Buy the ARP T-Shirt! BIOS Optimization Guide Money Savers!
 

 21 August 2015
 N/A
  N/A
 Events
 Dr. Adrian Wong
 1.0
 Discuss here !
 2576
 
   
Desktop Graphics Card Comparison Guide Rev. 33.0
Covering 628 desktop graphics cards, this comprehensive comparison allows you ... Read here
BIOS Option Of The Week - Virtualization Technology
Since 1999, we have been developing the BIOS Optimization Guide, affectionately known... Read here
   
Buy The BOG Book Subscribe To The BOG! Latest Money Savers!
Cybersecurity Today With Rik Ferguson @ CLOUDSEC 2015
Digg! Reddit!Add to Reddit | Bookmark this article:

Cybersecurity Today With Rik Ferguson @ CLOUDSEC 2015

On the 20th of August 2015, we were invited by Trend Micro to a special media briefing on cybersecurity, as part of the CLOUDSEC 2015 event here in Kuala Lumpur, Malaysia.

Trend Micro's Vice President of Security Research, Rik Ferguson was the man of the hour, giving us an incredibly fascinating explanation of how hackers attack companies with targeted cyber attacks. We will share that video with you, including his thoughts on the recent Ashley Madison hack, and ransomware.

Cybersecurity Today With Rik Ferguson @ CLOUDSEC 2015

Check them out below and learn from this 20+ year veteran of the cybersecurity industry. We certainly did!

Sony warns against upgrading to Windows 10

If you like this article, please share it! ->

 

Rik Ferguson On Targeted Cyber Attacks

In this video, Rik Ferguson explains how hackers gain access to confidential data through targeted cyber attacks. He points out that just because a company is compliant with security protocols does not mean that it is secure against attacks.

The Lord of the Rings fans will enjoy the part where he pointed out that J.R.R. Tolkien was way ahead of his time when it comes to security architecture. His design for Minas Tirith was a great model to follow in network security, being designed with the assumption that its defences will fail.

Hence, it was designed to not only frustrate an attacker, but also to make it difficult for the attacker to get out after he has penetrated its defences. Adopting such a model in cybersecurity could mean the difference between a hacker just penetrating your defenses, and a hacker penetrating your defenses and getting away with your data.

How to stop Windows 10 from automatically rebooting itself

If you like this article, please share it! ->

 

Rik Ferguson On The Ashley Madison Hack

We asked Rik Ferguson what he thought about the Ashley Madison hack that resulted in the theft of over 10 GB of compressed data. That data included not only user names and hashed passwords for 33 million accounts, but also their associated credit card data (partial) including first and last names, street names and phone numbers as well as email addresses.

Rik then suggested several things Ashley Madison could have done to detect the hack earlier, as well as prevent all that data from being stolen. As he pointed out earlier, just because Ashley Madison complied with industry cyber security standards does not mean they are adequately protected against cyber attacks.

The Samsung Gear VR Innovator Edition experience

If you like this article, please share it! ->

 

Rik Ferguson On Ransomware

Our last cybercrime subject was on ransomware. Interestingly, he revealed that the first ransomware was created in 1988, and delivered to its victims using 5.25" floppy disks! Its creator, Dr. Joseph Popp was arrested for this crime but was let off because he was declared "mentally unfit to stand trial".

Rik then talked about the Reveton ransonware trojan, and how Trend Micro helped law enforcement agencies track down one of the two key guys who created it. He also pointed out how ransomware can be sold as a service, like the Tox ransomware, where the the ransomware creator rents out the ransomware in return for a cut of the ransom payment.

He also points out how ransomware is likely to be used against Internet of Things (IoT) devices. Finally, he had some advice on what we can do to prevent our data from being held hostage by ransomware.

Are you ready for Windows 10?

If you like this article, please share it! ->

 

Expect the Unexpected at CLOUDSEC 2015

Kuala Lumpur, August 20, 2015 – CLOUDSEC, the leading internet security conferences in Asia Pacific and Europe, kicks off its fifth annual edition this year with the theme “Expect the Unexpected”.

The massive cyberattacks of 2014-2015 have revealed the weaknesses of many corporate networks and the shortcomings of corporate IT strategy in overcoming advanced threats and targeted attacks. Organisations need better strategies and solutions to overcome the unexpected security challenges that will come tomorrow. As the leading internet security event in Asia Pacific and Europe, CLOUDSEC 2015 promises to address the questions and issues that are most pervasive in the startling nature of cyberattacks today. Through discussions and shared learnings, CLOUDSEC 2015 aims to help corporations better protect themselves with better strategies and solutions to overcome the unexpected security challenges to come.

Hosted by Trend Micro Incorporated (TYO: 4704; TSE: 4704), CLOUDSEC 2015 will discuss new threats that companies should be vigilant about and countermeasures from around the world today. CLOUDSEC’s attendees will also get to hear world-class keynotes from experts’ about security solutions which can be implemented today in order to fully leverage the benefits when protecting their data.

Highlights

At CLOUDSEC 2015, attendees will join in the discussion around today’s security landscape which requires a different mindset from yesteryear. With cyberattacks increasing in frequency and intensity, organizations need to accept that they will not be able to keep threats out forever. Addressing the inevitability of being breached, the conference will look at the shifts in mindset that organizations must take and how companies must rethink their IT organizational strategy, as well as finding the right person to plan that strategy. The sessions – consisting of keynote presentations, keynote panels, breakout tracks, workshops and tutorials – will feature global and regional experts in the areas of advanced persistent threats, big data security, cybercrime and forensics, cloud security, data privacy and protection, Internet of Everything, and virtualization and software defined security.

Key Speakers:

  • Rik Ferguson, Vice President, Security Research, Trend Micro, will present a key note for CLOUDSEC 2015
  • Dhanya Thakkar, Managing Director, Asia Pacific, Trend Micro, will present a key note on how cybercrime networks work and operate
  • Norhizam Abdul Kadir, Vice President Infotech Division, Multimedia Development Corporation (MDeC) will present a keynote on the state of cloud computing in Malaysia

“Cyberattacks are increasingly rampant and it is vital for organizations to prepare for the unexpected threats and upgrade their security strategies to address new digital challenges better,” said Goh Chee Hoh, Managing Director of Malaysia, Trend Micro Inc. “Data is precious and that is what cyberattackers aim for as they craft different attack methods. This makes a conference platform like CLOUDSEC valuable, as it collates the expertise of the industry’s leaders and delivers it through interesting presentations and discussions, to help attendees understand and respond to the latest cybersecurity issues and challenges better.”

CLOUDSEC 2015 was held in Kuala Lumpur on 20 August 2015 in addition to seven other major cities across the world – Singapore, Hong Kong, Taipei, Bangkok, Mumbai, Seoul, and London.

The ASUS ZenPad 7.0 Sneak Peek

If you like this article, please share it! ->

 

Support Tech ARP!

If you like our work, you can help support out work by visiting our sponsors, participate in the Tech ARP Forums, or even donate to our fund. Any help you can render is greatly appreciated!

Support us by buying from Amazon.com!

Grab a FREE 30-day trial of Amazon Prime for free shipping, instant access to 40,000 movies and TV episodes and the Kindle Owners' Lending Library!

 

Questions & Comments

If you have a question or comment on this editorial, please feel free to post them here!

Date

Revision

Revision History

18-08-2015

1.0

Initial Release.





 
   
Kingston DataTraveler Elite 3.0 USB 3.0 Flash Drive Review Rev. 2.0
The 3 TB Hard Disk Drive Installation Guide Rev. 1.1
Galaxy GeForce GTX 260+ OC Graphics Card Review
x264 Benchmark
Intel's Desktop CPU Roadmap @ October, 2008 Rev. 2.0
DFI LANParty UT NF4 SLI-DR nForce 4 SLI Motherboard Review
Seagate 5GB Pocket Hard Drive Review Rev. 2.0
Emergency Spyware Guide
Cooler Master Praetorian PAC-T01 Tower Chassis Review
Nikon AF-S VR Zoom-Nikkor 24-120mm f/3.5-5.6G IF-ED Lens Review Rev. 1.1

 


Copyright © Tech ARP.com. All rights reserved.