The Cybersecurity 202: Senate panel says U.S. telecoms failed for decades to prevent Chinese spying

with Tonya Riley

The federal government failed for nearly two decades to properly guard against the cybersecurity risks posed by Chinese government-owned telecoms operating in the United States, a Senate report released this morning finds. 

That resulted in four of China’s largest such telecom companies being able to operate subsidiaries here with almost no oversight, according to the report from the Senate Homeland Security Committee’s investigations panel.

It might also have allowed them to help the Chinese government spy on reams of data from U.S. companies by routing their phone and Internet traffic through China, the report finds.  

The report is the latest […] Read more

Department of Homeland Security Cybersecurity: Top 10 Vulnerabilities Still Being Exploited

The Department of Homeland Security Cybersecurity and Infrastructure Security Agency (DHS CISA) recently released a list of the top 10 most commonly exploited software vulnerabilities across the last four years.

Apache Struts was the second most attacked technology on the list. Apache Struts is an open source web application framework for developing Java EE web applications. While it made headlines as the root cause within the Equifax breach, it was also tied to six other breaches that year and in years since.

*** This is a Security Bloggers Network syndicated blog from Sonatype Blog authored by April Downey. Read […] Read more

3 Questions Your Board Has About Cybersecurity

Let’s get straight to the point. The main question your board has is, “Are we secure?” As you know, that is an overly simplified and arguably unanswerable question.

No enterprise is 100% secure and, given enough adversarial effort, any organization can be breached. Instead of discussing cybersecurity as a binary objective, CISOs and CIOs can help their board members think of cyber risk as a spectrum. 

When considering this spectrum, there are three questions that your board has in mind. Your job is to help them answer:

Where are we on the cyber-risk spectrum?
Where do we want to be?
How do we get there?

1. […] Read more

Why Investing In Cybersecurity Makes Sense Right Now

It seems like new major cybersecurity breaches happen every day. While big-name victims like Adobe or Equifax tend to grab headlines, companies of every size are at increasingly high risk of an attack. 

As your business draws more and more value from its data, you start to carry larger and larger risks. With data-fueled applications projected to generate $13 trillion worth of new economic activity by 2030, companies of all sizes need to be prepared to protect themselves against what might come next. 

Despite the growing need for affordable protection, powerful cybersecurity solutions are normally reserved for the biggest businesses. With the […] Read more

Accenture: fintech, cybersecurity and how to manage risk | FinTech

What is the cybersecurity threat landscape for fintechs in 2020? Accenture’s insight provides some clarity

The pace of digital transformation across the financial landscape continues to quicken.

In such an environment the digital or cyber threat proposition evolves rapidly, making it essential to maintain the highest standards of technology and preparedness, and keep up to date with the impact of cyber trends.

According to Accenture’s 2019 Ninth Annual Cost of Cybercrime report, financial services incurred the highest cybercrime costs among all industries studied in 2018.

In this research, Accenture explains: “As industries evolve and disrupt the current environment, threats are dramatically […] Read more

Insights into Hourly Rates for United States Cybersecurity Attorneys – 2020

DUBLIN, March 26, 2020 /PRNewswire/ — The “2020 Cybersecurity Attorney Hourly Rate Report” report has been added to’s offering.

This report details the hourly rates of Law Firms representing clients in matters relating to Cybersecurity and Data Privacy Matters including Data Breach Preparedness and Response, Infrastructure Cybersecurity, Government Contracting, Health Information Privacy and Security, Communications and Information Technology, Government Relations and Advocacy, Employee Data Privacy, International Cybersecurity, Privacy and Data Protection, Consumer Data Privacy, Financial Data Privacy and litigation against companies specializing in Cybersecurity and Data Privacy services.

The Report has 2 Sections: 1) Rates by Law Firm Revenue […] Read more

2020 Cybersecurity Attorney Hourly Rate Report | Rates by Law Firm Revenue Group (AMLAW1 10, 50, 100, 101-200, 200 and Non-AMLAW) and by Individual Law Firm for 2015-2020 –

DUBLIN–(BUSINESS WIRE)–The “2020 Cybersecurity Attorney Hourly Rate Report” has been added to’s offering.

The 2020 Cybersecurity Attorney Hourly Rate Report details the hourly rates of Law Firms representing clients in matters relating to Cybersecurity and Data Privacy Matters. The report has 2 sections:

Rates by Law Firm Revenue Group (AMLAW1 10, 50, 100, 101-200, 200 and Non-AMLAW)

Rates by Individual Law Firm for 2015-2020

Cybersecurity and Data Privacy Matters covered:

Data Breach Preparedness & Response

Infrastructure Cybersecurity

Government Contracting

Health Information Privacy & Security

Communications & Information Technology

Government Relations & Advocacy

Employee Data Privacy

International Cybersecurity

Privacy & Data Protection

Consumer Data Privacy

Financial Data Privacy

Litigation Against Companies Specializing in Cybersecurity & […] Read more

Make Cybersecurity Decisions with Business Outcomes In Mind

Promoted Content

Understanding your company’s cybersecurity needs may seem a nebulous task, but Telarus’s Dominique Singer says a simple mindset shift may help make deciding a plan of action more effective in the long run.

On this episode of the Software and Electronics podcast, host Shelby Skrhak sat down with Singer, Vice President of Business Development for Cybersecurity at Telarus, to discuss how to be practical and wise when building and choosing cybersecurity solutions.

Singer helps design complex security solutions for large companies, but he also helps customers with limited budgets navigate this complex landscape. Singer said […] Read more

Dark Reading Cybersecurity Crossword Puzzle

Here’s a little something to snuggle up with if you’re on lockdown.

(image by juliasudnitskaya, via Adobe Stock)

Snuggle up with your hot beverage of choice and take a break from the perils of facing reality, and hack away at our first cybersecurity crossword puzzle. It might be just what you need to ease burnout while thinking about work at the same time.

Have a hard time coming up with the answers to these puzzle questions? We know a great place to look for more clues…

Head to to fill out your crossword online or print out a PDF version. 


    1  […] Read more

Everyone is Telecommuting. How to Ensure Cybersecurity

Rush to Telecommuting = Target-Rich Environment for Cyber Criminals

As cyber criminals continue their unrelenting assaults and expand their techniques to take advantage of the opportunities created by COVID-19 fears, cybersecurity teams should be sure to keep pace with the new types of threats.   This challenge will be even more pronounced as we strive to preserve business-as-usual by initiating telecommuting programs.  As these programs are implemented, cyber criminals are also taking advantage of new vulnerabilities created by the rush to mass telecommuting.

*** This is a Security Bloggers Network syndicated blog from Apptega Blog authored by Cyber Insights Team. […] Read more