Category

March 2018

Follow these Top Cybersecurity Professors on Twitter

Cybersecurity professors can have a range of expertise, from architecture, maintenance, and administration to forensic investigation of secure networked systems, a type of infrastructure (with a corresponding set of policies) increasingly necessary for safe operation of governments, businesses, nonprofits and educational institutions of all sizes. Read more…

Read article
Technology Can Be Competitive, but in Malaysia, “Cybersecurity Collaboration” is the Key

It would not be incorrect to say that 2017 caused mayhem for information security professionals. Some of the most brutal cybersecurity meltdowns affected a large number of Internet users. Although Equifax and Yahoo stole the headlines, a number of cybersecurity missteps, like Uber and Deloitte, didn’t go unnoticed.While the cybersecurity breaches left a number of…

Read article
DREAD Threat Modeling: An Introduction to Qualitative Risk Analysis

DREAD Threat Modeling: An Introduction to Qualitative Risk Analysis By 2025, the global cost of cybercrime is projected to reach an estimated $10.5 trillion (INTRUSION, Inc., 2020). With 30,000 websites hacked every day (Bulao, 2022), companies of all sizes need to prioritize cybersecurity. As the prevalence and costs of cybercrime skyrocket, organizations have developed a variety of methods to model cyberthreats and assess cybersecurity risks and vulnerabilities. One of these risk analysis methodologies is DREAD, a threat modeling framework created by Microsoft (Meier et al., 2003). Although Microsoft has since abandoned the model, citing concerns about its subjectivity (Shostack, 2008), it’s still in use today by small businesses, Fortune 500 companies, and the military. What Is the DREAD Model? The DREAD model quantitatively assesses the severity of a cyberthreat using a scaled rating system that assigns numerical values to risk categories. The DREAD model has five categories (Meier et al., 2003): Damage: Understand the potential damage a particular threat is capable of causing. Reproducibility: Identify how easy it is to replicate an attack. Exploitability: Analyze the system’s vulnerabilities to ascertain susceptibility to cyberattacks. Affected Users: Calculate ho

Read article
EC-Council Helps Promote a European Vision of Cybersecurity at 10th Edition of the Forum International of the Cybersecurity

The 10th-anniversary edition of the Forum International of the Cybersecurity (FIC) was hosted on January 23rd and 24th at the Lille Grand Palais, France, where EC-Council participated as the sponsor and official partner at the event for the 6th consecutive time. EC-Council presented its main training and certifications, showing the strength of its network by…

Read article