Tag Archives: Security Management

Every Honest Mistake Makes the infoSec Community Stronger

A recent podcast from risky business (www.risky.biz) had a very interesting interview with Stephen Morse, formerly the staff vice president of cybersecurity analytics at Anthem.  You might remember that Anthem were the target of a state-sponsored attack back in 2015.  The interview is well worth listening, particularly for those charged with security in a large …

Dmitry Samosseiko – Ransomware: the great equalizer

Presented at the SERENE-RISC Workshop – 2016 Spring The cyber-attacks targeting individuals and businesses worldwide continue to grow and wreak havoc. But one particular threat type clearly stands out from everything else we see today or had faced before. The file-encrypting ransomware has taken its victims by storm recently. It’s dominating the current threat landscape …

Mick Bhinder – Reinventing Identity Access Management

Presented at the SERENE-RISC Workshop Spring 2016 The discussion of cybersecurity is highly complex and struggles with the ever increasing rate of sophisticated cyberattacks and digital exploitation. Cybersecurity continues to fall low in prioritization amongst executive management where there is a denial for a need of protection against such attacks. The discussion in today’s technological …

Atty Mashatan – Strategic Implications of Quantum-Resistant Cryptography

  Dr. Mashatan is currently a faculty member at the Ted Rogers School of Information Technology Management of Ryerson University where her research focus has been on Information Systems Security and Privacy. Prior to joining Ryerson University, she was a Senior Information Security Consultant and Solutions Architect at CIBC. Prior to that Dr. Mashatan was …

NISTIR 8183 – Cybersecurity Framework Manufacturing Profile

The National Institute of Standards and Technology has released a Cybersecurity risk reduction framework for businesses in the manufacturing sector.  The document outlines a general target profile for manufacturers around to identify risks within their business more efficiently than customizing from a general set of guidelines.   If you are in any manner concerned with …

Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits

RAND obtained a dataset of information about zero-day software exploits through a research connection. It is a rich dataset, as some of these exploits have been found by others and some have not. The dataset spans 14 years (2002–2016) and contains information about more than 200 zero-day exploits and the vulnerabilities that they take advantage …

U.S. Charges Russian FSB Officers and Their Criminal Conspirators for Hacking Yahoo and Millions of Email Accounts

A grand jury Northern District of California has indicted four defendants, including two officers of the Russian Federal Security Service (FSB), for computer hacking, economic espionage and other criminal offenses in connection with a conspiracy, beginning in January 2014, to access Yahoo’s network and the contents of webmail accounts. The defendants are Dmitry Aleksandrovich Dokuchaev, 33, …