//
archives

IT & TECHNOLOGY

This category contains 1363 posts

Threat Brief: Drive-by Mining – Adapting an Old Attack to Mine Cryptocurrencies


On January 2, 2017, one Bitcoin was worth US $985.56. By October 16, 2017, that same Bitcoin was worth US $ 5,707.40: a 579% increase in value in ten and a half months. By comparison, Ethereum has gone from US $8.15 per ether on January 2, 2017 to US $342.83 per ether on October 16, 2017: a jump of … Continue reading

CISO VS. CIO: TURF WAR CASTS SHADOW CYBERSECURITY


By David Shearer, CISSP, CEO (ISC)²  I was recently reading an article by my colleague, ISACA CEO Matt Loeb, that got me thinking. In his piece, Creating cyberculture, Matt creatively reworks the “cybersecurity is everyone’s responsibility” mantra with his seatbelt analogy. While I certainly applaud any effort to create an inclusive cybersecurity culture – and Matt has … Continue reading

Welcoming the APAC WildFire Cloud


In service of delivering superior security outcomes, we must aggregate massive quantities of unknown threat data from a global community of users. Once this data is brought together, it should be rapidly processed, correlated and acted upon as new prevention controls. In order to support thousands of customers and petabytes of data in one central … Continue reading

Five Questions With National Security Expert and CSX North America Keynoter Matt Olsen


Editor’s note: Matt Olsen, national security expert and co-founder of IronNet Cybersecurity, will deliver the opening keynote address at CSX North America, which will take place 2-4 October in Washington, D.C., USA. Olsen, who says ‘no company should go it alone in cyber space,’ visited with ISACA Now about the role of cyber professionals in counterterrorism, evolving … Continue reading

How to Hack Neural Networks


If only neurologist Oliver Sacks, who wrote “The Man Who Mistook His Wife for a Hat,” were still alive! He would find today’s neural networks (the hot new trend from the artificial intelligence community) extremely amusing. His book describes a man whose brain damage results in the man thinking his wife’s head is a hat. Maybe there … Continue reading

Palo Alto Networks Day Japan 2017: Evolving Cybersecurity Efforts to Increase Trust in the Digital Age and Prevent Cyberattacks


Palo Alto Networks Day 2017, our third annual global cybersecurity conference in Japan, was a great success, attracting over 2,600 registrations. The number of attendees has more than doubled each year of the conference; and the spike in attendance reflects growing interest in cybersecurity updates on next-generation technology, the current cyberthreat landscape, Japan’s cybersecurity policy, … Continue reading

No End in Sight for Impact of Equifax Breach


It is a terrible time for privacy in the United States. There are very few institutions that we entrust to hold nearly all our financial records, and one of them, Equifax, admits to losing them. The full impact of the breach will be felt over time, and right now nothing has changed in our lives besides … Continue reading

When It Comes to Crypto, What You Don’t Know Can Hurt You


Most of us have heard the phrase “What you don’t know can’t hurt you.” While this may hold true for some circumstances, in the case of an audit, the opposite is true. A large part of an auditor’s job is to discover and know about exposures and gaps that could hurt the organizations for which … Continue reading

The Farmer and the Equifax


In the wake of major disasters, companies often retrench to their board rooms and ask questions about the state of their own resilience. These questions follow one of two tracks: First is a retrospective post-mortem of their own company, or preferably an affected competitor. It starts with a question like, “How would we be affected … Continue reading

TOP 10 (ISC)² WEBCASTS OF 2017


(ISC)² webcasts are a great source for insight into all areas of security. From the Internet of Things to malware and compliance, the topics vary. Here are the top 10 (ISC)² webcasts for 2017 so far as ranked by cybersecurity professionals: Part 1: Future of SIEM – Why Static Correlation Fails Insider Threat Detection Hackers … Continue reading

Web Stats

  • 121,322 hits
@PhilipHungCao

@PhilipHungCao

@PhilipHungCao, CISM, CCSP, CCSK, CASP, CIW-WSP, GICSP, PCNSE, ACSP, CCDA, DCSE, JNCIA, MCTS, MCSA, VCP5-DCV, VCP6-NV, ZCNT is a #TekF@rmer. He has 16 years' experience in ICT/Cybersecurity industry in various sectors & positions.

Personal Links

View Full Profile →

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 2,358 other followers

Twitter Updates

Archives

October 2017
M T W T F S S
« Sep    
 1
2345678
9101112131415
16171819202122
23242526272829
3031