Discover and read the best of Twitter Threads about #CyberSecureMIT

Most recents (8)

For the last session of #CyberSecureMIT, we’re speaking with @JamilFarshchi, Equifax’s CISO who was brought on after its data was breached in 2017. The Equifax hack was one of the biggest thefts of sensitive personal information of all time. technologyreview.com/2020/02/10/349…
“In the security industry today, we don’t have enough data to measure risk," says Farshchi. Most organizations have a dataset of one, which is their company. #CyberSecureMIT
To build a cyber-resilient organization, he says he asks:

-What are the predominant threat factors for any organization?
-What are the core controls that help you to be able to defend and minimize a particular threat?

#CyberSecureMIT #TechReviewEvents
Read 9 tweets
Over the years, we've written about this paradox of cryptocurrency, that it's semi-anonymous and inherently transparent. This is a story @strwbilly penned in 2018. #CyberSecureMIT technologyreview.com/2018/04/19/301…
We've also written about @chainalysis's reports that followed the crypto-breadcrumbs of the WannaCry heist. #CyberSecureMIT #TechReviewEvents technologyreview.com/2020/01/24/276…
Read 7 tweets
“It’s not too early to start thinking about a counter-strategy to the dilemmas we have” - Nazli Choucri of @MITPoliSci
#CyberSecureMIT #TechReviewEvents ImageImage
Bilateral agreements and global accords can be the beginnings of an international counter-strategy to cyberattacks, says Choucri. #CyberSecureMIT #TechReviewEvents Image
Read 4 tweets
"We’ve seen a 400% increase from 2018 to 2020 in the number of ransomware incidences we have responded to," says @JohnHultquist of @FireEye . "It’s clearly overshadowing other threats right now." Image
Why? Money.

"Money is just flooding in to these actors," says @JohnHultquist. "It’s clearly very profitable."

In one incident, a ransomware attacker demanded $36 million. From March 2019 to March 2020, another actor increased their ransomware demands 180%. #CyberSecureMIT
Both @JohnHultquist and @HalvorMolland agree that serious government policy responses are needed. Otherwise, ransomware will continue to rise. #CyberSecureMIT #TechReviewEvents
Read 5 tweets
You may remember the @NorskHydroASA ransomware attack on March 19, 2019. On that day, one of the world’s largest producers of aluminum had a unique response strategy to the attack: pay no ransom and admit the breach. #CyberSecureMIT #TechReviewEvents technologyreview.com/2019/03/19/136…
At #CyberSecureMIT, we’re speaking with the company’s senior vice president, @HalvorMolland, about this response strategy, which resulted in unprecedented transparency and a distributed workstream that included forensics, communication management, and rebuilding.
.@NorskHydroASA's decision to shut down its information-systems infrastructure happened at a relatively low level, says @HalvorMolland. It was “based on risk analysis and training we had in the past. This was the right decision to take.” #CyberSecureMIT #TechReviewEvents
Read 9 tweets
Mobile phishing is a topic @HowellONeill has written about quite a bit in the last year. #CyberSecureMIT #TechReviewEvents
You might remember Twitter's massive security breach in July. The company eventually confirmed that this hack was caused by a mobile phishing attack. #CyberSecureMIT #TechReviewEvents technologyreview.com/2020/07/15/100…
Read 7 tweets
Why and how do nations hack one another? @BuchananBen is citing examples and stories from hidden archives. You can learn more about his research here. #CyberSecureMIT #TechReviewEvents amazon.com/dp/0674987551/… Image
(1/2) At the end of 2019, we spoke to @BuchananBen about his predictions for the cyber-landscape in 2020. Here's what he had to say:

“Over two decades, the international arena of digital competition has become ever more aggressive ...

#CyberSecureMIT #TechReviewEvents
(2/2) ... The United States and its allies can no longer dominate the field the way they once did. Devastating cyber attacks and data breaches animate the fierce struggle among states.” #CyberSecureMIT #TechReviewEvents technologyreview.com/2020/01/02/23/…
Read 9 tweets
For a company to successfully achieve cyber-resiliency, it needs the full muscle of its leadership teams, across C-suites, boards, and investors. Discussing the emerging and existing threats on the cyber-threat landscape is @mk_palmore. #CyberSecureMIT #TechReviewEvents Image
There are four types of adversaries out there:

-The financially-motivated adversary (they’re responsible for the vast majority of adversarial activity)
-The advanced, persistent threat (ie. nation states)
-The insider threat
-The hacktivist

#CyberSecureMIT Image
.@mk_palmore is surprised by the prevalence of ransomware because many of these adversaries rely on known vulnerabilities. #CyberSecureMIT
Read 10 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!