to deal with the diversification and complexity of the attacks. In an interview granted by Surendra Singh, Director of Forcepoint in India, at BW Businessworld we know his point of view on the security framework 'People Centric' or what is the same, the security framework focused on people. According to him: "People, processes and technology are the 3 main ingredients that shape the company, the factor of people has been left out of the list of main elements and this can compromise the organization." We are not clear about where the space race will end but what we do know is that in the framework of cybersecurity, cooperation begins to be necessary and the different actors within this plot are realizing this.


Friday, December 1, 2017

Denying evolution

In the US, a war is fought that is so old that it seldom goes out on the news. For more than a century there has been a struggle to erase science from the educational program. Mainly among the ultraconservatives of the southern states, everything that sounds or remembers Charles Darwin is heresy. Commonly they are called: enemies of evolution. As the evolutionary biologist Nick Matzke ironically puts it: "anti-evolutionism is still alive, kicking and ... evolving".

We do not know how the war between evolutionists and creationists will end, but what we know is evolving is the virtual currency. This week the cryptocurrencies have been the protagonists. Not everything has been good news but, of course, for anyone who is aware of the news of the sector, these days have had to notice the barrage of news about bitcoins, cryptocurrencies and mining. The virtual currency emerged in 2009, and its use has increased to the point where, at present, it is living its moment of glory.



Wednesday, November 29, 2017

A solid base

Anyone interested in architecture will know that for a structure to work, good foundations are essential. Studied for centuries, the construction of Venice is an unusual fact that shows that with a solid foundation you can build a city on the sea itself. The secret of the longevity of the wooden bases of Venice lies in the fact that they are submerged under water, out of reach of the microorganisms that cause the wear of the wood. In addition, the constant flow of salt water around and through the wood, petrifies it over time, turning it into a hardened structure, similar to stone.


As happens in architecture, companies also need a solid foundation on which to build their security strategy. And some of those responsible for laying the foundations are the developers. There are several measures that developers can take to accelerate the adoption of best security practices by their organizations, or that reveals a recent analysis conducted by the security provider Veracode. This study includes data from the scanning of 400,000 applications written in Java, Net, Android, iOS, PHP and several other programming languages and operating systems of organizations of all sizes.


Monday, November 27, 2017

The behavior as a shield

Since time immemorial, the human being has tried to understand himself and has asked many questions about human nature. Although it exists since antiquity, psychology as a science emerged in the nineteenth century, when a group of professionals adopted the scientific method to interpret human behavior.


There are many prisms from which one can face the constant problems and risks that attack the cybersecurity fronts. One of the currents that come stomping in the terrain of cybersecurity is based on the analysis of user behavior. Fromm all the voices that are currently struggling to carve out a niche in the sector, today it is worth noting the one of Jeff Paine who has offered an interview with SecurityBrief in which he talks about his point of view on cybersecurity to this day. Jeff Paine is the founder of ResponSight, an Australian-based cybersecurity firm that is focusing on fault detection and risk assessment.


Friday, November 24, 2017

Taking measures

At some point in the history of the human being arose the prevailing need to be able to express numerically everything that was around, and that was how the concept of number arose. Later, due to its development, a new need arose: to measure distances. At first, and having to take hold of what they were carrying, they began to use their own body. Steps, elbows, spans ... were some of the methods used to take measurements and express distances.


But when we talk about taking measures we don´t only talk about metrology, but we can also be referring to the act of taking some action to try to solve the problems. This is well known in the cybersecurity world. In a sector in constant evolution, what is valid today may not be tomorrow. The continuous transformation of threats makes it necessary to take measures and adapt them to each situation, which evolves almost daily. This week we have several cases of companies and organizations that have decided to take to deal with certain complications.


Wednesday, November 22, 2017

The new revolution

Many are the advantages of the machines: they increase the production, they grant a greater level of precision, the losses of raw materials are diminished ... but in spite of being able to enumerate many of them, not all were advantages when the machines arrived to stay and the revolution industrial began. For decades, workers enjoyed little of the benefits of this increase in productivity and it was not until after a time, when the benefits began to be distributed more widely.


Today, in the 21st century, we are not suffering an industrial revolution ... or are we? Artificial Intelligence has brought many benefits to the technological, industrial, sanitary or educational sector. And this trend is booming and proof of this are the results of the survey conducted by Deloitte to digital leaders in the United Kingdom of 561 different organizations. According to this study, 85% of senior executives plan to invest in Artificial Intelligence (AI) and Internet of Thing (IoT).


Monday, November 20, 2017

The way to success

Today they are familiar but between the middle of the 12th century and the beginning of the 13th century all of Europe began to be planted with these new educational institutions for the time. In Europe, during this time, many young Europeans began to go en masse to the incipient universities in search of a title that opened the way to success. As for the first university, despite giving priority to the University of Bologna, it is not known exactly which one was the first to be founded.


The search for professional success has not gone out of fashion and, today, we are still looking for the key to succeed in the workplace in a constantly changing landscape. In the cybersecurity sector, there is a complicated time, in which lack of talent leads to technical positions that are not covered. Among the different points of view on this topic today stands out the voice of Simon Wright, who has recently offered an interview in Infosecurity Magazine. Wright is director of operations at CareersinCybersecurity, a company that provides access to numerous sources for job seekers and recruiters. As far as talent is concerned, there is no better opinion than that of a talent collector.


Friday, November 17, 2017

When 'hack' was just a joke

The word “hacker” is based on our vocabulary, and even more so when you dedicate yourself to the world of cybersecurity. As many of our readers know, the word hacker is not negative because it doesn´t always refer to an inclusion in another's website, but can refer to some enthusiastic lover of programming. This term has its origin in the Artificial Intelligence laboratory of MIT. Here, the members of this organization created the tradition of playing innocent jokes among themselves, which they called "hacks". These same members were the first to call themselves hackers.


And although the origin of the word is poetic, the actions of these characters of cybersecurity are not always so endearing. Although the profession itself has both positive and negative meanings, the verb "hack" rarely refers to a good action. High towers have fallen this week due to the action of this verb and the activity of the less noble hackers of the network.


Wednesday, November 15, 2017

Doctor at your own home

During the twentieth century medicine has reached a remarkable development. While in the nineteenth century relief was more frequent than healing, twentieth-century medicine has experienced a great boost. Scientific and technical development is the main reason for the progress of medicine, and the figure of the doctor has progressed with it. The figure of the doctor has been transformed from a purely priestly facet to becoming a technical advisor for his patients, getting a relationship in which patient and doctor collaborate for a common purpose.


Currently, due to the accelerated digital transformation that is experienced in companies, the role of the CIO is evolving and taking more weight in the decision making of companies. For all those who do not know what charge we are referring to, the CIO is the Chief Information Officer, which, among other functions, has the responsibility of making the company aware of the need to control risks and invest in security. Gartner, a consulting and information technology research company, has conducted a survey of CIOs from Europe, the Middle East and Africa to learn about the current status of this position within companies.


Monday, November 13, 2017

Good bases

"I wake up every morning in a house that was built by slaves, and I see my daughters, two black girls, intelligent and beautiful, playing with their dogs in the gardens of the White House." This phrase, extracted from the emotional speech that Michelle Obama offered during the Democratic National Convention last year, gave rise to endless doubts about the origin of the White House. In fact, the few written records of the time do not allow to reach that conclusion with total certainty, but even if it is not entirely true, for a moment all citizens of the United States rethink the bases on which American pride is based.

Today, in the interview of the week, we meet Joe Stunz, who was Chief of Police for Casablanca in the National Security and Cybersecurity unit and now works in One World Identity, an independent search and strategy company. As happens with the origins of the White House, in almost any history the principles lay the foundations of the present and make things look from another perspective. Joe Stunz, thanks to his professional development, has a special ability to see the current situation of cybersecurity from a much broader point of view.


Friday, November 10, 2017

The importance of a good glosary

Have you ever wondered who names the storms and hurricanes? Although many don´t know, there is a technique used when naming atmospheric phenomena to help a quick identification in the warnings of caution to the population. Most of these hurricanes and typhoons have female names, this is because during World War II meteorologists popularized the practice of using women's names for storms since they preferred to choose names of their lovers, wives or mothers. Fortunately, beginning in 1978, the names of men began to be included in the lists.


In cybersecurity we don´t have atmospheric phenomena but we fight every day against attacks, viruses and malware. The nomenclature of these elements is vital for their recognition and the disparity of denominations can generate problems for both the infected user and the organizations and companies that work in this field. Doing a review of the news of the week we find several names that it is important to start remembering because ... they are taking on the odds.


Wednesday, November 8, 2017

Gasoline or batery?

When listening to the “hybrid” word, it is inevitable to bring up vehicles of last generation, of futuristic aspect and coming from a company aware of the environment. But nothing is further from reality, the one that is considered the first hybrid of history dates from 1896. It is Armstrong Phaeton built by the Armstrong Company for the Roger Mechanical Carriage Company. It consists of a hybrid system consisting of a 6.5-liter two-cylinder gasoline engine and a dynamo connected to a battery. It is a pity that, at the end of the 19th century, they didn´t appreciate the visionary thinking of this vehicle.


In recent years the term "hybrid" has reached the cybersecurity sector, although this time linked to the concept of the cloud. Just this week we received this international survey conducted by AlgoSec, a specialist in network policy management, with 450 security and network work professionals showing the challenges in terms of strategies based on the hybrid cloud and their fears about cybersecurity. Among the main fears on the part of the respondents are cyber attacks, security breaches and the way they deal with their visibility and security management processes. But, how do companies consider facing these fears?


Monday, November 6, 2017

The push of the investment

There has always been a certain reluctance to accept that the bases of development are shaken every so often to make way for new ones. Already at the end of the 19th century there was a certain consensus when it came to admitting that there was nothing important to discover in the scientific field. In fact, at a conference in 1900 Lord Kelvin came to say: "Physics can no longer discover anything new. The only thing that we need is to be able to make measurements with greater precision".


One of the first things that need to be changed to drive development is this kind of thinking. Currently, despite the fact that cybersecurity is becoming an issue of general importance, and to a greater or lesser degree, anyone has heard of cyber attacks and data leaks, companies continue to consider the "cyber" sector as an extra on time to invest. And we already know that, lack of investment leads to a lack of innovation and development. Today we meet Nazo Mossa, director of VT Partners, a capital growth fund that supports the rapid development of technology companies, which believes that cybersecurity in Europe needs a boost in terms of investment.


Friday, November 3, 2017

The value of your information

If we think in the First World War we know that in a bakery there could be more than bread and that a baker could be perfectly a spy. In fact, the story says that a baker in Moscow was used by German espionage to communicate with each other, with only his gaze and the count of the loaves of bread. It was a simple and peculiar technique that achieved its goal: to go unnoticed by the Allied side.


As in the First World War, we are currently in the midst of another type of war in which information is the most precious asset. Criminals, fraudsters and thieves in the cybersecurity sector have seen this vein and new methods are emerging every day to make them achieve their goal. Doing a review of the news this week we realize that, today more than ever, the protection of your information should be at the same level as the security of your home or your car.


Monday, October 30, 2017

Collaboration as a tool

"In the long history of mankind, it is those who learn to collaborate and to improvise those who are most likely to prevail." As Charles Darwin well said, the ability to collaborate allows adaptation to change and increases agility to respond to obstacles. In business, collaboration has become a basic to understand and face an increasingly complex reality. Often the solution involves collaboration between public and private sectors, enriching an experience related to privatization and outsourcing of public services.


In the interview of the week we know the point of view of Luigi Rebuffi, leader of the public-private collaboration on cybersecurity with the United States government. The association was created a year ago and has already doubled its memberships. Anything that implies an increase in awareness about cybersecurity, it makes us so happy.


Friday, October 27, 2017

It never sleeps

Many coins have been used throughout history; among the most popular are gold, silver, wheat, tobacco, salt, cocoa and many others. But the currency, as we know it today, arose from the necessity of an element that was generally accepted in the processes of exchange. It was important that it be divisible, to allow small exchanges, and that would be easy to store and transfer.


Today we speak of a new currency: the crypto-currency, that great unknown. For some the crypto-currency arrived and, from one day to the next, everyone talks about it, its implantation in the companies and its importance for future transactions. Bitcoin, the best known of the crypto-coins, was born in 2009 and, although it seems very distant, its history is recent and from the moment of its creation has not stopped growing. During this week, the crypto-currencies have given much to speak and that although late, come stomping.


Wednesday, October 25, 2017

Limited trust

Distrust is the order of the day. Lack of trust in people, companies, products ... Beyond the definition of the dictionary, mistrust can be seen as a threat to happiness; after all, those who distrust anticipate something negative, ending in a constant state of alert.

As in the physical world, lack of trust is present in networks. In terms of any transaction a third party is always necessary to verify who we are and to have some control of the transactions carried out. Very briefly, for all those who walk a little lost, blockchain is a database of which all those who participate in the network keep a copy. This technology is based on consensus and confidence: if we all have the same information, that information is true.


Monday, October 23, 2017

A drop of honey

"You catch more flies with a drop of honey than with a barrel of vinegar." If Juan Bosco knew that this phrase was going to be applicable to any everyday situation after so many years he would not have believed it. In the end it´s still true that a smile is more effective than a slap and that with a little sweetness is achieved more than with a ruthless hardness.


Sometimes it´s better to think like the enemy to know how to attract him than to think about catching him. This premise easily adapts to any area, such as the cybersecurity industry. In the interview of the week we meet Matthew Wilson, co-founder of Penten, a cybersecurity project on innovation, mobile security and "cyber" technologies. This technology, also called "cyber deception", is an emerging category of cyber-defense that consists of detecting, analyzing and defending networks against the most advanced attacks in real time.


Friday, October 20, 2017

Be careful with the postman

In 1844, a tremendous uproar broke out when Giuseppe Mazzini, an Italian exiled in London, convinced himself that the British government read his correspondence. To prove his theory, Mazzini decided to send letters to himself, including in the envelope seeds, tufts of hair and grains of sand. On receiving his letters without trace of the aggregates, confirmed his suspicion. Mazzini launched a complaint that ended in the abolition of the power of the mail to open private correspondence.


To this day many basic rights stagger, this week the privacy received a great blow. The attack arrived earlier this week accompanied by chaos in the WIFI network. For those who haven´t yet realized, which will be few, the exploit that has achieved has been KRACK resulting in situations of decryption, replay packets, hijacking TCP connection, injection of HTTP content among others.


Wednesday, October 18, 2017

Establishing a new routine

"Can I get a coffee, please?" Although this phrase today is harmless, it has not always been so. The spread of the use of coffee gave rise to numerous controversies among different cultures. In 1511, an Islamist leader came to claim that the true believer couldn´t use it because the Koran didn´t speak of that drink, and called it vice. In the end, good sense triumphed, and coffee, for most mortals, has become one of the most established daily routines.


Although the cybersecurity sector has never been banned, it´s not being easy to be include between other routines and priorities of companies. Cybersecurity has gain strength and is installed now in companies as another basic pillar to take into account when planning a global strategy for the company. As this happens, the jobs that are need to cover have increased. A survey conducted by Jane Bond Project reveals data that reflects the unstable situation of cybersecurity in terms of employment.


Monday, October 16, 2017

Like water for flowers

Legend says that there was a boy who had always wanted to live in a house full of plants and flowers. He bought and bought until he had the house full of pots. It was beautiful; it looked like a tropical garden. But in a few days the leaves became dry and whitered, and every week the plants died. Worried, he went down to the flower shop and asked the clerk who asked, "How many times do you water them? And he replied, "Water? No one had told me to water them."

In cybersecurity world all businesses want a lush garden, with fertile trees and abundant flowers. But many forget that there´re basic needs that require broader strategies than had hitherto. In the interview of the week we talked about David Mahon, Executive Director of Strategy at CenturyLink.


Friday, October 13, 2017

In times of crisis

Experts say that in times of crisis new opportunities arise and that not everything is dark clouds. It appears some clear if one stops for a while to think. Many of the companies we know today have been born in times of recession. Divorces go down and reconciliations grow. The repair shops are full. The birth rate rises. The sales last all year round. There is always some way to peer out some gleam of light in the dark days.


But while half the world is trying to see the positive side of a crisis, the other half tries to profit from the misery of others. In situations of chaos there is always someone who knows how to capitalize. The world of cybersecurity is not in crisis but it´s true that it receives many attacks and every day come to light new terrible news about large companies that have not been able to protect themselves enough. During this week, several have been the cases that have benefited from this time of instabilities.


Wednesday, October 11, 2017

Heart trouble

Imagine the scene: you feel chest pain and one day, going to work, you fall collapsed in the middle of the sidewalk. There is no doubt, it´s a heart attack. After the incident, and after listening carefully to the recommendations of your doctor, you decide to incorporate sugary drinks into your diet, start smoking and go to the amusement park on your day off. Because the risk is there but, why are we going to pay attention to the recommendations? It may seem crazy but, to this day, this is what happens with many companies and cybersecurity.


Today is the one-year anniversary of the most famous DNS attacks. Just a year ago the Dynamic DNS server received a massive attack that left large platforms like Netflix, Airbnb, Amazon, CNN, New York Times, Twitter and several more inaccessible. This attack drew attention to what was already a reality: most companies had inadequate defenses in terms of DNS. Once this was done, hope was set for the change, but thanks to the study of the week, it´s disconcerting to see that, despite what the "cybersecurity doctors" recommended, the companies decided to continue taking risks.


Monday, October 9, 2017

Beyond criticisms

As Bill Gates said "We all need people to let us have feedback. That's how we can improve”. It's easy to say but criticism, while constructive, is not always as easy to hear as it sounds. However, the best way to grow and improve is to know how to fit the contributions of others. In the interview of the week we talked about David Shearer, CEO in (ISC) 2. For those who don´t know it (ISC) 2 is the world's leading institute dedicated to the education and certification of professionals in Information Security and Cybersecurity. Being a great institution is not surprising that they also face criticism, the difference is that they know how to manage it correctly.


In the networks they are still talking about the Annual Congress held by the (ISC) 2 from 25 to 27 September. The event has been a success but, not everything is great and it has faced numerous criticisms during the last few years. The main reproach lies in the repetition of themes, becoming for some a repetitive and redundant event. But Shearer doesn´t flatter himself and despite being clear about success, his voice doesn´t shake when he says he knows there are things to be improved: "We have to build better bridges between CTO and CIO communities, which are not considered as such in the cybersecurity sector. We have to get ahead of their vision by learning how things are done. We need to start taking part in your conferences". And today, the size of the audience is not as important as its diversity.


Friday, October 6, 2017

Stay afloat

April 10, 1912, Southampton. The harbor was full of people, no one wanted to miss the largest ship in the world. And no one knew the tragic end that was coming to "the unsinkable transatlantic." Yes, we´re talking about the Titanic. Even the most prepared boat can fail if security is not ready and a little prudence makes its appearance.

There are cases in which in spite of having sunk the ship still bubbles from the bottom of the sea. We have had a couple of months with a couple of cases that can´t disappear from our navigation map because there´s always something new that comes out afloat. We talk about Yahoo being on the news this week after its attack occurred in 2013, Equifax signing a multimillion dollar contract despite its leakage or the health sector that finally seems to be taken seriously. But when all these cases begin to be repetitive, it is better to remember that there´s nothing like seeing the next one stumble to not fall into the same stone.


Wednesday, October 4, 2017

The smart investment

Things get hot between US and Russia. We do not want to be the ones who stir up the flames, but there is a fable on the Internet that deserves to be read. "When NASA began launching astronauts, they immediately realized that pens would not work with zero gravity. To solve this problem, NASA hired a company that after a time and a large investment presented them with an innovative ballpoint pen writing with zero gravity. The Russians used a pencil." Let's be clear, this fable is not true, here you will find the real story, but it clearly illustrates the moral to learn: think before investing.


Something similar happens in the cybersecurity sector. Recent news about Equifax, Deloitte and Whole Foods, among others, have made it clear that cyberattacks pose a risk to the privacy of businesses and users, but these are not their only consequences. A new truth hits us in the face: cyberattacks have a global financial impact. During this year the average global cost of the attacks increased to almost 10 million euros per organization, an increase of 23% compared to 2016 and almost 70% over the previous 5 years. The attacks are real and companies are starting to increase their spending on security, but are the investments the correct ones?


Monday, October 2, 2017

Enemies of innovation

"No intelligent idea can gain general acceptance unless some stupidity is mixed in with it.” This phrase came from the mouth of Fernando Pessoa and although the Portuguese writer died in 1935, it could have been said yesterday. It´s in force, and will continue to be in force for much longer, as it points to a problem that emerge in human societies since they began to exist: the opposition to new technologies that can change the world. But, and when this opposition seems justified?


The technology changes at a dizzying pace and the growing acquisition of online devices is unstoppable. These, among other reasons, make it difficult to keep up in terms of security. This week it´s necessary to quote not just one interview, but two, both done by ZDNet. The first was made to Matthew Moynahan, CEO of computer security firm Forcepoint. The second one to Ed McLaughlin, president of operations and technology of Mastercard. Both agree on their current perception of the cybersecurity sector and also point in the same direction when looking for a solution.


Friday, September 29, 2017

In the heat of the battle

The attacks don´t cease and the clash seems imminent. Dialogue is the only way to save the situation and avoid the destruction of two peoples. The official emissary carries all the weight on his shoulders. Negotiation depends on him, but not only that. He has to make the effort so that we can take advance of the situation; after all, knowledge is power.


Today, this popular saying is still valid, and it´s more real than ever. In cybersecurity sector, strikes come from every side. Information and anticipation is the most powerful weapon for building barriers and fighting. Reviewing the best of the week, we have selected the advice and conclusions of the studies, surveys and experts to be able to strengthen our defenses and prepare a good attack.


Wednesday, September 27, 2017

New problems, new solutions

A white sand beach and turquoise waters are what many would call the perfect paradise. Right now the northern hemisphere enters the fall and the south has not yet left the winter, so an image like this, except in tropical areas, sounds celestial music. Internet, with its infinite possibilities of leisure, information, consumption and exchange of data could seem like that perfect paradise in digital, but be careful, because in all paradise there may be, and indeed there are, undesirable companies.


There are sharks that would make it out of the water to any cautious who has had the luck ... of having seen them in time. Sharks also appear on the digital terrain: the recent "cyberagressions" to Equifax and SEC have not yet disappeared from the memory of involved and experts. Thios famous attacks have increased the worry and put on guard to own and strangers. Thus, the results of the latest survey by TripWire about the lack of cybersecurity skills that exist in companies are not surprising.


Monday, September 25, 2017

The voice of experience

"The trend is turning and we are heading towards better days." When these words come out of the mouth of someone like Mårten, the light shines through the clouds. Mårten Mickos, CEO of HackerOne, is the current CEO of HackerOne, a security vulnerability coordination and bug bounty platform.

The career history of Mårten has made him go through different stages. He has worked from the production of software, encryption of information, through the globalization of the Internet. He has ample baggage that makes his words increase his weight. On the real situation is clear: "The state of security in online applications and products is miserable." Instead of being a pessimistic scenario is a fact that impulses him to carry on in the business.


Friday, September 22, 2017

Biting the hand that feeds you

Many are the scenes that we remember when we talk about technology vs. human: When Ava kills Nathan, his creator in Exmachina; or when Will Smith is pursued by dozens of robots in I, Robot ... All these movies are the perfect example of the importance is in the end use and not in the motive of creation. 

In the real world something similar is happening. We thought technology would increase our quality of life. And so it is. The problem comes when the villain from the movie shows up. His policy of terror shakes the world of trust in which we live. Today criminals and hackers take advantage of all these advanced technologies for their own benefit. They extract data, steal information and then bribe. Let's take a walk through all the news which have taught us the other side of the technological breakthroughs this week.


Wednesday, September 20, 2017

Victim or executioner?

We can say that witchcraft is as old as the existence of man, and it is from the fourteenth and fifteenth century, when the "Holy Catholic Church" through the Inquisition, was devoted to the massive burning of women, accusing them of witches. The vast majority of these women only committed the sin of being emancipated women, who lived from the elaboration of home remedies. For many years, "witches" were the only ones who were in charge of the health in the small settlements, besides being the midwife who helped her children to come to the world. So, now with all this knowledge through the centuries, could we say that the witches were victims or executioners?

The cybersecurity problems faced by businesses are not unknown to most. Cybersecurity occupying headlines has become a daily reality. Even large companies receive attacks that they do not know how to manage, leaving exposed valuable information. Perhaps it is time to look at it from another point of view and stop giving companies the role of victims. In fact, perhaps they themselves are not able to manage all the talent they already have inside their walls.


Monday, September 18, 2017

Selling umbrellas in a rainstorm


"You care for nothing but shooting, dogs, and rat-catching, and you will be a disgrace to yourself and all your family" This is what his father told Charles Darwin when he left the medicine. And that is how his biography says: "Each and every one of my teachers considered me an ordinary boy, rather below the average intellectual." Today is considered the father of evolution.


Self-confidence is a key to success. Or at least that's what many say. In the interview of this week we know Kris Hagerman, executive director of cybersecurity provider FTSE 250 Sophos. Kris is not short of self-confidence in addition to knowledge of the sector to find a niche that many of the biggest names of the market had not yet discovered.



Friday, September 15, 2017

When the clouds prevent you from seeing the sun

At the end of the 80's a TV serie was broadcasted that despite not belonging to that generation is familiar to many of our Spanish-speaking readers. From that series comes an expression up: "Living in the worlds of Yupi," which has come to us today as a popular culture phrase. Its meaning is similar to "being in the clouds." This saying refers to someone who lives away from reality in a fantasy world in which everything is positive and problems have no place.



As the population has easier access to technological devices, the complexity of the attacks grows, and new forms of aggression emerge every day. All of us (or almost all) have access to devices or programs which we are barely conscious of being assaulted daily. In "The best of the Week" we want to make a kind of information scanning of all those attacks that occur around while we live in "the worlds of Yupi".


Wednesday, September 13, 2017

Adapt or perish



We have to be grateful. A great discovery, named by many as the best and most important invention in history. Are you still lost? We are talking about the wheel. At the time it was a great advance for trade and today is a fundamental element for the mobilization of weight. But it also results in several challenges that, after being solved, improved the quality of life of millions of people. This is applicable to any innovation. Any change, even if it includes an improvement, presents a number of challenges.



This is the case of Information Technologies (IT). Its evolution and progress is undeniable. In addition to increasing productivity enables the growth of the company. But it must also be borne in mind that this advancement in IT modernization adds to the challenges and challenges for security. Market Connections has conducted an anonymous survey of 200 IT executives that reveals the general feeling in the sector regarding the evolution of IT and what they think can be their weapons to adapt to the new reality.


Monday, September 11, 2017

The external victim

We have the same doubt every summer. We are never 100% sure about needing to hire an alarm for our home. "Well ... nothing ever happens to us, why does it have to be this year?" The feeling that thieves will prefer the house of others and that this is a reality that will never occur to us is a thought that accompanies more than one. But what happens when your house is chosen?




With the resounding filtration that HBO starred in mid-August, users experienced what it is like to take part in how cybersecurity can affect our day. Thanks to the interview of this week we discover a little more of the ins and outs of cybersecurity in entertainment companies. This time it's time for Stephen Gates, Chief Intelligence Research Analyst at Zenedge, a leading cybersecurity company in the industry.



Friday, September 8, 2017

In the middle of the pandemic

The Best of the week in Cybersecurity

Imagine waking up, staying under the sheets recreating the great dream of the night before. Everything seems calm until you turn the TV on "A virus has spread". A virus attacks without distinction, the population feels helpless and panic takes over the streets. The search for the cure is the highest priority and has to be as soon as possible.



This will have happened to many readers after the return from holidays. Coming back to the routine returns us to the everyday reality where not everything has changed so much. We must be aware that danger is still out there and that cyber-attacks are still part of everyday life. Today, in our review of the best of the week, we keep you up to date with the viruses that represent a problem.


Wednesday, September 6, 2017

The danger of trusting

It´s easy bring back to memory a few robbery films in which thieves blow up the door, take the money and get away skidding triumphantly leaving behind an authentic chaos. But looking back, formerly identification and the obligation to do everything face-to-face implied a certain sense of security. It could be said that with the introduction of online banking is an aspect that in some cases has been lost. Currently with a single click and fingerprint the ease of oppening bank accounts is undeniable and transacting comfortably from home is a daily reality. 


Last year, a survey by the Bank of America revealed that 62% of Americans use digital services as mobile applications and online portals to conduct their banking operations.



Monday, September 4, 2017

The weight of responsability

Not everyone is good at being a leader. History gave us perfect examples over the years, as it can be Spanish empire, going from “The empire on which the sun never sets” to just a part of the Iberian Peninsula with a handful of islands. Everything starts with the Habsburg´s Reign, whose decisions made fall down everything theirs ancestors build up…

Because of the bad decisions empires and companies have crashed, friendships have been broken and more. That´s why the responsibility positions have to be held for people able to decide and, in case of mistake, assume the consequences. Today, in the interview of the week we bring you Mohan Gandhi declarations, CEO at Entersoft Security, who is clear about the weight of his decisions. 


Friday, September 1, 2017

Take care about germs


We call Mysophobia to the pathological fear some people feel about germs, dirt and pollution. It´s very easy to identify them because they use to develop a series of obsessive-compulsive disorders (OCD). We are talking about behaviors such as washing their hands in a compulsive way, not touching objects without wearing gloves... Those who suffer this phobia use to live terrified, fearing germs and thinking they are going to put and end to their health, and in many cases they en isolating themselves from society. 


We confess it, we a a little bit digital mysophobous. We don´t isolate ourselves (what would we do without our beloved Internet?), but we have developed a total repulsion for all kind of digital bugs and germs which want our data. Today, in our best of the week review, we are going to show you some of these new malware that  so many rejection provoke in us. 


Wednesday, August 30, 2017

The postman always rings more than twice


10 AM, you are enjoying a well deserved holiday and having a pleasant sleep when suddenly the door bell rings. You wake up upset, worried about about who is calling that time. When you pick up the entryphone and a creaking voice says "trading postman, can you open me, please?". Obfuscated, you hang up the entryphone and go back to bed. When you are ready to to to sleep, the bell rings again and you say to yourself: "It can´t be him". But it is him, and probably he will not leave until you or one of your neighbours open the door. 
At least, he is just somebody doing his work (no matter how annoying it is). Nevertheless, one of the most annoying things in daily live is junk mail, physically or digital.        


Monday, August 28, 2017

The new forms of terror

Last week, we compiled a series of qualitative interviews that addressed the issue of cyberterrorism, its consequences and the problems it can cause actually. Day by day comes full every kind of psychological terror episodes using the online platforms, and about a society increasingly mobilized. FOr example, a direc menace in video format use to come accompanied by a stong response in social networks facing some statements, referring ironically to the issued communication. A way to make clear that Islamic State threats, or those from any other terror franchise, not always achieve their goal: intimidating the population.  
  

Responding to known threats or not responding is a debate too big for this Center, but we must be aware of this danger. At the risk of appearing repetitive with regard to last week, today it´s necessary to last Friday interview 'International Policy Digest' with Daniel Wagner, author of the book "Virtual Terror" and cofunder of  Country Risk Solutions. 


Friday, August 25, 2017

The Grinch of cybersecurity

The figure of the Grinch was created by Theodor Seuss Geisel (better known as Dr. Seuss) to represent the negative aspects of Christmas, it means, the business sense of this tradition and not the love and peace message that Christmas should instill in society. Hence, The figure of the Grinch has been pushed right into being a green and hairy character that hates Christmas and  wants to put an end to the happiness of those who enjoys this tradition, stealing the gifts handed the 25th of December.  

In the cybersecurity world, unfortunately, there are no one, but many Grinchs prepared to steal our data and put an end to our happiness, being Christmas or summer, spring or Autumn. 


Wednesday, August 23, 2017

Critical condition

The report of the week

The TV fiction known as Urgency was a milestone in the 90´s. The fiction created  by Michael Criton not only was known for making George Clooney famous, but over the years it was the reference for a typology of TV Shows That still stands to this day: House, Grey´s Anatomy, Central Hospital... A recurrent scene in these medical histories is when the a wounded arrives through the emergencies corridor and the duty doctor undergoes a medical check of the victim elaborating an assessment and  predicting what the patient´s destiny would be. 


Just this week the government of UK made a "report about the health of cybersecurity". After checking the results, it seems that the executives should follow better the cybernetic doctors recommendations because we are in a critical condition.  


Monday, August 21, 2017

Two sides of the same bitter coin

The interview of the week


Last week, the low cost terror factory of the so called Islamic State (ISIS) hit the second most important city of Spain, the country that the CIGTR stands out from.  We have talked about cyberterrorism many times in this page and in fact we have two tags (this and this one) to collect the most important news about the topic. Cyberterrrism and cyber activities with terrorist purposes are two sides of the same bitter coin: a permanent menace with an increasingly path, mo matter how far it seems to be from the coward action a few days ago in Barcelona. 



Although there is no week without news on this subject, and occasionally its high value material.  And our center is doing its bit to spread the words of the the most authoritative voices in all cybersecurity matters, today we want to have a look to a research published in the Black Pool Gazzete the last days of June, with numerous experts such as Tim Owen, director at the Cybercrime Investigation Unit  of the Lancashire Central Univeristy, or Awais Rashid, co-director of the Lancaster Security Institute of the homonyms university.


Friday, August 18, 2017

Summer Diseases

The Best of the week in Cybersecurity

When we think about diseases, we think in virus, cold, constipations... Its one of the reasons why we like summer so much, we don´t have to be so  attentive to our health, or we should? Summer hot can play a dirty trick on us too: heat strokes, dehydration, sunburns, summer constipations... And in addition, bugs are like at home and get out of their hidings to take an ultraviolet rays bath. We are no longer only talking of the typical irritating flies, but about "bugs" like jellyfishes that can be  upsetting for us. 

Other bugs able to make our holidays bitter are our dear bugs which wander around the net 365 days a year. Today, in our review of the best of the week about cybersecurity, we will introduce you to some of these pleasant little bugs that have appeared, among other menaces and some good news.