Weekly News Roundup July 19-24, 2020


Posted on by Kacy Zurkus

We did it! Last week we delivered our first virtual event, and RSA Conference 2020 APJ was a great success. Staying true to our promise to deliver ongoing educational content to our community, we didn’t rest after we wrapped up. This week we hosted multiple guests in two different webcasts on www.rsaconference.com. In a panel moderated by RSA Conference Program Committee member Ed Moyle, several experts discussed the security challenges of high velocity code release. Additionally, Jim Manico shared insights into Access Control Best Practices. Secure coding seems to have been a theme this week as Anshul Garg, Security Intelligence contributor, authored a piece on leveraging open source, arguing that when vendors and organizations share methodologies, they can, “identify and fix problems much faster than could be done in-house.”

Industry experts continue to investigate last week’s Twitter hack, and Krebs on Security reported, “new information suggests that at least two of [the young men who claim to be involved] operated a service that resold access to Twitter employees for the purposes of modifying or seizing control of prized Twitter profiles.”

As we come to the close of another work week, though, it’s likely that some of you are feeling frustrated by not being able to sync your Garmin device with the Garmin app. According to multiple reports, the service outage could be the result of a ransomware attack, which should come as no surprise as ransomware and IoT attacks are on the rise.

Let’s take a look at what else made cybersecurity headlines this week.

July 24: While many organizations and industries struggle to recover losses resulting from the global pandemic’s impact on the economy, a new report from Canalys suggests, “Cybersecurity spending will grow by 5.6% year-on-year in 2020 … [and] the entire cybersecurity market will likely grow by 2.5% this year.”

July 23: MIT Sloan Management Review reported, “Organizations have rapidly shifted to semi-remote working arrangements and thus they must be equally speedy in mitigating the cyber risks created by the expanded ‘attack surfaces’ that have accompanied the ‘work anywhere’ operating models.”

July 23: Bloomberg Businessweek turned to Norsk Hydro ASA in order to understand how organizations can recover from a ransomware attack without giving in to the attacker’s ransom demands.

July 23: Land Line reported, “Industry and academic research into a selection of self-certified electronic logging devices found those in the sample did little to nothing to follow cybersecurity best practices and were vulnerable to compromise.”

July 22: The Cybersecurity and Infrastructure Security Agency (CISA) has intensified its mission to strengthen the cyber defenses within the health care sector and health care infrastructure.

July 21: After hitting Telecom Argentina, one of the country’s largest telecom companies, with a ransomware attack on July 19, cybercriminals demanded $7.5 million in cryptocurrency in order to restore the encrypted files, WeLiveSecurity reported. Meanwhile, Chilton County, Alabama, is working to restore services and reopen after it too was the victim of a ransomware attack.

July 20: Fox Business offered small business owners five steps they should employ in order to defend against cyberthreats.

July 19: “A cyber-secure operating system developed for U.S. military communications satellites also works with the United Kingdom’s Skynet satellites, the U.S. Space Force said in a news release July 17,” SpaceNews reported.


Contributors
Kacy Zurkus

Senior Content Manager, RSA Conference

Hackers & Threats

hackers & threats mobile security risk management security architecture

Blogs posted to the RSAConference.com website are intended for educational purposes only and do not replace independent professional judgment. Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA Conference™, or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.


Share With Your Community

Related Blogs