{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


READ IN BROWSER

04/20/2022
linkedin facebook twitter instagram
WorkScoop
Should data brokers be able to sell information overseas about U.S. military personnel? Google Project Zero explains a big number. And the JCDC is growing. This is CyberScoop for April 20.

Brokers face pressure over military personnel data

Cybersecurity experts and at least one U.S. senator say data brokers like Axciom, LexisNexis and NielsenIQ are creating a national security threat by advertising and selling information collected on military personnel. The data for sale can include individual web searches, family members, home addresses and even real-time GPS locations, experts say. Sen. Bill Cassidy, R-La., plans to unveil legislation to make it illegal for the brokers to sell military personnel data to adversarial nations, including China and Russia. Suzanne Smalley reports.


A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.


In the realm of zero-day exploits, it's not all bad news

Researchers with Google's Project Zero — tasked with finding and disclosing previously unreported software and hardware vulnerabilities — say they tracked 58 cases of zero-day exploits in the wild in 2021, the most ever detected since the group began its work in mid-2014. It more than doubles the previous high-water mark of 28 in 2015. The good news is that the jump in numbers is likely due to more detection and disclosure, says Project Zero security researcher Maddie Stone, rather than more zero-days being exploited in the wild. The bad news? The exploits largely rely on old and known vulnerabilities, rather than novel or truly innovative or sophisticated updates. AJ Vicens has more.


JCDC adds ICS expertise

So far, experts say the Joint Cyber Defense Collaborative (JCDC) — the federal government’s public-private forum for cyberthreat information-sharing — has worked as intended, particularly when the Log4Shell bug raised alarms late last year. CISA announced Wednesday that the JCDC is now expanding beyond its core membership of large tech and cyber companies. The new additions focus on industrial control systems and operational technology (ICS/OT). The list includes prominent ICS manufacturers, as well as companies that focus on ICS cybersecurity: Bechtel, Claroty, Dragos, GE, Honeywell, Nozomi Networks, Schneider Electric, Schweitzer Engineering Laboratories, Siemens and Xylem. Read more from CISA.


CIO says Navy is overhauling how it views cyber readiness

In an effort to improve its cybersecurity posture, the Navy is moving away from the old "compliance" model to an ongoing readiness approach. The goal is to track cyber in the same way the Navy evaluates its forces and weapon systems. “Today, I would argue that the way that we do cybersecurity at the Department of Navy ... is wrong,” Chief Information Officer Aaron Weis said this week at a FedScoop event. “We view cybersecurity as a compliance problem, and it is most definitely not a compliance problem. We have about 15 years of track record to prove that that’s not a viable approach.” Mark Pomerleau has more at FedScoop.


Tweet Of The Day

Image

Do it for friends, too!


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}