Wednesday, March 28, 2018

Hunting trends

Do you know the term coolhunter? These professionals have a clear goal, to anticipate a fashion or trend in order to anticipate them and be the first to put them into practice. You need a very specific profile, innovative and visionary.


Like coolhunters, cybersecurity also has its hunters. Cofense is one of them and recently published Cofense Malware Review 2018. This document identifies the trends that defined the cyberattacks received during the year 2017 and based on them, the emerging trends are forecasted for the year 2018.


Monday, March 26, 2018

Study and protect

Exactly 30 years ago, in 1981, the disease named Acquired Immunodeficiency Syndrome (AIDS) was described for the first time. There has been a continuous improvement in the treatment of this disease, but it has been since 1987 when they have begun to develop antiretrovirals that have removed the deadly character of the disease. This has been achieved thanks to an exhaustive study of the life cycle of the virus that has led to the blockade of its development. More control has been able to stop the virus.

Last week, the California Department of Technology (CDT) announced the launch of a comprehensive program that evaluates systems at the state level with the aim of improving its cybersecurity measures. In this case, it is also intended that the exhaustive study of each one of the departments allows avoiding "virus". This tool is very innovative and places California at the head of the cyber career, being the first state in the nation to launch a matrix of this style.


Friday, March 23, 2018

Reinvent yourself or die... also in cybersecurity


Maybe the title of this blog seems to us a topic in these times, where all companies are immersed in processes of digital transformation and where technological advances have an immediate impact on society. Maybe this relationship is logical, but today we are going to focus on how the "evil ones" are striving to renew their bad arts, as we have seen throughout this week, full of news relevant to the cybersecurity sector.


Undoubtedly, one of the news related to our sector that has had the most impact (even in general media) has been the "discovery" that Cambridge Analytica tried to influence US voters during the last presidential elections using information compiled from 50 million Facebook users. This leak has led the dismissal of the director of the company, a significant loss of confidence of Facebook users in its social network (giving rise to the #DeleteFacebook movement) and an important drop in the stock market valuation of the Zuckerberg’s company, as well as the loss of important advertisers.


Wednesday, March 21, 2018

Protect your heels

The famous story of Achilles, the courageous and fast hero who was part of the Trojan War. Despite his courageous participation in this historic battle, the Trojan warrior has become famous for his weaknesses. His death, at the hands of Prince Paris with a poisoned arrow shot at the heel, it could have been easily avoided if he would have protected his best-known weakness.


As in Greek mythology, there are many companies, even entire sectors, that are not able to protect their heels. The increase in cyber attacks in the Middle East is a fact and, despite continuing to increase, they are often not detected early. Despite being so widespread, it seems that cybercriminals have found where to look, according to the study by Siemens and Ponemon Institute, more than 30% of the attacks are focused on operational technology (OT).


Monday, March 19, 2018

When forced entry becomes digital

One of the worst crimes against property that we can suffer is the housebreaking, the economic damage it causes is added to that strange feeling of knowing that a stranger has been fiddling among our personal effects, breaking the inviolability of our domestic sanctuary.


If you have suffered a similar situation or you can put yourself in the victim's shoes, get ready ... because in the digital world these type of actions are becoming more frequent, for example, before the ransomware only intended to block your information, now It leaves a window open to this type of attacks. That is why today we want to share this interview with Tom Kellermann, Chief Cybersecurity Officer at Carbon Black, and an expert on all types of digital threats.


Friday, March 16, 2018

Who said cyberwar?

In cyberwar the most powerful weapon does not fire, it types. Far from being an eccentricity or the plot of a science fiction film, the cyberwar is increasingly present. Attacks, leaks of information and cyber-espionage begin to be mundane issues that reach the mass media. Is a cyber war approaching? Or is this already happening and we are not realizing it?


Wednesday, March 14, 2018

Prevention is your best attack

It was not until July 3 and 4, 1940, when the British detected the first signs that the invasion of the British Islands was being prepared. Despite making aerial examinations of the area looking for artillery constructions, they did not find anything remarkable, or in case of finding it, they did not find it sufficiently important to take action. It was not until September first that the British people were able to confirm that there were clear signs that the invasion of England was taking place.


History leaves us many lessons to learn, and this leaves us a great lesson: early detection and a good defense strategy can save you a lot of casualties. From CIGTR, we have already talked several times about the risks and cyberattacks that the health sector faces. The latest study named "Impacts of cyber insecurity on healthcare organizations" shows exactly what are these challenges and how companies face them if they do. In this survey, 627 executives in the sector have been interviewed. Do you want an advance? 62% admit to having suffered an attack in the last year. In many of these cases, the losses were translated into patients’ personal data.


Monday, March 12, 2018

Wash you hands

Cholera, hepatitis, rotavirus ... are terms that you're never happy to hear about but, what if we tell you that they can be simply avoided by using easy hygienic habits? As simple as washing hands or washing food before consuming them can prevent a lot of health problems.


In cybersecurity, hygiene is also important, the hygiene of you and your employees "cyber-routines" build a good basis on which to build your security strategy.  This week we want to give voice to Robert Herjavec, investor in ABC'S Shark Tank and founder / CEO of the cybersecurity services company Herjavec Group. From CIGTR, nowadays we want to share their point of view about the current outlook of the cybersecurity industry thanks for this interview conducted by Forbes.


Friday, March 9, 2018

The tailor´s wife is…

We already know how the saying ends, and that´s because this saying, with its respective translations, is known worldwide. What comes to express is that there are people who neglect in their immediate environment precisely what they are professionally engaged. This week we want to leave a couple of "tailors" who have also neglected what precisely was their job.


Wednesday, March 7, 2018

The honest trick

Not long ago Winter Olympics were held and among other things, some athletes who have tested positive for doping substances have come to light. If there is someone who has stood out, and not because of her good results, it is Nadezhda Sergeeva. The Russian athlete who months ago posed with a sweatshirt that said "I don´t to doping" tested positive for trimetazidine. Everyone has their tricks but of course, some are more honest than others.


In the cybersecurity world, sometimes you also need a little push to catch up with the competition. The knowledge gap has a direct impact on the productivity of companies and in this context, automation arises to give a boost to profitability. Indeni and GNS3 have surveyed more than 700 engineering and operations professionals worldwide.


Monday, March 5, 2018

Trust is blind and dangerous

When trust is on the table, the world divides in two. One side of the population will say that as human beings, we are trustful by nature. It’s in our genes as social animals and the necessities of our society. On the other hand, some may say that human beings are distrustful.  


This division will probably be something that will remain in time, but, as we can see in the news, cybersecurity world must be careful. In CIGTR we want to focus on Bill Mann’s, product director in Centrify, interview made by TechRepublic and ZDNet. In this interview, Bill Mann, explains his point of view on how companies should work on a zero trust basis if they want to be protected against cyberattacks. 


Friday, March 2, 2018

Do you feel safe at home?

Insecurities are bad but when you feel them at home they’re the worst. At home is where you should be feeling safer, and you should be doing what you can in order to achieve it. Can you even think about going to sleep leaving the keys in your doormat? Well, in cybersecurity, some people even leave the door open with a giant neon sign begging for people to come in. In this post we will revisit some of this week’s news and we will encourage you to buy a good bolt.