Tag Archive for: building

Former US Senator Kay Bailey Hutchison visits Angelo State for building renaming ceremony


SAN ANGELO, Texas — Texas native Kay Bailey Hutchison served as a United States senator for 20 years and North Atlantic Treaty Organization representative for four years. 

During her time in government, Hutchison was actively involved in cybersecurity and with recent developments in artificial intelligence, she has continued her work in this area of study. 

On April 27 at Angelo State University, Hutchison attended a ceremony for the renaming of the Center for Security Studies in her honor. 

ASU president Dr. Ronnie Hawkins Jr., San Angelo mayor Brenda Gunter and ASU faculty and staff members were all in attendance for the reveal of the Kay Bailey Hutchison Center for Cyber Intelligence, Innovation and Security Studies. 

“Having this wonderful security center here I think is going to build so much prestige for Angelo State because they are in front of the line in providing, really, the cyber security studies, the innovation,” Hutchison said. “They’re looking at new ways to prevent cyber security attacks which is new. We’ve always kind of been on defense, now we’re gonna learn more on offense.” 

Credit: Morgan McGrath



Public and private organizations, as well as personal devices such as cell phones, laptops and computers can all be equally affected by ransomware. Simply defined, ransomware happens when internet files are blocked and can only be accessed by being forced to pay a certain amount of money. 

This is one of the main issues ASU students will be trying to better understand and prevent. 

Credit: Morgan McGrath



“When you’re talking about public institutions like hospitals and school districts, banks, when a cyber attack occurs in one of those, then it can put a whole data release out and sometimes a criminal can get paid for that,” Hutchison said. 

In fact, ASU was specifically chosen to start its cybersecurity program and its findings will eventually be shared with institutions across the state. The program might also be beneficial for Goodfellow Air Force Base students who are interested in technology in the modern world. 

“I think Goodfellow and Angelo State are gonna be partners that will…

Source…

Building a Safer Website with a New Name: ClarionCounty.Gov :: exploreClarion.com


Clarion Co.CLARION, Pa. (EYT) – Improving security is a goal of a plan for Clarion County to change its Internet domain name to clarioncounty.gov from www.co.clarion.pa.us.

Along the way, some help is coming from the FBI and National Guard.

It may seem like a small change, but Clarion County Information Technology Director Chad Johnston (pictured above) told commissioners on Tuesday morning it is part of state and federal efforts to push everyone to change on a global level because they can provide a lot more security for the counties.

“We are working with partners and SISA (Forensic-driven Cybersecurity Experts & Solutions) and other collaborations to build more secure infrastructures for governments at the local and state level,” Johnston explained.

“The benefits of having a dot-gov domain is like brand awareness. It provides a piece of mind that if we send someone an e-mail that has a dot gov, they’re going to know it is coming through from a government agency.”

Johnston added that government domains often have phishing attacks and ransomware where a government or business information system can be held hostage if the IT system is locked down.

“The security of it gives us peace of mind plus anything attacking dot gov or anything that’s going to increase attacks on our current system. The FBI and all of the other governments are watching. They can watch over everybody and help improve cybersecurity and infrastructure security. We’ll get training and a lot more contacts through the FBI and National Guard.

“With all sorts of cyber-attacks, they are going to be able to send us video training and let us know what is actually out there hitting these domains, and it will help us to further understand what’s out there, as much as working with them to protect our domain and our e-mail addresses.”

The project is going to take a while and will start out small, probably first within the IT Department for the change to clarioncounty.gov, according to Johnston.

“We’re going to make it work, and then we will eventually migrate up through the county system. It’s probably going to be a six- or eight-month process because we also have to send in our registration forms for approval….

Source…

Vigilante Hacker Outsmarts Cyber Mafia [4K] | Web Warriors | Spark



Lou Fiorello on building security into the business value chain, CIOSEA News, ETCIO SEA


Lou Fiorello on building security into the business value chain

Faced with aggressive digitisation, cybersecurity teams are undergoing extra pressure to ensure they can operate at a similar speed while scaling their capacities. With these goals in mind, security leaders have embarked on enterprise-wide collaboration initiatives that transform capabilities with new cybersecurity operating models, enable technology platforms that combine many innovations and ultimately deliver greater business value.

Therefore, it’s important to decode how organisations can build optimal security infrastructures and policies within their business value chains to keep themselves highly secure and combat the ever-evolving business risks of tomorrow. To help us understand its importance, we were joined by Lou Fiorello, VP & GM – Security Business Unit, ServiceNow as a keynote speaker at the SecOps Summit 2022, where he gave us industrial insights into the same. Lou has more than twenty years of experience in building security strategies for industries. Here’s what his keynote encapsulated:

Why security and business collaboration is imperative

Log4Shell has been the most recent example of critical vulnerability and ransomware has been on the rise ever since threat actors have started developing evolved attack-tech to partake in data breaches, information compromises, and organisational thefts. This year has also seen some major geopolitical events escalate due to the cyber warfare enabled through various intelligent threats used by cybercriminals to compromise national securities. A string of supply chain attacks is also a noticeable trend in the cyber attack spectrum this year. Across the types of cyber attacks and crime, the key point that security professionals must understand here is that barely detecting these threats is not enough.

The real challenge lies in responding to these threats in an enterprise-wide fashion. Security teams may know what to do with a novel threat, but face a major chunk of the barriers in executing across the broader enterprise. There are traditionally a lot of silos between security and IT as well, driving multitudes of inefficiencies. Breaking those silos will drive greater collaboration across the enterprise and will help to achieve…

Source…