Best Cyber Security Twitter Profiles to Follow 2018

Twitter has always been a great place to stay in touch with the latest cybersecurity trends. It is a great way to join professionals and even experts that normally you wouldn’t be able to reach out. You can follow them, read their posts and comments daily and why not even tagging them in your tweets to attract their attention just in a few seconds. Twitter is an open source platform that stimulates people to share knowledge from new technologies or threats to silly pictures and memes about the latest events in the news.

However, there are thousands of profiles that you can follow, but sometimes you just don’t seem to find exactly what you are looking for. The question of which security experts to follow on Twitter is tricky since there are so many professionals out there who keep sharing valuable information and news on a daily basis. What really matters is to decide what is relevant to you and how you are going to use it as your advantage.  Once you have decided who to follow you can create your own lists per category containing the best Cyber Security Twitter profiles. This option allows you to see all of the tweets in a simple way and you will make sure that you don’t miss a single tweet from your feed.

We have created a list with some of the best Twitter CyberSecurity accounts so you don’t waste your time in searching – you can follow them right away.

Continue reading

In October 2017, German intelligence officials approached lawmakers and argued for greater legal authority to “hack back” in response to cyber attacks conducted by foreign nation states.  The head of Germany’s domestic intelligence agency specifically advocated for the right to be able to destroy data stolen from German servers and relocated to foreign servers in order to mitigate the threat of its misuse.  Additionally, the intelligence official expressed the necessity to be able to compromise foreign servers in order to bolster surveillance capabilities that would be leveraged against German cyber targets or extract specific data.  Currently, Germany’s foreign intelligence agency does not have the legal to conduct such operations, although it is reputed to have the capability to do so.

Germany, like many other nations, has been a frequent victim of advanced persistent threat (APT) activity suspected of being conducted or directed by foreign governments.  A 2017 government report by the domestic intelligence service revealed that Germany was a primary target of cyber spying operations suspected of being conducted by such foreign governments as China, Russia, and Turkey.  According to the report, industrial espionage costs German industry billions of euros each year, with small- and medium-sized businesses often the biggest losers.

Continue reading

3 non-technical positions in high demand in the cybersecurity industry

We keep hearing about the widening skills gap ravaging the Cybersecurity industry. Lack of qualified personnel is slowing its growth and affecting the security level of the customers. But most people outside the industry see these statistics and shrug. The cybersecurity industry is perceived as a very small, elitist segment of the tech market. Even to point of it being a niche industry.

Continue reading

RSAC 2017- more of the same, but some interesting trends emerge

RSAC 2017 is behind us. It has been bigger, noisier and more crowded than any cybersecurity event in history. It’s so big, it’s overwhelming. And if you consider the off-site meetings, mini-conferences, meetups and parties you can forgive an average visitor if he or she feels kind of fuzzy afterward. Vendors don’t have it easy, either. With more than 700 companies and organizations presenting, trying to stand out or simply gauge the competition is extremely difficult.

Continue reading

The Cyber Coordinator: Let the Dog Bite

Former New York Mayor Rudy Giuliani has been tapped to be the President’s new “cyber security czar.”  The appointment has been met with trepidation among those in the information security business who point out Mr. Giuliani’s lack of expertise in anything cyber-related, despite being Chair of the Cybersecurity, Privacy and Crisis Management Practice at a Miami-based law firm and advising companies on information security since 2002.  In fact, critics cite recent reporting revealing that passwords used by Giuliani and 13 other top staff members have been leaked in mass breaches of websites like LinkedIn, MySpace, and others between 2012 and 2016.

Continue reading

Israeli cybersecurity industry- looking back at 2016

Israel is a major force in cybersecurity innovation and development, and Israeli cybersecurity companies are at the forefront of technology, rubbing shoulders with global industry giants. In fact, according to CyberDB data-bank, Israel has the second largest amount of cybersecurity companies in the world, second only to the US. In terms of actual sales Israel cybersecurity exports account for anything between 5-10% of the global cybersecurity market , an amazing figure given Israel’s miniscule size and small population.

Continue reading

The Phishing Epidemic

Hello Fellow Readers,

I would like to start by thanking CyberDB, the leading databank of Cyber technologies and products for inviting me as a guest blogger on their website. Thanks CyberDB!

You are constantly bombarded by them. Every single second, minute, and hour. Yes, I am referring to phishing emails! As you may know, phishing scams have become a very big problem for organizations of all sizes. In fact, The Anti-Phishing Working Group (APWG)observed more phishing attacks in the first quarter of 2016 than in any other three-month span since it began tracking data in 2004.

Continue reading

Cybersecurity for SMBs - The next frontier?

SMBs play a critical role in national economies- as they comprise about 97% of all commercial enterprises. Until very recently SMBs did not consider themselves a prime target of cyber threats and rightly so- all the high-profile hacks were aimed at large enterprise, and it was widely assumed that cybercriminals wouldn’t bother with small stake targets. But, as the economy becomes more connected SMB are taking center stage in cyber activities as well. As SMBs are connected to both customers and larger enterprises and governmental organizations, they now become a compelling target for cybercriminals. In addition, low cost, mass production cyber weapons now make it economically feasible for cyber criminals to successfully target SMBs and even individuals. Of these, Ransomware has one of the highest return-on-investments ratio for criminals, regardless of the victim’s occupation or annual turnover.

Continue reading