2019 Forcepoint Government Cybersecurity Predictions Report

Total Page:16

File Type:pdf, Size:1020Kb

2019 Forcepoint Government Cybersecurity Predictions Report 2019 Forcepoint Government Cybersecurity Predictions Report 1 Introduction 03 1: The winter of AI 04 2: Industrial IoT disruption at scale 07 3: A counterfeit reflection 09 4: Courtroom face-off 12 5: A collision course to cyber cold war 14 6: Driven to the edge 16 Conclusion 19 Works cited 20 2 Introduction nnovation thrives when people can collaborate in a trusted manner, As data and digital experiences are placed into the hands of others, the I leveraging data creatively and freely through technology. concept of trust becomes even more crucial. Both government and private sector businesses can rise or fall based on trust—for example Take the commute to work, for example, as it offers a glimpse into the companies abusing their customers’ trust face millions or billions relationship between trust and innovation. Everything a person does in of dollars in regulatory fines and lost market value, as in the case of that commute to the office is underpinned by trust: they trust a train to Facebook and Cambridge Analytica. In government sectors, the 2015 run per the specified timetable, that their barista will not mix up their OPM data breach eroded the public’s trust in the agency and in the coffee order. And, since trust is established between parties, employers government to protect personal data. trust employees to protect critical data at all times, with an expectation to remember their cybersecurity training. This is especially important in In the 2019 Forcepoint Government Cybersecurity Predictions Report, a government environment, where a data breach incident could mean our Global Government Security Labs, Innovation Labs, CTO, and CISO extensive damage for a great number of citizens. As a result, trusted teams offer intriguing predictions for 2019 and beyond. We chose to not interactions are a priority for government agencies. restate the obvious—agencies will, of course, continue to modernize and shift to the cloud. Instead, we chose to explore the impact of putting trust The intersection between end-user and data is the point of greatest in cloud providers to protect government data, the impact of end-user vulnerability and the primary source of data breaches, driving cyber risk trust in those securing personal biometric data, and trust in algorithms within government environments to all-time highs. How can security and analytics successfully piloting automobiles and alerting security professionals know if an end-user login is the result of an employee’s professionals to potential data loss incidents. coffee-shop WiFi access or an attacker abusing authorized credentials? How do they know whether a user identity is behaving consistently or Our global Security Labs, Innovation Labs, CTO, and CISO teams have put erratically on the network compared to an established routine? Knowing forward their top predictions for the year to come. Read on to discover and acting on the difference between an individual legitimately trying to their predictions for 2019. How will you guide your agency through the get their job done and a compromised identity is the difference between increasingly complex trust landscape? innovation and intellectual property (IP) loss, the difference between an agency’s success or failure. 3 onstantly evolving threats in today’s The winter of AI? Clandscape have been accompanied by a considerable federal IT cybersecurity 01 knowledge gap spanning two to three years. Disillusionment sets in as AI and machine learning In an attempt to fill the void, there have been a number of discussions on how government are held accountable for can leverage artificial intelligence (AI) for their claims vulnerability and threat risk management. And why not? In other industries, these Prediction: technologies represent enormous potential. There is no real AI in In healthcare, AI opens the door to more cybersecurity, nor any likelihood accurate diagnoses and less invasive for it to develop in 2019. procedures. In a marketing organization, AI enables a better understanding of customer buying trends and improved decision making.2 In transportation, autonomous vehicles represent enormous potential for consumer convenience and safety. The Trump administration has prioritized funding for foundational AI research, making the buzz for government cybersecurity AI palpable. In the past two years, the promise of machine learning and AI has enthralled and Contributor: attracted marketers and media, with many Raffael Marty falling victim to feature misconceptions and Vice President of muddy product differentiations. In some Research and Intelligence cases, AI start-ups are concealing just how 4 much human intervention is involved in their system’s “baseline” or “normal” activity and product offerings.3 In others, the incentive to flagging anything unusual for human review. include machine learning-based products is Government analysts can then pinpoint one too compelling to ignore, if for no other threats sooner through correlation, pattern reason than to check a box with an intrigued matching, and anomaly detection. While customer base. it may take a SOC analyst several hours to triage a single security alert, a machine can Today, cybersecurity AI in both the do it in seconds and continue even after Click above to see Raffael Marty, Vice President of government and private sector in the purest business hours. Research and Intelligence, discuss this prediction. sense is nonexistent, and we predict it will not fully develop in 2019. While AI is about However, government professionals should reproducing cognition, today’s solutions are be aware that organizations are relying actually more representative of machine too heavily on these technologies without learning, requiring humans to upload new understanding the risks involved. Algorithms training datasets and expert knowledge. can miss attacks if training information has Despite increasing analyst efficiency, at this not been thoroughly scrubbed of anomalous time, this process still requires their inputs— data points and the bias introduced by the and high-quality inputs at that. If a machine is environment from which it was collected. 54% fed poor data, its results will be equally poor. In addition, certain algorithms may be too Machines need significant user feedback to complex to understand what is driving a fine-tune their monitoring; without it, analysts specific set of anomalies. cannot extrapolate new conclusions. Aside from the technology, investment is On the other hand, machine learning provides another troublesome area for cybersecurity Only 1 in 2 (54%) employees belonging to companies clear advantages in outlier detection, much AI. Venture capitalists seeding AI firms expect with extensive experience in machine learning check for fairness and bias.8 to the benefit of security analytics and a timely return on investment, but the AI SOC operations. Unlike humans, machines bubble has many experts worried. Michael can handle billions of security events in Woodridge, head of Computer Science at a single day, providing clarity around a the University of Oxford, has expressed his 5 concern that overhyped “charlatans and The gold standard in hacking efficiency, snake-oil salesmen” exaggerate AI’s progress weaponized AI offers attackers unparalleled 99% of surveyed customers to date.4 Researchers at Stanford University insight into what, when, and where to strike. identified evolving cyber attacks to be an important security issue for launched the AI Index, an open, not-for-profit In one example, AI-created phishing tweets their organization.9 project meant to track activity in AI. In their were found to have a substantially better 2017 report, they state that even AI experts conversion rate than those created by have a hard time understanding and tracking humans.7 Artificial attackers are formidable progress across the field.5 opponents, and we will see the arms race around AI and machine learning continue A slowdown of funding for AI research is to build. imminent, reminiscent of the “AI Winter” of 1969, in which Congress cut funding as results lagged behind lofty expectations.6 But attacker tactics are not bound by investments, allowing for the continued advancement of AI as a hacker’s tool to spotlight security gaps and steal valuable data. Today’s AI solutions are not built to deal with ambiguity. Humans, on the other hand, are better able to balance multiple variables and context associated with behavior to make decisions-especially when dealing with the unexpected. The cybersecurity industry can’t avoid dealing with this ambiguity. — Audra Simons, Head of Innovation & Prototyping, Forcepoint 6 etworked industrial control systems Industrial IoT N (ICS) that require “always-on” connectivity represent an expanded attack disruption surface, and nowhere is that more apparent 02 than in IoT devices. For government at scale environments, IoT sensor technologies could result in significant cost savings and efficiency Attackers seek out increases; however, there are serious concerns vulnerabilities in cloud about IoT security with regard to these infrastructure and hardware systems, given that attacks on consumer IoT are so prevalent. For example, the Department of Defense has been forced to rethink how its Prediction: service members use fitness devices after Attackers will disrupt Industrial Internet of Things (IIoT) devices discovering that service member movements using vulnerabilities in cloud infrastructure and hardware. could be tracked through a heat map created by the devices’
Recommended publications
  • Inside a Phisher's Mind: Understanding the Anti-Phishing
    Inside a Phisher’s Mind: Understanding the Anti-phishing Ecosystem Through Phishing Kit Analysis Adam Oest∗, Yeganeh Safaei∗, Adam Doupe´∗, Gail-Joon Ahn∗x, Brad Wardmany, Gary Warnerz ∗Arizona State University, x Samsung Research, yPayPal, Inc., zCofense, Inc. faoest, ysafaeis, doupe, [email protected], [email protected], [email protected] Abstract—Phishing attacks are becoming increasingly preva- Phishing attacks are particularly damaging not only due lent: 2016 saw more phishing attacks than any previous year on to their prevalence, but because their impact extends beyond record according to the Anti-Phishing Working Group. At the the individuals who are directly targeted. The organizations same time, the growing level of sophistication of cybercriminals must be understood for the development of effective anti-phishing being impersonated in such attacks (such as financial institu- systems, as phishers have extensive control over the content tions or e-mail providers) expend vast resources to minimize they serve to their victims. By examining two large, real-world their losses and must work together with security firms and datasets of phishing kits and URLs from 2016 through mid- researchers to address the increasing level of sophistication 2017, we paint a clear picture of today’s anti-phishing ecosystem being observed in phishing. This gives rise to an anti-phishing while inferring the higher-level motives and thought processes of phishers. We analyze the nature of server-side .htaccess ecosystem comprised of many diverse entities working toward filtering techniques used by phishers to evade detection by the the same goal of reducing the billions of dollars of annual security community.
    [Show full text]
  • FORCEPOINT Web Security FORCEPOINT’S CLOUD and ON-PREMISE WEB SECURITY Forcepoint Web Security FORCEPOINT’S CLOUD and ON-PREMISE WEB SECURITY
    FORCEPOINT Web Security FORCEPOINT’S CLOUD AND ON-PREMISE WEB SECURITY Forcepoint Web Security FORCEPOINT’S CLOUD AND ON-PREMISE WEB SECURITY Your business and its data are under constant attack. Traditional security solutions no longer provide sufficient protection. In fact, they can put you at risk for data loss and litigation. Protecting your network and data against advanced threats, crypto-ransomware and exploit kits are crucial for the survival of your business in an increasingly risky mobile and cloud- connected digital world. Customizable with the option to expand Companies need customizable solutions that communicate together to protect against these types of threats as they happen. Forcepoint Web Security offers real-time protection against advanced threats and data theft with multiple deployment options and modules to help tailor your web protection package to your organization’s needs. Forcepoint Web Security provides robust protection through content aware defenses and cloud app discovery and monitoring, reducing risks to sensitive data for both on premise and mobile users. Best of all, Forcepoint Web Security easily integrates with other Forcepoint solutions for single, consistent security controls that can protect against inbound and outbound threats with even the smallest of security teams. Web Security Objectives Identify and Control the Risks of Shadow IT Applications and Cloud Services Most of today’s security solutions can’t address Advanced Threats as they happen. Forcepoint Web Security is » Discover cloud applications being used within your advanced, real-time threat defense. organization. Monitor usage of those applications to determine and block those that represent the Securing Every User, Everywhere, greatest risk.
    [Show full text]
  • A Day in the Life of Your Data
    A Day in the Life of Your Data A Father-Daughter Day at the Playground April, 2021 “I believe people are smart and some people want to share more data than other people do. Ask them. Ask them every time. Make them tell you to stop asking them if they get tired of your asking them. Let them know precisely what you’re going to do with their data.” Steve Jobs All Things Digital Conference, 2010 Over the past decade, a large and opaque industry has been amassing increasing amounts of personal data.1,2 A complex ecosystem of websites, apps, social media companies, data brokers, and ad tech firms track users online and offline, harvesting their personal data. This data is pieced together, shared, aggregated, and used in real-time auctions, fueling a $227 billion-a-year industry.1 This occurs every day, as people go about their daily lives, often without their knowledge or permission.3,4 Let’s take a look at what this industry is able to learn about a father and daughter during an otherwise pleasant day at the park. Did you know? Trackers are embedded in Trackers are often embedded Data brokers collect and sell, apps you use every day: the in third-party code that helps license, or otherwise disclose average app has 6 trackers.3 developers build their apps. to third parties the personal The majority of popular Android By including trackers, developers information of particular individ- and iOS apps have embedded also allow third parties to collect uals with whom they do not have trackers.5,6,7 and link data you have shared a direct relationship.3 with them across different apps and with other data that has been collected about you.
    [Show full text]
  • A Look at How Five of the Biggest Tech Companies Probe New Terrain
    THEMIDDLEMARKET.COM MARCH 2020 A look at how fi ve of the biggest tech companies probe new terrain through early-stage investments CV1_MAJ0320.indd 1 2/24/20 4:16 PM Gain way. We designed our M&A Escrow experience to be a straight line from start to finish. With our comprehensive Deal Dashboard, streamlined KYC and account opening, and high-touch service through a single point of contact, try a better way on your next deal. Learn more at srsacquiom.com 0C2_MAJ0320 2 2/24/2020 11:54:58 AM Contents March 2020 | VOL. 55 | NO. 3 Cover Story 16 Fresh Terrain A look at how five of the biggest tech companies explore new territory through early-stage investments. Features 24 Viral impact How the coronavirus is affecting M&A and private equity. 27 Top investment banks Houlihan Lokey leads list based on volume of PE-backed U.S. deals 30 Top private equity firms Audax ranks first in U.S. deals. Private Equity Perspective 14 Record year for fundraising Blackstone’s $26 billion fund marked the largest buyout fund ever raised. The Buyside 15 Taking a new path XPO Logistics is selling assets and has Watercooler hired a new CFO to lead the process. 6 10 Guest article Climate change draws PE Future of auto 33 KKR raises first global impact fund to BorgWarner acquires Delphi to Women on board target clean water. position for auto industry shift. Gender diversity on corporate boards is good for performance and for 8 12 shareholders. Protecting businesses Why investors like steaks Advent and Crosspoint buy Smith & Wollensky owner purchases cybersecurity firm Forescout.
    [Show full text]
  • Secure Email Gateway - Market Quadrant 2016 ∗
    . The Radicati Group, Inc. Palo Alto, CA 94301 . Phone: (650) 322-8059 . www.radicati.com . THE RADICATI GROUP, INC. Secure Email Gateway - Market Quadrant 2016 ∗ ......... An Analysis of the Market for Secure Email Gateway Solutions, Revealing Top Players, Trail Blazers, Specialists and Mature Players. November 2016 SM ∗ Radicati Market Quadrant is copyrighted November 2016 by The Radicati Group, Inc. Reproduction in whole or in part is prohibited without expressed written permission of the Radicati Group. Vendors and products depicted in Radicati Market QuadrantsSM should not be considered an endorsement, but rather a measure of The Radicati Group’s opinion, based on product reviews, primary research studies, vendor interviews, historical data, and other metrics. The Radicati Group intends its Market Quadrants to be one of many information sources that readers use to form opinions and make decisions. Radicati Market QuadrantsSM are time sensitive, designed to depict the landscape of a particular market at a given point in time. The Radicati Group disclaims all warranties as to the accuracy or completeness of such information. The Radicati Group shall have no liability for errors, omissions, or inadequacies in the information contained herein or for interpretations thereof. Secure Email Gateway - Market Quadrant 2016 TABLE OF CONTENTS RADICATI MARKET QUADRANTS EXPLAINED .................................................................................. 2 MARKET SEGMENTATION – SECURE EMAIL GATEWAYS .................................................................
    [Show full text]
  • Insight MFR By
    Manufacturers, Publishers and Suppliers by Product Category 11/6/2017 10/100 Hubs & Switches ASCEND COMMUNICATIONS CIS SECURE COMPUTING INC DIGIUM GEAR HEAD 1 TRIPPLITE ASUS Cisco Press D‐LINK SYSTEMS GEFEN 1VISION SOFTWARE ATEN TECHNOLOGY CISCO SYSTEMS DUALCOMM TECHNOLOGY, INC. GEIST 3COM ATLAS SOUND CLEAR CUBE DYCONN GEOVISION INC. 4XEM CORP. ATLONA CLEARSOUNDS DYNEX PRODUCTS GIGAFAST 8E6 TECHNOLOGIES ATTO TECHNOLOGY CNET TECHNOLOGY EATON GIGAMON SYSTEMS LLC AAXEON TECHNOLOGIES LLC. AUDIOCODES, INC. CODE GREEN NETWORKS E‐CORPORATEGIFTS.COM, INC. GLOBAL MARKETING ACCELL AUDIOVOX CODI INC EDGECORE GOLDENRAM ACCELLION AVAYA COMMAND COMMUNICATIONS EDITSHARE LLC GREAT BAY SOFTWARE INC. ACER AMERICA AVENVIEW CORP COMMUNICATION DEVICES INC. EMC GRIFFIN TECHNOLOGY ACTI CORPORATION AVOCENT COMNET ENDACE USA H3C Technology ADAPTEC AVOCENT‐EMERSON COMPELLENT ENGENIUS HALL RESEARCH ADC KENTROX AVTECH CORPORATION COMPREHENSIVE CABLE ENTERASYS NETWORKS HAVIS SHIELD ADC TELECOMMUNICATIONS AXIOM MEMORY COMPU‐CALL, INC EPIPHAN SYSTEMS HAWKING TECHNOLOGY ADDERTECHNOLOGY AXIS COMMUNICATIONS COMPUTER LAB EQUINOX SYSTEMS HERITAGE TRAVELWARE ADD‐ON COMPUTER PERIPHERALS AZIO CORPORATION COMPUTERLINKS ETHERNET DIRECT HEWLETT PACKARD ENTERPRISE ADDON STORE B & B ELECTRONICS COMTROL ETHERWAN HIKVISION DIGITAL TECHNOLOGY CO. LT ADESSO BELDEN CONNECTGEAR EVANS CONSOLES HITACHI ADTRAN BELKIN COMPONENTS CONNECTPRO EVGA.COM HITACHI DATA SYSTEMS ADVANTECH AUTOMATION CORP. BIDUL & CO CONSTANT TECHNOLOGIES INC Exablaze HOO TOO INC AEROHIVE NETWORKS BLACK BOX COOL GEAR EXACQ TECHNOLOGIES INC HP AJA VIDEO SYSTEMS BLACKMAGIC DESIGN USA CP TECHNOLOGIES EXFO INC HP INC ALCATEL BLADE NETWORK TECHNOLOGIES CPS EXTREME NETWORKS HUAWEI ALCATEL LUCENT BLONDER TONGUE LABORATORIES CREATIVE LABS EXTRON HUAWEI SYMANTEC TECHNOLOGIES ALLIED TELESIS BLUE COAT SYSTEMS CRESTRON ELECTRONICS F5 NETWORKS IBM ALLOY COMPUTER PRODUCTS LLC BOSCH SECURITY CTC UNION TECHNOLOGIES CO FELLOWES ICOMTECH INC ALTINEX, INC.
    [Show full text]
  • Conference Agenda Wednesday, October 14, 2020
    Confronting Cybersecurity and Data Privacy Challenges in Times of Unprecedented Change October 14 and 16, 2020 New York University School of Law Virtual Conference Faculty Director Executive Director Assistant Director Jennifer H. Arlen Alicyn Cooley Clarissa D. Santiago The Program on Corporate Compliance and Enforcement (PCCE) is a law and policy program dedicated to promoting effective enforcement and compliance. Through practical discourse and legal scholar­ ship, PCCE helps shape optimal enforcement policy, guides firms in developing more effective and robust compliance programs, and educates in the fields of corporate compliance and enforcement. Confronting Cybersecurity and Data Privacy Challenges in Times of Unprecedented Change October 14 and 16, 2020 Conference Objectives This conference brings together academics, government executives’ duties and best practices in these areas. It will officials, corporate directors, in-house counsel, compli­ then examine how enforcement agencies, financial services ance officers, and private attorneys for an off-the-record providers, and corporations collectively can address the discussion of today’s most significant challenges and risks threats posed today by the misappropriation of corporate pertaining to cybersecurity and data privacy. The confer­ data, including terrorism and election interference. The ence participants will offer concrete guidance on how com­ next panel will provide practical guidance, and regulators’ panies and their counsel can overcome and even preempt perspectives,
    [Show full text]
  • Critical Point of View: a Wikipedia Reader
    w ikipedia pedai p edia p Wiki CRITICAL POINT OF VIEW A Wikipedia Reader 2 CRITICAL POINT OF VIEW A Wikipedia Reader CRITICAL POINT OF VIEW 3 Critical Point of View: A Wikipedia Reader Editors: Geert Lovink and Nathaniel Tkacz Editorial Assistance: Ivy Roberts, Morgan Currie Copy-Editing: Cielo Lutino CRITICAL Design: Katja van Stiphout Cover Image: Ayumi Higuchi POINT OF VIEW Printer: Ten Klei Groep, Amsterdam Publisher: Institute of Network Cultures, Amsterdam 2011 A Wikipedia ISBN: 978-90-78146-13-1 Reader EDITED BY Contact GEERT LOVINK AND Institute of Network Cultures NATHANIEL TKACZ phone: +3120 5951866 INC READER #7 fax: +3120 5951840 email: [email protected] web: http://www.networkcultures.org Order a copy of this book by sending an email to: [email protected] A pdf of this publication can be downloaded freely at: http://www.networkcultures.org/publications Join the Critical Point of View mailing list at: http://www.listcultures.org Supported by: The School for Communication and Design at the Amsterdam University of Applied Sciences (Hogeschool van Amsterdam DMCI), the Centre for Internet and Society (CIS) in Bangalore and the Kusuma Trust. Thanks to Johanna Niesyto (University of Siegen), Nishant Shah and Sunil Abraham (CIS Bangalore) Sabine Niederer and Margreet Riphagen (INC Amsterdam) for their valuable input and editorial support. Thanks to Foundation Democracy and Media, Mondriaan Foundation and the Public Library Amsterdam (Openbare Bibliotheek Amsterdam) for supporting the CPOV events in Bangalore, Amsterdam and Leipzig. (http://networkcultures.org/wpmu/cpov/) Special thanks to all the authors for their contributions and to Cielo Lutino, Morgan Currie and Ivy Roberts for their careful copy-editing.
    [Show full text]
  • National Magazine Award
    VIRTUAL PRESENTATION | THURSDAY, MAY 28, 2O2O The National Magazine Awards honor print and digital publications that consistently demonstrate superior execution of editorial objectives, innovative techniques, noteworthy enterprise and imaginative design. Originally limited to print NATIONAL MAGAZINE AWARDS FOR PRINT AND DIGITAL MEDIA magazines, the awards now recognize magazine-quality ASME Award for Fiction | Honoring The Paris Review journalism published in any medium. Founded in 1966, the awards ASME NEXT Awards for Journalists Under 30 are sponsored by the American Society of Magazine Editors Magazine Editors’ Hall of Fame Award | Honoring David Granger in association with the Columbia University Graduate School of Journalism and are administered by ASME. Awards are presented in 22 categories. The winner in each category receives an “Ellie,” modeled on the symbol of the awards, ASME.MEDIA TWITTER.COM/ASME1963 #ELLIES Alexander Calder’s stabile “Elephant Walking.” | | THE OSBORN ELLIOTT-NATIONAL MAGAZINE AWARDS SCHOLARSHIP INFORMATION ABOUT FINALISTS AND WINNERS Ellie Awards 2020 ticket sales provide support for the Please visit asme.media for more information about Ellie Awards 2020 Osborn Elliott Scholarship at the Columbia Journalism School. honorees, including citations, links to content and a complete list of the judges Named for the former Newsweek editor and Editors whose names appear in citations held those positions Columbia dean, the scholarship is awarded to students who or were listed on the masthead when the content was published. intend to pursue careers in magazine journalism. Other editors may now be in those positions Magazine Editors’ Hall of Fame Helen Gurley Brown Tina Brown William F. Buckley Jr. Gayle Goodson Butler Graydon Carter MAGAZINE John Mack Carter Sey Chassler EDITORS’ Arthur Cooper Byron Dobell HALL OF FAME Osborn Elliott Clay Felker Dennis Flanagan Henry Anatole Grunwald The Magazine Editors’ Hall of Fame Hugh M.
    [Show full text]
  • Insight Manufacturers, Publishers and Suppliers by Product Category
    Manufacturers, Publishers and Suppliers by Product Category 2/15/2021 10/100 Hubs & Switch ASANTE TECHNOLOGIES CHECKPOINT SYSTEMS, INC. DYNEX PRODUCTS HAWKING TECHNOLOGY MILESTONE SYSTEMS A/S ASUS CIENA EATON HEWLETT PACKARD ENTERPRISE 1VISION SOFTWARE ATEN TECHNOLOGY CISCO PRESS EDGECORE HIKVISION DIGITAL TECHNOLOGY CO. LT 3COM ATLAS SOUND CISCO SYSTEMS EDGEWATER NETWORKS INC Hirschmann 4XEM CORP. ATLONA CITRIX EDIMAX HITACHI AB DISTRIBUTING AUDIOCODES, INC. CLEAR CUBE EKTRON HITACHI DATA SYSTEMS ABLENET INC AUDIOVOX CNET TECHNOLOGY EMTEC HOWARD MEDICAL ACCELL AUTOMAP CODE GREEN NETWORKS ENDACE USA HP ACCELLION AUTOMATION INTEGRATED LLC CODI INC ENET COMPONENTS HP INC ACTI CORPORATION AVAGOTECH TECHNOLOGIES COMMAND COMMUNICATIONS ENET SOLUTIONS INC HYPERCOM ADAPTEC AVAYA COMMUNICATION DEVICES INC. ENGENIUS IBM ADC TELECOMMUNICATIONS AVOCENT‐EMERSON COMNET ENTERASYS NETWORKS IMC NETWORKS ADDERTECHNOLOGY AXIOM MEMORY COMPREHENSIVE CABLE EQUINOX SYSTEMS IMS‐DELL ADDON NETWORKS AXIS COMMUNICATIONS COMPU‐CALL, INC ETHERWAN INFOCUS ADDON STORE AZIO CORPORATION COMPUTER EXCHANGE LTD EVGA.COM INGRAM BOOKS ADESSO B & B ELECTRONICS COMPUTERLINKS EXABLAZE INGRAM MICRO ADTRAN B&H PHOTO‐VIDEO COMTROL EXACQ TECHNOLOGIES INC INNOVATIVE ELECTRONIC DESIGNS ADVANTECH AUTOMATION CORP. BASF CONNECTGEAR EXTREME NETWORKS INOGENI ADVANTECH CO LTD BELDEN CONNECTPRO EXTRON INSIGHT AEROHIVE NETWORKS BELKIN COMPONENTS COOLGEAR F5 NETWORKS INSIGNIA ALCATEL BEMATECH CP TECHNOLOGIES FIRESCOPE INTEL ALCATEL LUCENT BENFEI CRADLEPOINT, INC. FORCE10 NETWORKS, INC INTELIX
    [Show full text]
  • Cybersecurity Survival Guide
    CYBERSECURITY SURVIVAL GUIDE Principles & Best Practices Third Edition | August 2018 Lawrence C. Miller, CISSP www.paloaltonetworks.com/academy Advisory Panel: Brian Adams Jim Boardman Steve Bradshaw Keith Cantillon James Dalton Matthew Frohlich Thomas Trevethan Palo Alto Networks, Inc. www.paloaltonetworks.com © 2018 Palo Alto Networks – all rights reserved. Aperture, AutoFocus, GlobalProtect, Palo Alto Networks, PAN-OS, Panorama, Traps, and WildFire are trademarks of Palo Alto Networks, Inc. All other trademarks are the property of their respective owners. Table of Contents Table of Contents ..................................................................................................... i Table of Figures...................................................................................................... vi List of Tables ........................................................................................................ viii Foreword ............................................................................................................... ix Introduction ............................................................................................................ x Module 1 – Cybersecurity Foundation ................................................................ 1 1.1 Cybersecurity Landscape .................................................................................................. 1 1.1.1 Modern computing trends ........................................................................................ 2 1.1.2 New
    [Show full text]
  • How Healthcare Data Privacy Is Almost Dead … and What Can
    HOW HEALTHCARE DATA PRIVACY IS ALMOST DEAD … AND WHAT CAN BE DONE TO REVIVE IT! OTHER INFORMATION SECURITY BOOKS FROM AUERBACH A Guide to the National Initiative for Mastering the Five Tiers of Audit Competency: Cybersecurity Education (NICE) The Essence of Effective Auditing Cybersecurity Workforce Framework (2.0) Ann Butera • ISBN 978-1-4987-3849-1 Dan Shoemaker, Anne Kohnke, and Ken Sigler Network and Data Security for Non-Engineers ISBN 978-1-4987-3996-2 Frank M. Groom, Kevin Groom, and Stephan S. Jones Analyzing and Securing Social Networks ISBN 978-1-4987-6786-6 Bhavani Thuraisingham, Satyen Abrol, Raymond Operational Assessment of IT Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, Steve Katzman • ISBN 978-1-4987-3768-5 and Latifur Khan ISBN 978-1-4822-4327-7 Practical Cloud Security: A Cross-Industry View Anti-Spam Techniques Based on Artificial Melvin B. Greer, Jr. and Kevin L. Jackson Immune System ISBN 978-1-4987-2943-7 Ying Tan • ISBN 978-1-4987-2518-7 Securing an IT Organization through Corporate Defense and the Value Preservation Governance, Risk Management, and Audit Imperative: Bulletproof Your Corporate Ken E. Sigler and James L. Rainey, III Defense Program ISBN 978-1-4987-3731-9 Sean Lyons • ISBN 978-1-4987-4228-3 Securing Cyber-Physical Systems Cyber Security for Industrial Control Systems: Edited by Al-Sakib Khan Pathan From the Viewpoint of Close-Loop ISBN 978-1-4987-0098-6 Peng Cheng, Heng Zhang, and Jiming Chen ISBN 978-1-4987-3473-8 Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Electronically Stored Information: Implementations The Complete Guide to Management, Edited by Fei Hu • ISBN 978-1-4987-2318-3 Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition Security without Obscurity: A Guide to PKI David R.
    [Show full text]