Cybersecurity Essentials

Startups & Investments

Cybersecurity is one of the hottest market for innovation and funding. These opportunities have given rise to a new ecosystem of security startups of which, some will emerge as new leaders in the years to come.

Top news of the week: 23.03.2021.

#systemicrisk
#corpgov
#cyberthreatintelligence
#threatintelligencefeeds
#iam
#identityandaccessmanagement

Innovations And Trends

@LarryVNN shared
On Mar 18, 2021
RT @ForeignAffairs: Washington needs to build a China policy that reflects the competitive core of the U.S.-Chinese relationship but also builds durable ties that can withstand the two countries’ irreconcilable interests, Evan Medeiros writes. Where should it begin? https://t.co/8dhqCGbv6B
Open
How to Craft a Durable China Strategy

How to Craft a Durable China Strategy

Biden’s inauguration provides a rare opportunity to develop a more coherent and sustainable China policy.

@comfortpaul shared
On Mar 21, 2021
RT @CanadianPacific: Today we have entered into a merger agreement with Kansas City Southern that would join two historic railroads to create the first rail network connecting the U.S., Mexico and Canada. https://t.co/irU5Kzqdjo https://t.co/P4yC1dbyLz
Open
CP & KCS: The Future for Freight

CP & KCS: The Future for Freight

Canadian Pacific Railway (TSX: CP, NYSE: CP) and Kansas City Southern (NYSE: KSU) have announced a merger agreement. Read the Press Release »

@DrInfoSec shared
On Mar 18, 2021
RT @WeldPond: It’s even possible that future window stickers on new cars may point out that a vehicle meets cybersecurity standards. “We should rate vehicles for cybersecurity, the same way we rate them for crash protection,” https://t.co/aqPMQBim8i
Open
Carmakers Strive to Stay Ahead of Hackers

Carmakers Strive to Stay Ahead of Hackers

The effects of a breach of a car, or fleet, could be devastating. Auto manufacturers and suppliers have aggressive plans, and a lot of firewalls.

@DrInfoSec shared
On Mar 17, 2021
RT @josephfcox: New: Cars collect your location via built-in sensors. Now a spy firm that has worked with special forces says it has that data; wants to sell it to U.S. military. "Provide our clients with the ability to remotely geolocate vehicles in nearly every country" https://t.co/p2RtAYa4us
Open
Cars Have Your Location. This Spy Firm Wants to Sell It to the U.S. Military

Cars Have Your Location. This Spy Firm Wants to Sell It to the U.S. Military

15 billion car locations. Nearly any country on Earth. ‘The Ulysses Group’ is pitching a powerful surveillance technology to the U.S. government.

@DrInfoSec shared
On Mar 21, 2021
RT @BobZukis: How the 4 companies behind every single credit card swipe prevent outages and thwart hackers from getting your data #systemicrisk #corpgov https://t.co/7t8hEGaenP
Open
How the 4 companies behind every single credit card swipe prevent outages and thwart hackers from getting your data

How the 4 companies behind every single credit card swipe prevent outages and thwart hackers from getting your data

In February, a small internet blip at Fiserv meant major merchants couldn't accept card payments. What would happen if there were a larger outage?

@hackernoon shared
On Mar 18, 2021
"Using Cyber Threat Intelligence Feeds to Enrich Investigations and Prioritize Security Events" by @whoisxmlapi https://t.co/MQqD0uK9Rb #threatintelligencefeeds #cyberthreatintelligence
Open
Using Cyber Threat Intelligence Feeds to Enrich Investigations and Prioritize Security Events

Using Cyber Threat Intelligence Feeds to Enrich Investigations and Prioritize Security Events

Investigations need to consider a variety of other factors and sources of information. That is where consulting various threat intelligence feeds come in.

@DrInfoSec shared
On Mar 18, 2021
RT @KimZetter: After SolarWinds/Exchange, DHS required gov agencies launch vuln discl program so public can report vulns in internet-facing gov systems. But "the hard truth is that most federal agencies do not have...resources to deal with..newly reported vulns" - @k8em0 https://t.co/0WfpMSWj9x
Open
For US cyber defense, helpful hackers are only half the battle

For US cyber defense, helpful hackers are only half the battle

Since the SolarWinds and Microsoft Exchange investigations have the federal government scrambling to deal with its aftermath, it is unclear what steps, if any, federal agencies have taken ...

@hackernoon shared
On Mar 21, 2021
"Learning The Basics Of Identity and Access Management" by @twitter.com/AntWakVideos https://t.co/AozIAAbH7H #iam #identityandaccessmanagement
Open
Learning The Basics Of Identity and Access Management

Learning The Basics Of Identity and Access Management

IAM is a collective term that covers merchandise, processes, and policies for managing user identities and regulating user access in the company.