Wednesday, October 18, 2017

Establishing a new routine

"Can I get a coffee, please?" Although this phrase today is harmless, it has not always been so. The spread of the use of coffee gave rise to numerous controversies among different cultures. In 1511, an Islamist leader came to claim that the true believer couldn´t use it because the Koran didn´t speak of that drink, and called it vice. In the end, good sense triumphed, and coffee, for most mortals, has become one of the most established daily routines.

Although the cybersecurity sector has never been banned, it´s not being easy to be include between other routines and priorities of companies. Cybersecurity has gain strength and is installed now in companies as another basic pillar to take into account when planning a global strategy for the company. As this happens, the jobs that are need to cover have increased. A survey conducted by Jane Bond Project reveals data that reflects the unstable situation of cybersecurity in terms of employment.

Monday, October 16, 2017

Like water for flowers

Legend says that there was a boy who had always wanted to live in a house full of plants and flowers. He bought and bought until he had the house full of pots. It was beautiful; it looked like a tropical garden. But in a few days the leaves became dry and whitered, and every week the plants died. Worried, he went down to the flower shop and asked the clerk who asked, "How many times do you water them? And he replied, "Water? No one had told me to water them."

In cybersecurity world all businesses want a lush garden, with fertile trees and abundant flowers. But many forget that there´re basic needs that require broader strategies than had hitherto. In the interview of the week we talked about David Mahon, Executive Director of Strategy at CenturyLink.

Friday, October 13, 2017

In times of crisis

Experts say that in times of crisis new opportunities arise and that not everything is dark clouds. It appears some clear if one stops for a while to think. Many of the companies we know today have been born in times of recession. Divorces go down and reconciliations grow. The repair shops are full. The birth rate rises. The sales last all year round. There is always some way to peer out some gleam of light in the dark days.

But while half the world is trying to see the positive side of a crisis, the other half tries to profit from the misery of others. In situations of chaos there is always someone who knows how to capitalize. The world of cybersecurity is not in crisis but it´s true that it receives many attacks and every day come to light new terrible news about large companies that have not been able to protect themselves enough. During this week, several have been the cases that have benefited from this time of instabilities.

Wednesday, October 11, 2017

Heart trouble

Imagine the scene: you feel chest pain and one day, going to work, you fall collapsed in the middle of the sidewalk. There is no doubt, it´s a heart attack. After the incident, and after listening carefully to the recommendations of your doctor, you decide to incorporate sugary drinks into your diet, start smoking and go to the amusement park on your day off. Because the risk is there but, why are we going to pay attention to the recommendations? It may seem crazy but, to this day, this is what happens with many companies and cybersecurity.

Today is the one-year anniversary of the most famous DNS attacks. Just a year ago the Dynamic DNS server received a massive attack that left large platforms like Netflix, Airbnb, Amazon, CNN, New York Times, Twitter and several more inaccessible. This attack drew attention to what was already a reality: most companies had inadequate defenses in terms of DNS. Once this was done, hope was set for the change, but thanks to the study of the week, it´s disconcerting to see that, despite what the "cybersecurity doctors" recommended, the companies decided to continue taking risks.

Monday, October 9, 2017

Beyond criticisms

As Bill Gates said "We all need people to let us have feedback. That's how we can improve”. It's easy to say but criticism, while constructive, is not always as easy to hear as it sounds. However, the best way to grow and improve is to know how to fit the contributions of others. In the interview of the week we talked about David Shearer, CEO in (ISC) 2. For those who don´t know it (ISC) 2 is the world's leading institute dedicated to the education and certification of professionals in Information Security and Cybersecurity. Being a great institution is not surprising that they also face criticism, the difference is that they know how to manage it correctly.

In the networks they are still talking about the Annual Congress held by the (ISC) 2 from 25 to 27 September. The event has been a success but, not everything is great and it has faced numerous criticisms during the last few years. The main reproach lies in the repetition of themes, becoming for some a repetitive and redundant event. But Shearer doesn´t flatter himself and despite being clear about success, his voice doesn´t shake when he says he knows there are things to be improved: "We have to build better bridges between CTO and CIO communities, which are not considered as such in the cybersecurity sector. We have to get ahead of their vision by learning how things are done. We need to start taking part in your conferences". And today, the size of the audience is not as important as its diversity.

Friday, October 6, 2017

Stay afloat

April 10, 1912, Southampton. The harbor was full of people, no one wanted to miss the largest ship in the world. And no one knew the tragic end that was coming to "the unsinkable transatlantic." Yes, we´re talking about the Titanic. Even the most prepared boat can fail if security is not ready and a little prudence makes its appearance.

There are cases in which in spite of having sunk the ship still bubbles from the bottom of the sea. We have had a couple of months with a couple of cases that can´t disappear from our navigation map because there´s always something new that comes out afloat. We talk about Yahoo being on the news this week after its attack occurred in 2013, Equifax signing a multimillion dollar contract despite its leakage or the health sector that finally seems to be taken seriously. But when all these cases begin to be repetitive, it is better to remember that there´s nothing like seeing the next one stumble to not fall into the same stone.

Wednesday, October 4, 2017

The smart investment

Things get hot between US and Russia. We do not want to be the ones who stir up the flames, but there is a fable on the Internet that deserves to be read. "When NASA began launching astronauts, they immediately realized that pens would not work with zero gravity. To solve this problem, NASA hired a company that after a time and a large investment presented them with an innovative ballpoint pen writing with zero gravity. The Russians used a pencil." Let's be clear, this fable is not true, here you will find the real story, but it clearly illustrates the moral to learn: think before investing.

Something similar happens in the cybersecurity sector. Recent news about Equifax, Deloitte and Whole Foods, among others, have made it clear that cyberattacks pose a risk to the privacy of businesses and users, but these are not their only consequences. A new truth hits us in the face: cyberattacks have a global financial impact. During this year the average global cost of the attacks increased to almost 10 million euros per organization, an increase of 23% compared to 2016 and almost 70% over the previous 5 years. The attacks are real and companies are starting to increase their spending on security, but are the investments the correct ones?

Monday, October 2, 2017

Enemies of innovation

"No intelligent idea can gain general acceptance unless some stupidity is mixed in with it.” This phrase came from the mouth of Fernando Pessoa and although the Portuguese writer died in 1935, it could have been said yesterday. It´s in force, and will continue to be in force for much longer, as it points to a problem that emerge in human societies since they began to exist: the opposition to new technologies that can change the world. But, and when this opposition seems justified?

The technology changes at a dizzying pace and the growing acquisition of online devices is unstoppable. These, among other reasons, make it difficult to keep up in terms of security. This week it´s necessary to quote not just one interview, but two, both done by ZDNet. The first was made to Matthew Moynahan, CEO of computer security firm Forcepoint. The second one to Ed McLaughlin, president of operations and technology of Mastercard. Both agree on their current perception of the cybersecurity sector and also point in the same direction when looking for a solution.

Friday, September 29, 2017

In the heat of the battle

The attacks don´t cease and the clash seems imminent. Dialogue is the only way to save the situation and avoid the destruction of two peoples. The official emissary carries all the weight on his shoulders. Negotiation depends on him, but not only that. He has to make the effort so that we can take advance of the situation; after all, knowledge is power.

Today, this popular saying is still valid, and it´s more real than ever. In cybersecurity sector, strikes come from every side. Information and anticipation is the most powerful weapon for building barriers and fighting. Reviewing the best of the week, we have selected the advice and conclusions of the studies, surveys and experts to be able to strengthen our defenses and prepare a good attack.

Wednesday, September 27, 2017

New problems, new solutions

A white sand beach and turquoise waters are what many would call the perfect paradise. Right now the northern hemisphere enters the fall and the south has not yet left the winter, so an image like this, except in tropical areas, sounds celestial music. Internet, with its infinite possibilities of leisure, information, consumption and exchange of data could seem like that perfect paradise in digital, but be careful, because in all paradise there may be, and indeed there are, undesirable companies.

There are sharks that would make it out of the water to any cautious who has had the luck ... of having seen them in time. Sharks also appear on the digital terrain: the recent "cyberagressions" to Equifax and SEC have not yet disappeared from the memory of involved and experts. Thios famous attacks have increased the worry and put on guard to own and strangers. Thus, the results of the latest survey by TripWire about the lack of cybersecurity skills that exist in companies are not surprising.

Monday, September 25, 2017

The voice of experience

"The trend is turning and we are heading towards better days." When these words come out of the mouth of someone like Mårten, the light shines through the clouds. Mårten Mickos, CEO of HackerOne, is the current CEO of HackerOne, a security vulnerability coordination and bug bounty platform.

The career history of Mårten has made him go through different stages. He has worked from the production of software, encryption of information, through the globalization of the Internet. He has ample baggage that makes his words increase his weight. On the real situation is clear: "The state of security in online applications and products is miserable." Instead of being a pessimistic scenario is a fact that impulses him to carry on in the business.

Friday, September 22, 2017

Biting the hand that feeds you

Many are the scenes that we remember when we talk about technology vs. human: When Ava kills Nathan, his creator in Exmachina; or when Will Smith is pursued by dozens of robots in I, Robot ... All these movies are the perfect example of the importance is in the end use and not in the motive of creation. 

In the real world something similar is happening. We thought technology would increase our quality of life. And so it is. The problem comes when the villain from the movie shows up. His policy of terror shakes the world of trust in which we live. Today criminals and hackers take advantage of all these advanced technologies for their own benefit. They extract data, steal information and then bribe. Let's take a walk through all the news which have taught us the other side of the technological breakthroughs this week.

Wednesday, September 20, 2017

Victim or executioner?

We can say that witchcraft is as old as the existence of man, and it is from the fourteenth and fifteenth century, when the "Holy Catholic Church" through the Inquisition, was devoted to the massive burning of women, accusing them of witches. The vast majority of these women only committed the sin of being emancipated women, who lived from the elaboration of home remedies. For many years, "witches" were the only ones who were in charge of the health in the small settlements, besides being the midwife who helped her children to come to the world. So, now with all this knowledge through the centuries, could we say that the witches were victims or executioners?

The cybersecurity problems faced by businesses are not unknown to most. Cybersecurity occupying headlines has become a daily reality. Even large companies receive attacks that they do not know how to manage, leaving exposed valuable information. Perhaps it is time to look at it from another point of view and stop giving companies the role of victims. In fact, perhaps they themselves are not able to manage all the talent they already have inside their walls.

Monday, September 18, 2017

Selling umbrellas in a rainstorm

"You care for nothing but shooting, dogs, and rat-catching, and you will be a disgrace to yourself and all your family" This is what his father told Charles Darwin when he left the medicine. And that is how his biography says: "Each and every one of my teachers considered me an ordinary boy, rather below the average intellectual." Today is considered the father of evolution.

Self-confidence is a key to success. Or at least that's what many say. In the interview of this week we know Kris Hagerman, executive director of cybersecurity provider FTSE 250 Sophos. Kris is not short of self-confidence in addition to knowledge of the sector to find a niche that many of the biggest names of the market had not yet discovered.

Friday, September 15, 2017

When the clouds prevent you from seeing the sun

At the end of the 80's a TV serie was broadcasted that despite not belonging to that generation is familiar to many of our Spanish-speaking readers. From that series comes an expression up: "Living in the worlds of Yupi," which has come to us today as a popular culture phrase. Its meaning is similar to "being in the clouds." This saying refers to someone who lives away from reality in a fantasy world in which everything is positive and problems have no place.

As the population has easier access to technological devices, the complexity of the attacks grows, and new forms of aggression emerge every day. All of us (or almost all) have access to devices or programs which we are barely conscious of being assaulted daily. In "The best of the Week" we want to make a kind of information scanning of all those attacks that occur around while we live in "the worlds of Yupi".

Wednesday, September 13, 2017

Adapt or perish

We have to be grateful. A great discovery, named by many as the best and most important invention in history. Are you still lost? We are talking about the wheel. At the time it was a great advance for trade and today is a fundamental element for the mobilization of weight. But it also results in several challenges that, after being solved, improved the quality of life of millions of people. This is applicable to any innovation. Any change, even if it includes an improvement, presents a number of challenges.

This is the case of Information Technologies (IT). Its evolution and progress is undeniable. In addition to increasing productivity enables the growth of the company. But it must also be borne in mind that this advancement in IT modernization adds to the challenges and challenges for security. Market Connections has conducted an anonymous survey of 200 IT executives that reveals the general feeling in the sector regarding the evolution of IT and what they think can be their weapons to adapt to the new reality.

Monday, September 11, 2017

The external victim

We have the same doubt every summer. We are never 100% sure about needing to hire an alarm for our home. "Well ... nothing ever happens to us, why does it have to be this year?" The feeling that thieves will prefer the house of others and that this is a reality that will never occur to us is a thought that accompanies more than one. But what happens when your house is chosen?

With the resounding filtration that HBO starred in mid-August, users experienced what it is like to take part in how cybersecurity can affect our day. Thanks to the interview of this week we discover a little more of the ins and outs of cybersecurity in entertainment companies. This time it's time for Stephen Gates, Chief Intelligence Research Analyst at Zenedge, a leading cybersecurity company in the industry.

Friday, September 8, 2017

In the middle of the pandemic

The Best of the week in Cybersecurity

Imagine waking up, staying under the sheets recreating the great dream of the night before. Everything seems calm until you turn the TV on "A virus has spread". A virus attacks without distinction, the population feels helpless and panic takes over the streets. The search for the cure is the highest priority and has to be as soon as possible.

This will have happened to many readers after the return from holidays. Coming back to the routine returns us to the everyday reality where not everything has changed so much. We must be aware that danger is still out there and that cyber-attacks are still part of everyday life. Today, in our review of the best of the week, we keep you up to date with the viruses that represent a problem.

Wednesday, September 6, 2017

The danger of trusting

It´s easy bring back to memory a few robbery films in which thieves blow up the door, take the money and get away skidding triumphantly leaving behind an authentic chaos. But looking back, formerly identification and the obligation to do everything face-to-face implied a certain sense of security. It could be said that with the introduction of online banking is an aspect that in some cases has been lost. Currently with a single click and fingerprint the ease of oppening bank accounts is undeniable and transacting comfortably from home is a daily reality. 

Last year, a survey by the Bank of America revealed that 62% of Americans use digital services as mobile applications and online portals to conduct their banking operations.

Monday, September 4, 2017

The weight of responsability

Not everyone is good at being a leader. History gave us perfect examples over the years, as it can be Spanish empire, going from “The empire on which the sun never sets” to just a part of the Iberian Peninsula with a handful of islands. Everything starts with the Habsburg´s Reign, whose decisions made fall down everything theirs ancestors build up…

Because of the bad decisions empires and companies have crashed, friendships have been broken and more. That´s why the responsibility positions have to be held for people able to decide and, in case of mistake, assume the consequences. Today, in the interview of the week we bring you Mohan Gandhi declarations, CEO at Entersoft Security, who is clear about the weight of his decisions. 

Friday, September 1, 2017

Take care about germs

We call Mysophobia to the pathological fear some people feel about germs, dirt and pollution. It´s very easy to identify them because they use to develop a series of obsessive-compulsive disorders (OCD). We are talking about behaviors such as washing their hands in a compulsive way, not touching objects without wearing gloves... Those who suffer this phobia use to live terrified, fearing germs and thinking they are going to put and end to their health, and in many cases they en isolating themselves from society. 

We confess it, we a a little bit digital mysophobous. We don´t isolate ourselves (what would we do without our beloved Internet?), but we have developed a total repulsion for all kind of digital bugs and germs which want our data. Today, in our best of the week review, we are going to show you some of these new malware that  so many rejection provoke in us. 

Wednesday, August 30, 2017

The postman always rings more than twice

10 AM, you are enjoying a well deserved holiday and having a pleasant sleep when suddenly the door bell rings. You wake up upset, worried about about who is calling that time. When you pick up the entryphone and a creaking voice says "trading postman, can you open me, please?". Obfuscated, you hang up the entryphone and go back to bed. When you are ready to to to sleep, the bell rings again and you say to yourself: "It can´t be him". But it is him, and probably he will not leave until you or one of your neighbours open the door. 
At least, he is just somebody doing his work (no matter how annoying it is). Nevertheless, one of the most annoying things in daily live is junk mail, physically or digital.        

Monday, August 28, 2017

The new forms of terror

Last week, we compiled a series of qualitative interviews that addressed the issue of cyberterrorism, its consequences and the problems it can cause actually. Day by day comes full every kind of psychological terror episodes using the online platforms, and about a society increasingly mobilized. FOr example, a direc menace in video format use to come accompanied by a stong response in social networks facing some statements, referring ironically to the issued communication. A way to make clear that Islamic State threats, or those from any other terror franchise, not always achieve their goal: intimidating the population.  

Responding to known threats or not responding is a debate too big for this Center, but we must be aware of this danger. At the risk of appearing repetitive with regard to last week, today it´s necessary to last Friday interview 'International Policy Digest' with Daniel Wagner, author of the book "Virtual Terror" and cofunder of  Country Risk Solutions. 

Friday, August 25, 2017

The Grinch of cybersecurity

The figure of the Grinch was created by Theodor Seuss Geisel (better known as Dr. Seuss) to represent the negative aspects of Christmas, it means, the business sense of this tradition and not the love and peace message that Christmas should instill in society. Hence, The figure of the Grinch has been pushed right into being a green and hairy character that hates Christmas and  wants to put an end to the happiness of those who enjoys this tradition, stealing the gifts handed the 25th of December.  

In the cybersecurity world, unfortunately, there are no one, but many Grinchs prepared to steal our data and put an end to our happiness, being Christmas or summer, spring or Autumn. 

Wednesday, August 23, 2017

Critical condition

The report of the week

The TV fiction known as Urgency was a milestone in the 90´s. The fiction created  by Michael Criton not only was known for making George Clooney famous, but over the years it was the reference for a typology of TV Shows That still stands to this day: House, Grey´s Anatomy, Central Hospital... A recurrent scene in these medical histories is when the a wounded arrives through the emergencies corridor and the duty doctor undergoes a medical check of the victim elaborating an assessment and  predicting what the patient´s destiny would be. 

Just this week the government of UK made a "report about the health of cybersecurity". After checking the results, it seems that the executives should follow better the cybernetic doctors recommendations because we are in a critical condition.  

Monday, August 21, 2017

Two sides of the same bitter coin

The interview of the week

Last week, the low cost terror factory of the so called Islamic State (ISIS) hit the second most important city of Spain, the country that the CIGTR stands out from.  We have talked about cyberterrorism many times in this page and in fact we have two tags (this and this one) to collect the most important news about the topic. Cyberterrrism and cyber activities with terrorist purposes are two sides of the same bitter coin: a permanent menace with an increasingly path, mo matter how far it seems to be from the coward action a few days ago in Barcelona. 

Although there is no week without news on this subject, and occasionally its high value material.  And our center is doing its bit to spread the words of the the most authoritative voices in all cybersecurity matters, today we want to have a look to a research published in the Black Pool Gazzete the last days of June, with numerous experts such as Tim Owen, director at the Cybercrime Investigation Unit  of the Lancashire Central Univeristy, or Awais Rashid, co-director of the Lancaster Security Institute of the homonyms university.

Friday, August 18, 2017

Summer Diseases

The Best of the week in Cybersecurity

When we think about diseases, we think in virus, cold, constipations... Its one of the reasons why we like summer so much, we don´t have to be so  attentive to our health, or we should? Summer hot can play a dirty trick on us too: heat strokes, dehydration, sunburns, summer constipations... And in addition, bugs are like at home and get out of their hidings to take an ultraviolet rays bath. We are no longer only talking of the typical irritating flies, but about "bugs" like jellyfishes that can be  upsetting for us. 

Other bugs able to make our holidays bitter are our dear bugs which wander around the net 365 days a year. Today, in our review of the best of the week about cybersecurity, we will introduce you to some of these pleasant little bugs that have appeared, among other menaces and some good news.  

Wednesday, August 16, 2017

Friend or foe?

We all have listened the phrase "Keep your friends close to you, but keep your foes even closer" at least once. While it is true that nobody know who we must give the credit for this quote (some say Sun Tzu, others Maquiavelo...), but what we really know is who made this quote famous in the popular culture. We are talking about Mr Michael Corleone, the main character on the mythic "The Godfather 2" movie. 
But what can we do when we can´t distinguish among friends or foes when we are talking about the Internet of Things (IoT)? Nobody can doubt that it has made us to improve many aspects of our live, but we can´t deny either that it is one of the main access doors for cybercriminals. 

Monday, August 14, 2017

It´s not a kid in the basement

Weekly interview

"We have to start seeing criminals as organizations that work as a business" The quote is taken from Michael Daniel, Barak Obama´s former cyber advisor in an interview published in the technological blog of the prestigious Massachusetts Institute of Technology (MIT). Dated the 31th of July, this Monday we liked to echoing his words instead of looking one year back as we use to do at the start of the week. After all, Daniel presides an organization with very ambitious goals: The Cyber Threats Alliance (CTA).

The interview took place during the Black Hat Conference in Las Vegas and the speech is about in the role played by governments collaborating with private companies and how to face the menaces, regardless of whether they come from private agents or are sponsored by a state. "It´s not a kid in a basement" doing blunders, Daniel advices. "They are organizations that act like business, and we have to start thinking about them in terms or how to interrupt their business models". An approach that is valid even for political and "diplomatic" operations.

Friday, August 11, 2017

The virus link

Rod of Asclepius2.svg
If we were to ask about the Rod of Asclepius and Cybersecurity, more than one would shrug and, in turn, would ask: "Rod of what, who, what about security?" But the so-called universal symbol of Medicine, also known as the Rod of Aesculapius, is increasingly related to this sector. Who knows. Maybe someday we will end up going to the doctor to get antimalware pills and eye drops for the ransomware that makes us see everything with little bars. Science fiction? Techie humor? Neither one nor the other.

In our review of the weekly most important stories, today we have to put in a prominent place the first successful exploit whose mission is to infect a device from a DNA sequence. Researchers say that is similar to connect a USB with "surprise" to a computer: the target computer tries to decipher the information contained in the genetic code and, while doing so, zas!, it is hijacked by malware hidden in DNA. Today is a simple experiment, tomorrow can serve to any purpose, even any ethical purpose, that we may think of. Who would say that the link between health and bits would end up making so much sense through the word "virus".

Wednesday, August 9, 2017

We have a date with equality and diversity

Study of the week

"Gender equality is more than a goal in itself. It is a precondition for meeting the challenge of reducing poverty, promoting sustainable development and creating good governance." The appointment of the Secretary-General of the United Nations, Kofi Annan, is related to one of the demands that are most often heard in the technology sector and related: the introduction of the gender perspective, not as a concession of the masculine role to feminine, but as a true equalization of functions.

In our review of the most important study of the week, we can not ignore today the survey conducted and published by the veteran of cybersecurity Caroline Wong, vice president of security strategy at Cobalt and whose curriculum accumulates laurels: Cigital, Symantec, eBay And Zynga. With the title Women in cybersecurity: a progressive movement, Wong has tried to cover two challenges: to make society aware that the presence of women in the sector is much more real than most of the people think, and also to draw attention to the contribution of women in the field of security.

Monday, August 7, 2017

The remake culture

The last trailer of IT movie was released last week. This remake is again an adaptation of the homonymous history created by Stephen King in the 80s. As with this remake, we find old videogames reeditions, old movies that become TV series... It´s hard to find an original idea related to audiovisual culture nowadays. The reason (or problem for some) is not that   there is no people with original ideas, but that taking something that worked in the past is gives us more security than something completely new. 

 Probably you are thinking that in a rapidly changing world as the the cybersecurity world is this logic has no sense, don´t you? We regret to say that you are wrong and we can prove it (paradoxically) by going back to the past. 

Friday, August 4, 2017

Rise of Machines

Since 19th century and  through the emergence of advanced machines human being lifes started to become easier. With the arrival of this equipment able to complete autonomous asks, the life turned easier than ever. Nevertheless, fear of the unknown led to the so called luddite. This was the begging of what Asimov called later "The Frankenstein legacy", referring to the fear that human deeds could turn against their creators. Something that seems to be deeply rooted in the collective unconscious. 

With the arrival of the information age this fear has grown for years, leading to the consideration of the creation of any kind of artificial intelligence as a menace. But, is this fear rational or irrational? Today we will check it in our weekly review...

Wednesday, August 2, 2017

Mud and Wood houses

The report of the week

We call tales those stories about humanized animals that have a moral and didactic background. One of the most populars is ‘The three little pigs’ tale, in which the three main charaters move to the forest and build their own homes: the first one builds a thatch home, the second one a wood home, and the last one a bricks home. Once the pigs are stablished, the Wolf goes on seek of eating them, bringing down  easily the thatch and the Wood houses. However, the tale’s villain can’t bring down the bricks’ house, ending up chafed while trying to break  through the roof and falling in a boiling cauldron.

That tale aims to show the kids that obeying and security are much more important than playing with their friends. But tales also have lots to teach to those ones who are not that Young, as the last Thycotic’s research shows.

Monday, July 31, 2017

Now you can see it… and now you can’t

A year ago, today ...

Magicians’ profession has existed since immemorable times. In its creation at the Medo Imperium (century 7 b.C) in the mesopotamian rivers it was related to religion.  Through the times, it ended up being related to wise people and scientists. Nowadays, however, magicians are related with illusion and magic shows. They amaze the audience with their ‘mystic art’ which are nothing but tricks in order to make people believe they are watching something which actually is not real.

Magician’s job is about hidding the truth, lying to the audience and surprise them when they are not aware. Today in our retrospective we are checking that the cybersecurity world is full of magicians who hide information and leave people speechless (and not always for good).

Friday, July 28, 2017

No pain, no gain

We are in summer. It is holidays and beach time, so you can go and swim in the sea. However, you get a bad feeling when you are in front of the sea with your flip-flops full of sand. It is time to take your t-shirt off and show your ‘curves’ to the people. At that moment you remember when you joined the gym in the beginning of the year to get on shape for the summer season. You couldn’t have started happiest, but after after second day, your friend called you for having some beers and you thought ‘that’s alright, I’ll get back to the gym tomorrow or the day after…’

No pain, no gain. This sentence comes true everyday in social networks’ world. As an instance, today we are talking about the best of the week in cybersecurity.

Wednesday, July 26, 2017

The courtyard´s weak link

The report of the week

One of the most recurrent characters in The Simpsons is Nelson Muntz. This school thug has been terrorizing Sprinfield´s Primary School students for more than 30 years, interfering with the swots, with the kids parents or with another not so"exemplary" students, like the incorrigible Bart Simpson. Although there are some chapters in which we have discovered the human side of this thug, his character have not changed  at all and he continues exploiting the school courtyard most weak students.  

In the cybersecurity world we have learned the lesson and we know that there is no one, but many Nelson Muntz hovering over Internet and any internaut could become a victim of their "bullying". But, who are the weakest links in the digital courtyard? 

Monday, July 24, 2017

The Red Dawn

A year ago, today ...

In the last years of the Cold War (1984) the Red Dawn movie was released in the USA. The film was directed by John Millius and featuring stars of the time such as Patrick Swayze or Charlie Sheen, and it was a propagandist delirium in a war film format that served the US citizens as a self-indulgent excuse. But it started with a never seen before premise: the Russian Army, together with the Cuban an Nicaragua armies were able to invade the freedom country, defeating its armed forces.

This maneuver was later dismantled by a group of  "heroic" and patriotic US kids. Nevertheless, this beginning was almost unthinkable, even more in the period we are talking about. Today we remember in our retrospective how one year ago Russians were able to beat the USA, althougt it was in the cybernetic world. 

Friday, July 21, 2017

The Lord of war.

In 2005 they released the film "The Lord of War", a movie starring by Nicholas Cage and directed by Andrew Niccol. In it they told us the story of Yuri Orlov, a dealer who was dedicated to selling illegal weapons to the highest bidder. . The most curious thing about this movie is that the story is based on the real character of Viktor Buot, alias the merchant of death. 

Unfortunately, on the web (more specifically Darkweb) we find many arms dealer. However, it is not only arms dealer, but also with malware as we gather today in our post dedicated to the "best" of the week about cybersecurity.

Wednesday, July 19, 2017

Butterfly Effect

The report of the week

The Chaos Theory is based on the premise that small variations can make great changes in the future,it's impossible to predict anything in long term only with linear logical sequence approaches. This scientific theory is known popularly thanks to the concept of the butterfly effect, whose explanation is better understood through an ancient Chinese proverb: "The beating of the wings of a butterfly can cause a
 hurricane in another part of the world." This means that a small event that you may consider
unimportant may turn around and become a catastrophe.

In the world of cybersecurity we know that any small  misstep or bad step can lead to more than one problem. That's why networks are full of butterfly effects, small "unimportant" events that can be fatal to business and users.

Monday, July 17, 2017

Obstacle Race

A year ago, today ...

The obstacle race is one of the athletic competitions that more concentration of the athlete needs. You don't only need to run to the maximum to reach your goals, you also have to get around fences and jump over them. About a metre (0.971m) for men and a bit less (0,762 m) for women. To be able to get it you have to measure well the time of jump, the stride and the distance, since a mistake can be fatal and you can hit your bones on the ground. Not to mention that you probably end up wet and last when crossing the finish line.

In the world of cybersecurity, we find ourselves in an endless obstacles race. Sometimes we are the ones who make the way tricky to cyber criminals, but other times they are the ones who are in charge of preventing us from accessing our data... Today in our throwback to the past we will see who throw a spanner to the other team.

Friday, July 14, 2017

Winning the battle

There is a typical scene in the movies that takes place when our spy (James Bond, Jason Bourne or Ethan Hawke) looks at his enemy, who is defeated on the ground, and he screams in full of rage: “You may had won the battle, but not the war!” This phrase has been pictured in everyone's mind. But, what this means? In the entertainment and fiction business means that this bad guy will escape and turn the world upside down again, until our favorite hero stops him one more time. In the real world ... well... ok. Vietnamese might not win many battles but it is clear that they won the war.

Today we remember this phrase because after taking a look at the best of the week in cybersecurity, we found mixed feelings, as we have seen that many battles have been won, but the war is still to be decided.

Wednesday, July 12, 2017

Lock the door

The report of the week

Vacations are already here and it is time to leave home to enjoy a well-deserved rest, away from the routine and work. BBut, if you are a regular reader of our blog (and if not, you should also know), this time of the year is the favourite one for criminals to take our personal stuff, weather cybernetic or not. So, if you have readed us, we know that you have made sure to leave everything closed and locked tight so that no one can take advantage of your days off. However, ¿What is use locked the door if the bolt is broken?

After knowing the data collected in the Tripwire report, we are sure that there are many users who are asking themselves about it. Some security solutions no longer build trust for users and that can be a very important problem. Especially if the data corroborate this mistrust.

Monday, July 10, 2017

The weight of fame

A year ago, today ...

Most of us have fantasized about  ​​being famous sometime. Whether it's a reputed actor, a rock star who spends all day on the road or a celebrity who travels from interview to interview on all TV sets. However, like everything good thing in this life, fame has a dark back and is the loss of privacy. Some people say that it is the price of fame, but the exposure levels to which public figures are exposed are over  the humanly acceptable in many cases.

Today in our step back to the past we will talk about that loss of privacy, the victims of cybercrime in Spain and about the biggest celebrities in the world of cybersecurity.

Friday, July 7, 2017

A matter of trust

The best of the week about Cybersecurity

Relationships are based on the trust we place in other person. No matter if it is Love, friendship or business. Trust is one of the key elements on which a good relationship is based. the trust is one of the most important pillar that make a good relationship. That is why, when this pillar is broken, it is very difficult for the injured person to trust the other one again. So, in the world of cybersecurity, security breaches not only pose a risk for data loss, but also because real stakeholders can no longer trust companies that have their data.

Today,in our review about the best of the week in cyber segurity ,we are going to talk about this question on trust and unfortunately, we will also talk about many security breaches. 

Wednesday, July 5, 2017

Gold fever

When we talked about the “gold fever”, we referred to the massive migration that was on U.S around the century XX and lasted almost a whole year. This migration was because the discovery of millions gold mines throughout the American territory.Mexico, California, The Appalachians, Nevada..This was motivated for the American dream for have a better life style and its enrichment. Unfortunately, between all the people that were on the mines, just some of them got to make fortune. 

Since then, a lot of the population have this gold fever which find business with which to make a fortune. Today in our study of the week we gonna check that we have found the last golden edge of the moment: infrastructure in the cloud.

Monday, July 3, 2017

The arrival of the holidays

A year ago, today ...

Beginning july and with this hottest month is coming one of the moments most waiting by all:
The holidays. The kids have finished the school and are going to a summer camps, the youngs take the advantage to enjoy and know new placers and the families take the advantage for have a time with their beloveds . All with the only objective to enjoy and forget our concerns. Nevertheless, that moment to disconnect with the real world can be a nightmare. The holidays periods are the seasons of the years prederred by criminals for go into our house and take our precious goods.

In the cybersecurity world happen the same, although many times looks like is summer 365 days at year. Today, in our view back in time we gonna see some summer steals and summer courses too very interesting.

Friday, June 30, 2017

Natural catastrophes

We all remember perfectly how years ago, thousands of theories about the end of the world emerged at the end of 2012. These assumptions were based on the fact that the baktun (the Mayan calendar) ended on this date. Evidently, all this fall by the wayside, but it helped many authors to develop stories about apocalypse and to “scare” some people with speeches about the final judgment. One of these stories was developed in the Roland Emmerich film "2012". Without assessing the film, it proposed a destruction of the world based on various natural catastrophes.

The melting of the poles, volcanic eruptions, earthquakes…  in the film occur catastrophe after catastrophe that devastated the population This week, the networks received another wave of cyber attacks that makes us wonder if we will also be facing the end of the digital world.

Friday, June 23, 2017

The paradigm of artificial intelligence

The treatment of artificial intelligence and its settling to the everyday world has always been a controversial subject. Before it became a reality, many authors dreamed with the problems and case studies that might be the subject that we are discussing today.

Moving away from literature and fantasy, Artificial Intelligence is already a reality and its execution in the everyday world is happening. For this reason, in the 18th edition of the Summer Courses of Rey Juan Carlos University we wanted to dedicate a speech to the legal and social aspects that these new techniques represent.

Thursday, June 22, 2017

The challenge of cyber security

When you read the news that are  related to cybersecurity, it is hard not to feel devastated in many cases. Security gaps, phishing, ransomware everywhere ... Danger stalks behind any corner and you never know for sure if you'll be ready to face it.However, although the future may seem hopeless, there are always actors who are on the good side.

In the 18th edition of the URJC Summer Courses we will have the special collaboration of a speaker who works indeed for this last side. An analyst of one of the best world's leading computer companies.