Cyber Defense Advisors

Month: November 2022

#IRISSCON: Cyber Professionals Now Tasked with Securing Society, Says Mikko Hyppönen

Mikko Hyppönen discusses how cyber-threats will become even more dangerous as reliance on connectivity grows

Cyber News, Cyber Threat Trends
  • by
  • November 10, 2022

Creating a Role for an EC2 Instance with CloudFormation

ACM.107 Using an IAM Role Profile with an EC2 Instance for short-term rotating credentials This is a continuation of my series on Automating Cybersecurity Metrics. In the last post we created a VPC endpoint for CloudFormation so we can access the AWS service from a private network. The post also showed you when you might […]

Cyber News, Cyber Threat Trends
  • by
  • November 10, 2022

PCI DSS 4.0 is coming: how to prepare for the looming changes to credit card payment rules

For enterprises that handle credit card data, which means just about every consumer-facing company, payment processing is a mission-critical system that requires the highest levels of security. The volume of transactions conducted with general purpose credit cards (American Express, Discover, Mastercard, Visa, UnionPay in China, and JCB in Japan) totaled $581 billion in 2021, up […]

Cyber News, Cyber Threat Trends
  • by
  • November 10, 2022

REPEAT AND REFINE: HOW DO YOU GET TO CARNEGIE HALL? (Pt. 6 of “Why Don’t You Go Dox Yourself?”)

Welcome back! In our last article, you cleared out your extraneous digital footprints by removing unnecessary accounts and opting-out of data broker services, and have finished a dedicated review of your online history. In this final section, we will answer the natural question encountered at the end of any journey: What’s next?  Before becoming the […]

Cyber News, Cyber Threat Trends
  • by
  • November 10, 2022

Citrix Issues Patches for Critical Flaw Affecting ADC and Gateway Products

Citrix has released security updates to address a critical authentication bypass flaw in the application delivery controller (ADC) and Gateway that could be exploited to take control of affected systems. Successful exploitation of the issues could enable an adversary to gain authorized access, perform remote desktop takeover, and even circumvent defenses against login brute-force attempts under

Cyber News, Cyber Threat Trends

Some 98% of Global Firms Suffer Supply Chain Breach in 2021

Two-fifths still trust suppliers to handle their own security

Cyber News, Cyber Threat Trends

The pros and cons of the digital transformation in banking

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Digital transformation in banking began following the creation of the internet in the 1990s as a way for banks to deliver services to […]

Cyber News, Cyber Threat Trends
  • by
  • November 10, 2022

Re-Focusing Cyber Insurance with Security Validation

The rise in the costs of data breaches, ransomware, and other cyber attacks leads to rising cyber insurance premiums and more limited cyber insurance coverage. This cyber insurance situation increases risks for organizations struggling to find coverage or facing steep increases. Some Akin Gump Strauss Hauer & Feld LLP’s law firm clients, for example, reported a three-fold […]

Cyber News, Cyber Threat Trends

Couple Get 40 Years for Navy Espionage Plot

Duo tried to sell secrets of nuclear propulsion

Cyber News, Cyber Threat Trends