Government would provide funding to address cyber security – President

Government would provide funding to address cyber security – President

Accra, Oct. 22, GNA – President Nana Addo Dankwa Akufo-Addo on Monday assured that government would provide the funding for the critical infrastructure needed to ensure Ghana’s cyber security, to protect the people, the economy and the country’s national security. Furthermore, as part of efforts to secure Ghana’s cyber space, government, he said, was to […]

The First Critical Steps After a Cyber Attack

The First Critical Steps After a Cyber Attack

Critical Steps After a Cyber Attack As they say, prevention is better than cure. But what if prevention just wasn’t good enough? Here are the first critical steps to take after a cyber attack. This is almost four times the cost of breaches in 2015. While large retailers, banks, and federal headlines draw massive attention […]

Bawumia Launches Cyber Security Initiative

Bawumia Launches Cyber Security Initiative

Vice President Dr. Mahamudu Bawumia Government is concerned about the increasing rate of cyber crimes across the globe. Vice President Dr Mahamudu Bawumia, who made this known, expressed worry about how security breaches have gained notoriety, with the capacity to endanger global economy increasingly linked through digitalization. He reiterated government’s determination to stay ahead of […]

Your Business Has Recovered from a Cyber Attack. Now What?

Your Business Has Recovered from a Cyber Attack. Now What?

If your business has been the victim of some sort of IT security breach, you’re definitely not alone. But believe it or not, what you do next might make your company stand out. It should be obvious (especially if you’ve been working with ATB for any period of time) that if you’ve experienced a cyber […]

CimSweep: perform incident response and hunting operations remotely • Penetration Testing

CimSweep: perform incident response and hunting operations remotely • Penetration Testing

CimSweep CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows. CimSweep may also be used to engage in offensive reconnaissance without the need to drop any payload to disk. Windows Management Instrumentation has been installed and its respective service running […]

NHS Digital joins forces with IBM to beef up NHS cyber security

NHS Digital joins forces with IBM to beef up NHS cyber security

NHS Digital has entered into a three-year strategic partnership with IBM to provide a range of new and improved services to health and care organisations, it has announced. It’s hoped the partnership will enhance data security and cyber security response and provide additional defence against increasingly complex, evolving threats. The additional services will expand NHS […]

Andanar claims latest PNA gaffe a cyber attack, ploy to embarrass president – Kicker Daily News

Andanar claims latest PNA gaffe a cyber attack, ploy to embarrass president – Kicker Daily News

Image from Martin Andanar’s Facebook account He said they have already enlisted the NBI to help track down the perpetrators He also said cyber attack meant to embarrass the president MANILA, Philippines  – Communications Secretary Martin Andanar said the latest gaffe by the state-run Philippine News Agency (PNA) involving the inadvertent publication of editorial screenshots was […]

Cyber Security 101 for Drinking Water

Cyber Security 101 for Drinking Water

Cyber Security 101 for Drinking Water By Stephen A. Hubbs, PE October 5, 2018 As we move closer to another new decade in the not-so-new millennium, it seems a safe bet that virtually everyone reading this article is familiar with cyber security. By now, many readers have been personally affected by a breach in cyber […]

Importance of IP Fragmentation in Penetration Testing

Importance of IP Fragmentation in Penetration Testing

Penetration testing is an extremely important testing aspect when we consider the optimum level of security for any system pertaining to crucial importance. It can be defined as a simulation testing done to check how the system security reacts to an actual attack. As it would be evident, penetration testing is done to check the […]

Financial Impact of NotPetya Ransomware Continues to Grow

Financial Impact of NotPetya Ransomware Continues to Grow

Multiple organizations over the course of 2017 have attempted to quantify the impact of ransomeware with varying results. One of the best sources on measuring the financial impact of ransomware so far has become looking at the financial earnings of companies that have been victims of ransomware. The latest public company to reveal the impact […]