New CIRA data finds cyber crime is driving customers away from impacted Canadian businesses


Reports of reputational damage to organizations due to cyber attacks have quadrupled since 2018 October 01, 2024 08:00 ET| Source: Canadian Internet Registration Authority (CIRA)Follow OTTAWA, Ontario, Oct. 01, 2024 (GLOBE NEWSWIRE) — Trust is hard-earned and easily lost; a lesson many Canadian organizations learned the hard way this year as cyber attacks impacted their businesses. Forty-four per cent of organizations reported experiencing a cyber attack in the last 12 months and more than a quarter of the 500 cybersecurity professionals surveyed, said that it had hurt their organization’s reputation (28 per cent) and cost them customers (26 per cent). The … Continue reading New CIRA data finds cyber crime is driving customers away from impacted Canadian businesses

North Korean Activity in the Casino and Gaming Sector: How Do Jurisdictions Respond?


Allison Owen and Chandana Seshadri 3 September 2024Long Read RUSI. READ FULL REPORT(PDF 687KB) https://static.rusi.org/north-korean-activity-in-casino-gaming-industry_0.pdf This paper outlines proliferation finance activity tied to the casino and gaming sector, as well as the emergence of new avenues of exploitation that authorities should analyse as part of their national risk assessment process. Criminal actors exploit under-regulated aspects of the casino and gaming sector to launder and move illicit assets across jurisdictions. This threat is further compounded by the reported involvement of cryptocurrency as a means to move and obfuscate criminal assets. As a result of this shift in design, a new global illicit marketplace has emerged … Continue reading North Korean Activity in the Casino and Gaming Sector: How Do Jurisdictions Respond?

Digital Operational Resilience Act (EU)


The Digital Operational Resilience Act (DORA) (Regulation 2023/2554) establishes a comprehensive framework on digital operational resilience for EU financial entities. While all financial sector entities will be subject to DORA, ICT third-party providers who provide ICT services to financial entities and are identified as critical (critical third-party providers – CTPPs), will be subject to an EU oversight framework. The DORA oversight framework assigns to the three European Supervisory Authorities – ESAs (i.e. European Banking Authority – EBA , European Securities and Markets Authority – ESMA, European Insurance and Occupational Pension Authority – EIOPA) the role of Lead Overseer, to ensure … Continue reading Digital Operational Resilience Act (EU)

Minimizing Your Company’s Attack Surface Is Key to Cyber Protection


Enterprise network security is evolving from traditional models to zero trust architectures, impacting operational efficiency and cyber resilience. By Rob Sloan, Vice President of Cybersecurity Advocacy, Zscaler Businesses face growing risks from rapidly expanding digital footprints that increase the likelihood of cyberattacks. The fix requires a strategic shift away from legacy technologies to a zero trust solution that eliminates attack surface and brings additional benefits beyond data security. A company’s attack surface is every point where an unauthorized person could potentially access a system. It includes websites, firewalls and VPNs, cloud-based applications, email, every internet-facing application, every employee device, weak … Continue reading Minimizing Your Company’s Attack Surface Is Key to Cyber Protection

August Cole is an author exploring the future of conflict through fiction and other forms of “FICINT” storytelling.


L His talks, short stories, and workshops have taken him from speaking at the Nobel Institute in Oslo to presenting at SXSW Interactive to tackling the “Dirty Name” obstacle at Fort Benning. With Peter W. Singer, he is the co-author of the best-seller “Ghost Fleet: A Novel of the Next World War” (2015) and “Burn In: A Novel of the Real Robot Revolution” (2020). He is a non-resident fellow at the Brute Krulak Center for Innovation and Creativity at Marine Corps University and a non-resident senior fellow at the Brent Scowcroft Center on Strategy and Securityat the Atlantic Council; he directed … Continue reading August Cole is an author exploring the future of conflict through fiction and other forms of “FICINT” storytelling.

Pinduoduo – One of China’s most popular apps has the ability to spy on its users, say experts – CNN


– presence of malware is on the Pinduoduo app that exploited vulnerabilities in Android operating systems. It is one of China’s most popular shopping apps, selling clothing, groceries and just about everything else under the sun to more than 750 million users a month. But according to cybersecurity researchers, it can also bypass users’ cell phone security to monitor activities on other apps, check notifications, read private messages and change settings. And once installed, it’s tough to remove. While many apps collect vast troves of user data, sometimes without explicit consent, experts say e-commerce giant Pinduoduo has taken violations of … Continue reading Pinduoduo – One of China’s most popular apps has the ability to spy on its users, say experts – CNN