Cyber Resilience Protects Medical Data

BUSINESS INSURANCE | June 19, 2016

Health care organizations are becoming resilient in the face of cyber attacks as hackers attempt to access sensitive patient information.

Experts from Zurich North America and RedSeal Inc., a Sunnyvale, California-based cyber security firm, discussed how health care providers, insurers and affiliated companies can bounce back when data breaches are discovered.

The Chinese Hackers in the Back Office

NEW YORK TIMES | June 11, 2016

BELLEVILLE, Wis. — Drive past the dairy farms, cornfields and horse pastures here and you will eventually arrive at Cate Machine & Welding, a small-town business run by Gene and Lori Cate and their sons. For 46 years, the Cates have welded many things — fertilizer tanks, jet-fighter parts, cheese molds, even a farmer’s broken glasses.

And like many small businesses, they have a dusty old computer humming away in the back office. On this one, however, an unusual spy-versus-spy battle is playing out: The machine has been taken over by Chinese hackers.

The hackers use it to plan and stage attacks. But unbeknown to them, a Silicon Valley start-up is tracking them here, in real time, watching their every move and, in some cases, blocking their efforts.

Has Ransomware Become the Chicken Little of the Security Industry?

SC MAGAZINE UK | June 16, 2016

That ransomware is a problem cannot be doubted. Whether the current level of media coverage, fuelled by vendor press releases, is doing more harm than good is more open to debate..

Just today SCMagazineUK.com reported how Avecto research had revealed that 30 percent of UK councils suffered at least one ransomware attack in 2015. That is big news.That Smart TVs have been infected by the Flocker ransomware maybe less so. Unless it’s your TV that is asking for cash to start working properly again of course.

Silicon Valley Has a Chance to Influence Cyber Security Policy

USA TODAY | June 16, 2016

U.S. cybersecurity policy has followed  a Jekyll-and-Hyde path lately.

In December, Congress passed a bill making it easier for U.S. software companies to hold onto their proprietary technology, to encourage them to share data on cyber threats. It was part of a new push for open cybersecurity standards to help combat rapidly-evolving threats.

In April, however, the Senate Intelligence Committee introduced a bill that would force U.S. companies to provide backdoor access to encrypted data to law enforcement in response to a warrant.

Potential Ramifications of the DNC Hack

POLITICO | June 15, 2016

AFTER THE DNC ATTACK — The blockbuster news that Russians reportedly hacked the Democratic National Committee to get opposition research on Donald Trump and other information inflamed GOP criticism of Hillary Clinton’s private email server. But it had a host of security ramifications, not just political ones. MC spoke to, or heard from, a range of experts on the meaning of it all.

Make Cybersecurity an Essential Part of M&A Due Diligence

INSTITUTIONAL INVESTOR | June 2, 2016

2015 was certainly a bumper year for M&As.  It’s a sure bet that before any of the 2015 M&A deals went through, the buyers looked very carefully at their “target” companies. They will have gone through a comprehensive appraisal and due diligence process that lasted from a few months to a year.

Buyers and their agents (auditors, lawyers and bankers) will have had a pretty exhaustive evaluation checklist – review software licenses, audit financials, inspect buildings, count inventory, validate the value of intangible assets, look at intellectual property, and — the step that’s caused about half of my companies some heartburn — determine if all the shareholders can be contacted and notified. As an investor, I have pretty extensive experience in this process, having been involved in some 34 acquisitions; and one all too common oversight that I am resolute in ensuring makes it to the checklist is cyber security.

How Do We Win the Cyberwar?

HARVARD BUSINESS SCHOOL ALUMNI | June 1, 2016

We’re losing the war against hackers, and it’s costing business billions. Alumni cybersecurity experts tell us how we can turn the tide

Your credit card has already been stolen. You just don’t know it yet.

Thomas knows it, though. (A 12-year IT security veteran, Thomas requested anonymity to protect the reputation of his employers, which have included Fortune 100 companies and several of New England’s biggest tech firms.) In the analogy of cyberdefense as a castle—a favorite of his—he tends to the moats, the walls, and the gates. Get past those, and he deploys the dogs. And he’s watched many people scale walls, break gates, evade dogs, and leave with your AmEx number.

RedSeal’s Rothrock: Cybersecurity must evolve, focus on resiliency to combat future threats

GOVERNMENT SECURITY NEWS | May 13, 2016

An ounce of prevention is worth a pound of cure. That’s a saying attributed to Ben Franklin.
But it’s a strategy that’s not working for cybersecurity, according to the CEO of a leading IT analytics company.

6 Steps to Increase Cybersecurity in the Age of Innocence

SIGNAL | May 10, 2016

Let’s face it—we have a lot to learn about cybersecurity. For weeks, the FBI and Apple squared off in an epic and public battle over encryption—the Holy Grail for cybersecurity warriors.

Key US Infrastructure Is Under Major Threat From Cyber Attacks

THE DAILY CALLER | April 22, 2016

One of the National Security Agency’s (NSA) highest ranking officials warned Wednesday of a serious threat posed to the nation’s critical infrastructure from potential cyber threats