Source: DARK READING: Jai Vijayan

Concerns over the action are sending VPN sales soaring, some vendors say.

The Trump administration’s move to repeal a Federal Communications Commission (FCC) rule that would have prevented ISPs from selling customer data to third parties has widespread security implications for users and organizations, industry experts warned this week.

The Obama-era FCC rule was to have gone into effect later this year. It would have prevented Internet service providers from collecting and selling data such as a customer’s Web browsing history, location data, and other data related to the user’s online activities without explicit permission.

The White House, FCC chairman Ajit Pai, and others wanted the bill repealed on the grounds that it unfairly favored one set of companies on the Internet over another. The main argument was that the bill would have restricted carriers including AT&T, Verizon, and Comcast from collecting and selling data on a user’s online activities, even as Internet giants such as Google, Facebook, and Twitter were free to do so.

SOURCE: CBInsights 06/18/2016

Healthcare, advertising, sales & marketing, and business intelligence startups using AI technologies received the highest number of deals in 2015 compared to other sub-industries; healthcare is dominating 2016 so far.

In the past year, Google open-sourced its machine learning API tensorflow and Nervana Systems open sourced its deep learning software. Several sub-industries are leveraging the advances in artificial intelligence algorithms, from predicting crop failures in agriculture to intelligent shopping assistants in e-commerce. Continue Reading »

Breakfast Meeting and Presentation

Wednesday, 04/20/2016 8:00 am – 10:30 am

Summary

Learn how the psychology of persuasion (POP) is leveraged for good and evil to create moments of mitigation or misery (MOM) in security.

Significant improvements in security technology have made it difficult for cybercriminals to steal sensitive data by solely penetrating computer systems. Social engineering relies on momentary weaknesses in people, and it’s easier to deceive someone than it is to hack into systems. Protecting your company from social engineering attacks requires fluency with ever increasing sophisticated social engineering techniques.

“Know thy self, know thy enemy. A thousand battles, a thousand victories.”
Sun Tzu

Speaker: Michael Fizz

Empowered with the principles of persuasion, white hats can help everyone in an organization create innumerable moments of mitigation (MOM).  More importantly, fluency with the use of principals of persuasion utilized by black hats will empower you to stay ahead of their nefarious intent.

Questions we will answer:

  • What are the six principals of persuasion utilized for good and evil in social engineering?
  • What are your organization’s Moments of Truth (MOT) that result in mitigation and maintained security or breach? 
  • How do you leverage MOM and POP to influence and empower ALL members of your organization and significantly mitigate attacks and reduce risk?

Agenda:

• Breakfast & Networking: 8:00 – 8:30

• Professional Meeting:  8:30 – 10:30

2 CPE’s will be granted for attendance.

Details:

When: Wednesday, April 20, 2016 – 8:00 AM – 10:30 AM

Where: Wolf and Company, 99 High Street, Boston, MA   02110

REGISTER

Contact VIMRO to better understand DDoS and the advanced solutions available today.

Connect with VIMRO on Linkedin

Arbor’s Live Denial of Service Attacks (DDoS) Map 

DDoS Map and Table

 

 

 

Kaspersky’s Cyber Threat Real Time Map

Shared by our new friend Kevin Duffy from Cyber Rescue.  Thank you Kevin.

Learn how to demonstrate ROI.  

When VIMRO conducts an ROI assessment for multifactor controls, we can demonstrate that the control is less expensive than the hard costs associated with one mere breach.  Learn the details and download the Multifactor Authentication Evaluation Requirement Table.

GO

Have a fantastic SUPER TUESDAY!

Michael

Just like Lucifer, the Dark Net is known by many names with only subtle differences in meaning: the Dark Web, the Digital Underground, and the Deep Web, to name a few. Dark Net sites are difficult to find because they do not show up in normal search engines, but they are accessible through TOR or Tails. At their core these sites are meant to serve one purpose: enable privacy and free speech on the Internet. Unfortunately, they also provide fertile ground for illegal activities, such as selling contraband drugs, firearms, and stolen data, as well as much worse crimes.
When you hear a news story about yet another data breach, you can be confident the stolen data will be available on the Dark Net, on information brokerage sites known as Dark Markets. Some of these Dark Markets trade in stolen data (credit cards, Social Security numbers, personally identifiable information, protected health information, and so forth). Figure 1 below depicts….. READ the full paper


 

LinkedIn Cyber Security Posts