Network Security News Weekly | June 18, 2018 | Ingalls Information Security
Scroll To Top

Network Security News Weekly - June 18, 2018
June 18, 2018

Current cybersecurity news to keep you informed.
IT Services | Government | Financial | Healthcare | Non-Profit

Articles of interest from the past week:

Building a Strong, Intentional and Sustainable Security Culture
Security awareness and security behavior are not the same thing. Your security awareness program shouldn’t focus only on information delivery. By understanding these four attributes of organizational culture, security leaders and corporate leaders can make informed choices when trying to change cultures and improve an organization’s overall defense. (By: , Infosec Island)

How to Use the NIST Cybersecurity Framework
The threat landscape has evolved, the attack surface has mutated, and everywhere you look the cybersecurity skills shortage leaves more to do than there are people to do it. One way to push back on these pressures is to adopt a cybersecurity framework (CSF). Putting the NIST CSF in place can be stressful - it's easy to fear what we don't understand. But with careful, deliberate, and specific actions, implementing this cybersecurity framework can mean success. (By: , Bank Info Security)

Five network security deficiencies endangering your corporate data
Today’s cyber-attacks are becoming more sophisticated than ever before and new variations of both known and unknown threats are being discovered at an alarming rate. Striking the right balance between security and convenience is not an easy task, but key to ensuring policies are adhered to. A comprehensive network security infrastructure should look to policy-based automation in order to reduce complexity, increase visibility and free up resources to focus on more complex tasks. (By: , IT Pro Portal)

Ready For More Secure Authentication? Try These Password Alternatives And Enhancements
Password-only protection is permanently broken, and any organization relying on it is placing its business and reputation at risk. Alternatives like two-factor authentication (2FA), multifactor authentication (MFA), behavioral analytics, and biometrics have been available for some time, but adoption rates are low. The growing threat landscape and consumer awareness is lowering barriers to implementing these options — those barriers being, primarily, user resistance, complexity and ROI. (By: , IT News)

Cisco fixes critical bug that exposed networks to hackers
A "critical"-rated bug in one of Cisco's network access management devices could have allowed hackers to remotely break into corporate networks. The bug was found in Cisco's Secure Access Control System (ACS), which system administrators use to authenticate users across a network. Although the vulnerability had a 9.8 out of 10 score on the common vulnerability severity rating, details remained scarce. Even without Active Directory integration, an attacker can still control connected routers and firewalls to intercept and modify traffic on the network -- or even gain access to closed-off sensitive areas of the network. (By: , Zero Day)

Shape up US businesses: GDPR will be coming stateside
Despite the significant financial penalties, US consumers have tended to look away or forgive brands in the aftermath of a breach, but recent research shows that this is no longer the case. European consumers have long been preoccupied by privacy which leaves us wondering why the US hasn’t yet followed suit and why it took so long for consumers to show appropriate concern? With the EU passing GDPR to address data security, will we see the US implement similar laws to address increased consumer anxiety? (By: , Help Net Security)

The harsh realities of endpoint management
A global survey, which polled 1,000 IT professionals across North America and Europe found that while 88 percent of IT respondents acknowledge the importance of endpoint management, nearly one third don’t know how many endpoints they manage. Despite understanding the security risks associated with managing multiple devices, IT professionals could be doing much more to manage and protect all endpoints from cyber-attacks. (By: , Help Net Security)

< BACK


Contact Us

If you are concerned about a potential breach or if you are currently experiencing a breach and require immediate assistance, contact our 24x7x365 Emergency Hotline:

Or fill out our contact form:

CONTACT US >


Our Goal

We are committed to preventing and responding to data security breaches. We have the most dedicated and qualified analysts in the cyber industry and can identify areas that you should focus on to enhance your level of security and awareness.


Sign Up For Netsec News Weekly

Ingalls Information Security