Breaking News

Mystery data breach reportedly exposes 80 million names, addresses, and income info in U.S.

Data breaches are almost always tied to a site, service, or subscription, which gives you some control over your fate: You can change your password, monitor any suspicious activity, or delete your account. But a new reported breach has seemingly exposed the personal information of some 80 million U.S. households—and no one seems to know who’s to blame.

Top 4 Women CEOs of Atlanta

There are many areas worth talking about here, including the why and manner in which women CEOs seem to be dropping out or getting overlooked in huge numbers, or we could focus on the positive part – that Atlanta, contrary to the national trend, is full of powerful female CEOs we should be hugely proud of. Gender diversity in leadership is on the up in Atlanta and we are smashing through that glass ceiling with a sledge hammer. 

With a larger leadership talent pool in our great city, we only have what to gain 

Let’s introduce you to some of our Leaders:

Must-attend Cybersecurity events of 2019

Cybersecurity is edging its way into every facet of our daily lives and we must try and get as much information, make as many connections and be at the cutting-edge of every legal, political and economic cyber security update. 

The best way to do this, is to rub shoulders with (or listen to) the top dogs in the industry, and all of them will be attending at least a few events this year.

Here are our top five cybersecurity events of 2019:

Cyber Hub Summit: Atlanta, Georgia

Hackers Trapped In VR

Hackers can easily outsmart firewalls, as we’ve seen in multiple cyber-attacks of 2018. AI was the next phase, where companies thought that if only machines would learn the environment, they would respond to threats tremendously better than humans ever could.

While several startups are developing better AI technologies, there is one outsider company that is putting firewalls down and is coming out in the open to fight hackers. 

Illusive Networks

A new Israeli startup is using VR (virtual reality) to protect against cyber threats.

Three tips to protect yourself from Malvertising

As if advertising wasn't intrusive enough, 'Malvertising' the malicious form of online advertising, used to spread malware, is on the rise.

Malware, 'malicious-software' infiltrates victims computers or wireless devices to extract or attack the data held within. Standard types of malware include: Viruses, Worms; Trojan Horses; Adware; Spyware and Ransomware among a stream of others. Malvertising, the fusion of "Malware" and "Advertising" are ads that try to do the same thing. 

The real cost of a cyber breach at your company…..Do CEOs really know?

Consider the top five most significant expenses that a business has to manage after a breach.

Remediation

In 2017 the Ponemon Institute reported it takes more than six months for an organization to find out they have had an intrusion and another 55 days to contain it. Remediation does not necessarily mean the attack has been completely stopped, either, as some attacks remain dormant and undetected.

Loss of customers

I told you Crypto wasn’t safe

This week the news of more Cryptojacking were published, the more I saw people shaming others or gloating about how unsafe, unreliable crypto currencies are. I felt a strong desire to write about this in the blog and I will talk more about it in my podcast next week. (See CyberHub Engage).

But for this blog post I want to talk about Crypto Jacking and why it’s happening as often in a product that’s supposed to be “safe”.

What’s Cryptojacking?

Penetration Testing will save Countless Lives: The Cisco Vulnerability

Embedi researchers have this week uncovered a critical vulnerability in Cisco software that left Cisco employees and researchers sleep-deprived, until it was fixed. Researchers demonstrated this susceptibility at a Hong Kong based conference after reporting it to Cisco in May 2017 in a video demonstration. The affected hardware and software includes devices that fall into the Smart Install Client type.