Welcome
Welcome
Hello and Welcome!
We hope that your Summer is going fantastic!
Also join our new ISC2CT Discord Server
Upcoming events:
Zero Trust Meet & Expo Stamford August 26 – 27, 2024 | Stamford, CT
Security Week Attack Surface Management Summit September 18, 2024 | Virtual Event & Free
Upcoming Training:
Certified Zero Trust Practitioner (CZTP). This program offers a deep dive into Zero Trust principles and technical components, preparing participants to effectively design, implement, and manage ZT solutions. You'll learn to assess organizational risk, ensure regulation compliance, and develop incident response strategies within a Zero Trust framework. Enhance your cybersecurity posture with proactive, risk-based security measures. August 5-7, 2024 1:00 pm – 5:00 pm GMT 12 hours of CPE Credits
Be sure to attend our meetings. Lots of good information there. Register for our August 2024 meeting on our site ISC2CT.org
We are very happy to report Andrew Allen, a resident of Bridgeport and rising Sophomore at Albertus Magnus passed his ISC2 Certified in Cyber (CC) exam in May. Andrew is a student member of ISC2 Southern CT Chapter, and learned about the new CC program during one of the monthly meetings he attends during the school year. Andrew prepped through self study, and is the first Albertus student to obtain CC. He intends to help other Albertus students earn their own CC.
Thank you to our Sponsors
Quinnipiac University is committed to helping advance the field of cybersecurity through its School of Computing & Engineering. To support the growth of professionals within cybersecurity and computing, Quinnipiac offers flexible online and on-campus opportunities that deliver practical skills you can immediately apply on the job. Both its MS in Cybersecurity and MS in Computer Science programs feature hands-on experience in lab settings that simulate real-world scenarios. To learn more about these exciting opportunities, visit Quinnipiac University
Cyber News
The CrowdStrike Meltdown: A Wake-up Call for Cybersecurity
The incident serves as a stark reminder of the fragility of our digital infrastructure. By adopting a diversified, resilient approach to cybersecurity, we can mitigate the risks and build a more secure digital future.
Cyber firm KnowBe4 hired a fake IT worker from North Korea
The security awareness training company said in a blog post that the software engineer used stolen U.S. credentials and an AI-enhanced photo.
Nearly 10 Billion Passwords Leaked in Biggest Compilation of All Time RockYou 2024
Nearly 10 billion passwords have been leaked on a popular hacking forum, according to Cybernews.
Senate passes the Kids Online Safety Act
The Senate passed the Kids Online Safety Act (KOSA) and the Children and Teens' Online Privacy Protection Act (also known as COPPA 2.0), the first major internet bills meant to protect children to reach that milestone in two decades. A legislative vehicle that included both KOSA and COPPA 2.0 passed 91-3. Parent advocates played a major role in passing the bill.
Ransomware Gangs Exploit ESXi Bug for Instant, Mass Encryption of VMs
With sufficient privileges in Active Directory, attackers only have to create an "ESX Admins" group in the targeted domain and add a user to it.
How to Fix a Dysfunctional Security Culture
Steps organizations can take steps to fix a dysfunctional company culture—and a dysfunctional security culture.
Cloudflare reports almost 7% of internet traffic is malicious
Fortunately, there are things you can do to help protect yourself and your websites.
US businesses struggle to obtain cyber insurance, lawmakers are told
Rising premiums and restrictive policies are creating uncertainty among American businesses about whether insurance policies will cover breaches.
CISA Report Finds Most Open-Source Projects Contain Memory-Unsafe Code
Security analysts found that 52% of open-source projects are written in memory-unsafe languages like C and C++.
3,000 GitHub accounts found distributing malware
Threat actors set up fake accounts that look legitimate on the GitHub platform.
6 Types of Applications Security Testing You Must Know About
Explore six essential application security testing methods to keep your software secure and compliant.
The quantum computing threat is real. Now we need to act.
Washington should strive to become the dominant power in quantum information sciences. Otherwise, the U.S. will be dangerously at risk.