Concentric In The News

Axios

The CyberWire

Other Insightful News

We've curated articles that provide keen insights on Data Security, Artificial Intelligence and related topics.  If you'd like us to keep you updated, please sign up for our blog.

Pandemic Fallout Creates Perfect Conditions For Insider Threat

Joseph Blankenship

Forrester

Organizations around the world have moved quickly to deal with COVID-19, sending users to work from home, reducing staff, and taking other cost-control actions. While these steps are necessary, they combine to create ideal conditions for insider threat.
COVID-19 Threat Alert From CERT

NSA and CISA

Both CISA and NCSC are seeing a growing use of COVID-19-related themes by malicious cyber actors. At the same time, the surge in teleworking has increased the use of potentially vulnerable services, such as virtual private networks (VPNs), amplifying the threat to individuals and organizations.
Pandemic Fallout Creates Perfect Conditions for Insider Threat

Joseph Blankenship

Forrester

Organizations around the world have moved quickly to deal with COVID-19, sending users to work from home, reducing staff, and taking other cost-control actions. While these steps are necessary, they combine to create ideal conditions for insider threat.
What's new in the Army's data strategy? Security

Andrew Eversden

Fifthdomain.com

The U.S. Army's forthcoming data strategy will be declarative about security. According to Lt. Gen. Bruce Crawford, the Army's chief information officer, the previous approach from 2016 was less informative about the significance of data security. He says, "If you don't implement the data strategy first, just think about what we're going to be moving into the cloud. Probably not the right things."
Data Security in Cloud Computing: Who's in Charge?

Arawan Gajajiva

Matillion

The real question for businesses isn't, "How secure is my data in the cloud?", but rather, "Am I using the cloud securely?". Majority of cloud providers have cloud security solutions and measures to help safeguard enterprise cloud data. But knowing what security measures your business needs and the steps you need to follow to keep your business data secure ultimately still falls with you.
Data Hackers "Have the Advantage" as the World Scrambles to Stop Them

Lauren Rublin

Barrons.com

"Attackers have the advantage," says Katheryn Rosen, a senior research scholar at Columbia University's School of International and Public Affairs. According to Katheryn, this problem will only worsen as the looming rollout of the Industrial Internet of Things, or digitally connected factories and supply chains will create "a vast open surface area where hackers can find an easy entry."
FBI Official Says Cyber Crime Reports Quadrupled during COVID-19 Pandemic

Water ISAC

Speaking in an online panel last week, FBI Deputy Assistant Director Tonya Ugoretz said the number of cyber crime reports received by the FBI’s Internet Crime Complaint Center (IC3) has quadrupled compared to months before the pandemic.
Work from home, phase 2: What comes next for security?

Jon Oltsik

CSO Online

Phase 1 was all about employee access, network communications confidentiality/integrity, and basic endpoint security. The next phases will move quickly from risk assessment to mitigation.
The Importance of Training: Cybersecurity Awareness like a Human Firewall

Remesh Ramachandran

Entrepreneur.com

The epidemic of cybersecurity threats is so apparent that an enterprise cannot afford to overlook the significance of employee training for threats and cybersecurity best practices. Remesh Ramachandran discusses the importance of the preparedness of an enterprise or its employees against highly skilled hackers, criminals that aim to steal its data.
Momentum Cyber + Optiv Security: 2019 Security Technology Spend Insights Report

Dino Boukouris

LinkedIn Pulse

What are the areas to watch when it comes to spending on security technology? Dino Boukouris dives deep to find out key focus areas and investment priorities of Cybersecurity teams across the globe. Discover the top five technology spending trends and technology areas to watch with insights on the change in spending, key drivers of change, strategic activity, and a future outlook.
Protecting data in an increasingly insecure world

Myles Suer

CIO

Should CIOs be focused on creating better fortresses? Or securing data and whom can access it? Myles Suer takes a holistic view into Data Security in an increasingly distributed, cloud enabled world. He closes it out with a list of 10 things that should immediately make the CIOs investment list for data protection.
Three ways security is compromised on the cloud

Kelsey Reichmann

Fifthdomain.com

Cloud data sharing and storage services are expanding rapidly; cloud security, however, is not improving at the same pace. This article features Symantec's Cloud Security Threat Report (CSTR), released June 24, which finds that while 53 percent of respondents reported workloads moving to cloud applications, 54 percent said their security practices have not kept up at the same rate.