J2SECOPS WEEKLY NEWS: This week in the J2 CSC, Why Information Security x Cybersecurity + Cyber Resilience = Business Continuity.

Current cybersecurity response frameworks are largely inadequate in terms of rising up to meet the demands of emerging threats and cyber programs. They often find themselves developed independently of business continuity and their requirements and operated in silos which in itself is a massive risk. With the rise of increasingly sophisticated cyberattacks, that are by their very nature insidious, are capable of crippling your business and permanently destroying IT systems at a whim.

Read more: J2SECOPS WEEKLY NEWS: This week in the J2 CSC, Why Information Security x Cybersecurity + Cyber...

  • Hits: 238

J2SECOPS WEEKLY NEWS: This week in the J2 CSC, The Cloud, some of the colours of the rainbow, and my thoughts on GDPR.

As more organisations are consuming and offering services in the cloud, they are forever facing challenges by balancing customer experience and the increase of their surveillance capabilities. Enterprises are feeling the brunt of these changes. While cloud, in all its various guises, continues to shape digital strategies, how are security professionals adapting? Not just to cloud technologies, but also to the increased focus on privacy that the GDPR has brought within the overall context of a government that’s eager to increase its powers. Imagine for a moment; if you will, please indulge me on 3 major breaches and if GDPR was enforce –

Read more: J2SECOPS WEEKLY NEWS: This week in the J2 CSC, The Cloud, some of the colours of the rainbow, and...

  • Hits: 604

J2SECOPS WEEKLY NEWS: This week in the J2 CSC, Adoption of AI and automation technologies; to augment and compete.

Conceptual understanding of automation and artificial intelligence dominate with contrary views over its impacts in terms of the human condition and specifically the cybersecurity headlines in the past few months, so it’s no surprise that this will remain a major trend going forward.

I suppose, considering the divergent views, one of the areas of consensus, at least to my mind, is that there will be at the very least, a greater adoption across the security industry, and that the practice will undoubtably be more effective in reducing the impacts of future attacks.

Read more: J2SECOPS WEEKLY NEWS: This week in the J2 CSC, Adoption of AI and automation technologies; to...

  • Hits: 376

J2SECOPS WEEKLY NEWS: This week in the J2 CSC, so many data breaches and we are seeing that cryptomining is the “new” ransomware.

This has been quite a ride we have been on over the past two weeks, many, many data breaches, and many agree cryptomining is becoming the “new” ransomware. I believe the new business model will most likely be: finding all your data online through a subscription service, detecting it, and removing it. I was also really happy to be stuck indoors this past week-end, with the storms here in Cape Town, another two things I am happy to report, One: the Rain! And the second thing: I could stay indoors and catch up on much needed reading and research! A Very Happy and contented camper indeed.

And with this in mind, enjoy our roundup of stories for this week…


Want to catch-up on some reading too?


Both McAfee and Kaspersky have released research reports. Both are freely available and don't need you to surrender any details to access them. Some good stuff from the research community.
McAfee's report showcases new coin miner malware jumped a huge 1,189% in Quarter one while new ransomware attacks dropped 32%.
The decline of ransomware and rise of cryptocurrency mining is a trend that Kaspersky has also seen in its recent ransomware and malicious crypto miners in the 2016-2018 report.

McAfee Labs threats report, June 2018 | McAfee 
Ransomware and malicious crypto miners in 2016-2018 | Securelist


Top Security Concerns On The Minds Of Millennials


So do millennials have the right perspective when it comes to cybersecurity? There are clear advantages to prioritizing these outlooks, rather than spending more money on IT or worrying about the potential of a hack. Additionally, millennials seem more aware and knowledgeable about the nature of cybersecurity, and the digital risks that companies face.

The 4 Top Security Concerns On The Minds Of Millennials |  Larry Alton


A SIEM is a SIEM is a USM Right?


Most other SIEMs come with default content and correlation rules, which are useless because they aren’t aware of what data is coming from the environment. Since our product includes our intrusion detection, asset discovery, vulnerability assessment, and behavioural monitoring in one cloud platform, we can make more effective correlation rules that are applicable across our environments. We have the advantage of knowing where the data is coming from, letting us write correlation rules that will work out of the box. USM also eliminates the work of integrating and maintaining multiple point security products.

SIEM Content Engineer - Why Is It a “Thing”? | Kate Brew

  • Hits: 643
Copyright © 2018 J2 Software