Wednesday, February 28, 2018

Trust no one

We don’t know if this is a real story, but Trojan horse is one of the best known literary fantasies of all time.  We all have heard about that tale in which hundreds of warriors hide inside a big horse made of wood in order to penetrate the Trojan walls. 

There’s a malicious force that hides behind the cybersecurity of a million of companies and it’s called Business Email Compromise (BEC). Like the Trojan horse, the BEC uses your trust as its biggest weapon and introduces itself into your devices without asking. Agari says that a very few companies are free of this threat. 96% of organizations has been the target of BEC attacks between June and December of 2017. On average, organizations were BEC attacked 45 times along that amount of time. 

Monday, February 26, 2018

Nature and its wisdom

Nature is wise and trees are a clear example of this. Although the roots are the least visible part, they are the anchor that keeps the tree upright and allows it to grow. The diversification of these roots allows adhering to the earth with more force. As in nature, in many cases, companies need to diversify to gain strength and continue to grow.

Today, thanks to Nikkei's interview to Vicent Chong, president of Singapore Technologies Engineering, we know the trajectory and future steps of a company that is a clear example of the power of diversification. In addition to specializing in the robotics and cybersecurity industry, it is beginning to focus on defense, going from focusing on domestic issues to becoming an important international player in the engineering sector.

Friday, February 23, 2018

Deceive yourself

There is nothing worse than deceiving yourself, but in our sector, it seems to be something that happens too often. In CIGTR we celebrate every news in which cybersecurity is taken seriously and is posed as a real problem since this doesn´t happen as often as it should. There are many occasions in which news that brings to light data that is a reality check for anyone who doesn´t want to accept the importance of cybersecurity. Today we do a review to open the eyes of those who don´t want to see it. By the way, you're welcome.

Wednesday, February 21, 2018

The fittest

Survival of the fittest is presented as an alternative to natural selection and comes from the same evolution theory that Charles Darwin exposed. Basically, this idea shows how some individuals have features that are better at adapting to the environment, making them able to reproduce and forming the next generation. The ones that don’t have those features will be more likely to die and their features will disappear.

This also happens in the cybersecurity world, where we always drive in the fast lane and adapting to changes is linked to a company strategy readjustment. The one that can’t adapt, as it happens in Darwin’s theory, will disappear. The public CIOs are also attached to these rules and they already have their 2018 objectives planned. This week we want to put the focus on the results we got from the Gartner’s 2018 CIO Agenda Survey. This study gathered data from 3,160 CIO respondents in 98 countries and across major industries, including 461 government CIOs.

Monday, February 19, 2018

They are more, but less safe

How many IoT devices do you use in your daily routine? A lot of people won’t be able to answer that question as they would be unable to know the meaning of that term, and they’ll think they are not using any. This will change if we would have referred to them as “Connected things”. This makes your mind to instantly enumerate a series of devices, letting you know the importance of day-to-day technology. Dear user, don’t be confused about terms, it would be almost impossible to live without IoT. 

Nowadays, IoT investment is situated around the $1.400 million and it is hoped that gets to $5.1 thousand millions in 2022. This rising in investment will lead to a massive increase in auxiliary IoT industry and the number of devices connected. To understand where this investment is going and what the security threats are, we want to show you an interview to Vaughan Emery, Atonomi CEO, by Digital Journal

Friday, February 16, 2018

Guilty is the one that hides

There’s a universal rule that’s valid everywhere: everyone tries to hide somethin that is not good for themselves. Every power, even if it’s a democratic one, uses this rule for its convenience. Even mass media hides information or, in a lot of cases, they change the truth to avoid conflict or to help the hand that feeds them. In our “cyberworld”, hiding code, information or even armies has become an art. 

Wednesday, February 14, 2018

Like automatization for productivity

We have already lived some industrial revolutions and we can see how the pattern is always the same when replacing a manual way of doing things with an automatic one. As a society we expect this to increase our life quality, even as professionals. On the other hand, we are afraid that this will lead us to a massive job loss or into a situation in which humans are less important in companies. 

This week, HelpNet Security gave us the keys in a survey made by Indeni and GNS3 to more than 700 global engineering workers. Nowadays, companies are suffering a lack of knowledge in programming that could be tagged as one of their biggest risks. This survey shows how this knowledge necessity is having a great impact in the surveyed companies’ productivity and how automatization brings a solution. 

Monday, February 12, 2018

The path of gender equality

June 16th of 1963 was a remarkable year in history because of the role of women in cosmonautics. Tereshkova 26 years old was the “Vostok-6” ship’s pilot and flew off to space being the first woman doing that alone.  There’s still a lot to do in order to get to real gender equality but Tereshkova is a great example on how you can break the glass ceiling riding a spaceship. 

In CIGTR we want to support Infosecurity’s purpose for interviewing, based in the 10 finalists of the “Security Champion” in the “Women for IT” Awards, women to give them a voice in the infosecurity world. This week we want to show you the interview to Elisabetta Zaccaria to Infosecurity Magazine.

Friday, February 9, 2018

Don´t mine me out, let it be

Many know that, according to the version of the historian Herodotus, the first coins arise in Asia Minor about the seventh century BC. At first, its objective was to facilitate the collection of taxes and, over the years, have been extending to the present. What is not so well known is the problem involved in transporting the first coins. From that need arose the tickets, lighter and easier to transport. Things have changed a lot and currently with cryptocurrencies the weight is symbolic and its transport ... well ... ask cryptocurrency mining how little it costs to move them from one place to another.

Wednesday, February 7, 2018

Don´t be afraid ot the cloud

It´s rainy season and it´s easy to dream with the most frightening scenes in films about this atmospheric phenomenon. We have classic films like ‘Twister’ to the modern ‘Geostorm’, going through ‘The Perfect Storm’. Some of them are based on true events, but no one in these films seems to be able to anticipate what’s coming when the clouds darken.  

The cloud is precisely what we want to talk about in the study of the week. For yet another year, the company F5 Networks brings to light the results of their research ‘State of Application Delivery’ which shows the results on how different companies are adapting to the cloud. 

Monday, February 5, 2018

Foreign body

At the time of doing an organ transplant there is a probability of rejection. When this happens the immune system of the recipient detects that this organ isn´t its own and that it´s a stranger, and therefore an attack. To avoid this type of situation, doctors use drugs to inhibit the recipient's immune system.

This week, as you all know, has been a tumultuous one because of two visitors: Meltdown and Specter. For that reason, in CIGTR, we want to bring to light the interviewthat David Dufour, senior director of cybersecurity and engineering at Webroot, has offered to Info-Security Magazine. Dufour calls these two elements of malware "fascinating" and explains how events about these intruders have developed.

Friday, February 2, 2018

To err is human... ¿and not to avoid the error?

“Errare humanum est” is a Latin expression that means “To err is human”. This is what ancient Romans said and they were right. Many things have changed since Roman times but, just as then, man continuous to make mistakes precisely because, he is human. Over time this expression evolved to “To err is human but only idiots persevere in error”. This week, considering the amount of human errors that have been made in the cybersecurity world, it seems that many have stayed in the first version of the expression.