Concentric In The News

Axios

Other Insightful News

We've curated articles that provide keen insights on Data Security, Artificial Intelligence and related topics.  If you'd like us to keep you updated, please sign up for our blog.

COVID-19 is shattering cyberattack records

Samantha Ann Schwartz

CIODive

Eight months since the pandemic reached the United States, malicious actors are leveraging the U.S.'s uncoordinated national response to the pandemic to craft cyberattacks.
Karthik Krishnan Weighs in on Twitter Hack

Byron V. Acohido

The Last Watchdog

Last Watchdog gathered observations from a roundtable of cybersecurity thought leaders. The hackers insinuated their way deep into Twitter’s internal system. They were able to get into a position from which they could access some 350 million Twitter accounts, including numerous accounts of the rich and famous.
Pandemic Fallout Creates Perfect Conditions For Insider Threat

Joseph Blankenship

Forrester

Organizations around the world have moved quickly to deal with COVID-19, sending users to work from home, reducing staff, and taking other cost-control actions. While these steps are necessary, they combine to create ideal conditions for insider threat.
FBI Official Says Cyber Crime Reports Quadrupled during COVID-19 Pandemic

Water ISAC

Speaking in an online panel last week, FBI Deputy Assistant Director Tonya Ugoretz said the number of cyber crime reports received by the FBI’s Internet Crime Complaint Center (IC3) has quadrupled compared to months before the pandemic.
Pandemic Fallout Creates Perfect Conditions for Insider Threat

Joseph Blankenship

Forrester

Organizations around the world have moved quickly to deal with COVID-19, sending users to work from home, reducing staff, and taking other cost-control actions. While these steps are necessary, they combine to create ideal conditions for insider threat.
What's new in the Army's data strategy? Security

Andrew Eversden

Fifthdomain.com

The U.S. Army's forthcoming data strategy will be declarative about security. According to Lt. Gen. Bruce Crawford, the Army's chief information officer, the previous approach from 2016 was less informative about the significance of data security. He says, "If you don't implement the data strategy first, just think about what we're going to be moving into the cloud. Probably not the right things."
Industry leaders , including Concentric's Madhu Shashanka argue for the need to embed ethics in AI and what entails

Byron Acohido

The Last Watchdog

Byron Acohido from Last Watchdog gathered thoughts from industry leaders on the implications of AI and societal implications. His conclusion - Those in power fully recognize how AI can be leveraged to preserve status-quo political and economic systems, with all of its built-in flaws, more or less intact. Conversely, consumer advocates and diversity experts can see how AI could be utilized to redistribute political power more equitably, and in doing so, recalibrate society – including blunting systemic racism.
The CISO Current Report, Q2 2020

YL Ventures Staff

The CISO Current

Highlighting the industry need for more accurate and effective data categorization, the report notes that "of those that cited data exfiltration as their main concern, 47% stated that it will remain so as long as remote work continues at its current scale."
Six need-to-know takeaways from the Verizon breach report

Bradley Barth

SC magazine

Bradley Barth, Senior Reporter from SCMagazine publishes his 6 essential takeways from the 2020 Verison databreach investigations report. This report analyses real world findings to publish the causes of data breaches, trends and the primary risk factors that enterprises need to concern themselves with to mitigate and prevent data loss. Bradley distils the 78 page report into 6 findings that every IT security practitioner must take away from it
Work from home, phase 2: What comes next for security?

Jon Oltsik

CSO Online

Phase 1 was all about employee access, network communications confidentiality/integrity, and basic endpoint security. The next phases will move quickly from risk assessment to mitigation.
COVID-19 Threat Alert From CERT

NSA and CISA

Both CISA and NCSC are seeing a growing use of COVID-19-related themes by malicious cyber actors. At the same time, the surge in teleworking has increased the use of potentially vulnerable services, such as virtual private networks (VPNs), amplifying the threat to individuals and organizations.
The Importance of Training: Cybersecurity Awareness like a Human Firewall

Remesh Ramachandran

Entrepreneur.com

The epidemic of cybersecurity threats is so apparent that an enterprise cannot afford to overlook the significance of employee training for threats and cybersecurity best practices. Remesh Ramachandran discusses the importance of the preparedness of an enterprise or its employees against highly skilled hackers, criminals that aim to steal its data.