AMU Cyber & AI

Daily Cyber Defense Brief 13 Jan 2017 – Malware and Intellectual Property Defense

By James Lint
Faculty Member, School of Business, American Military University
Senior Editor for
 In Cyber Defense and Contributor, In Homeland Security

The Four Most Common Evasive Techniques Used by Malware from Tripwire’s David Bisson

This article reviews a Lastline report on evasive malware and shows multiple techniques to allow malware to evade detection from various security software protection packages. The malware of 2016 was good, but in 2017, malware will further evolve and get harder to detect which is why the skills of cyber security defense workers must also evolve. Keeping educated on the newest malware and anti-malware will be a requirement.

5 Ways Intellectual Property Will Be Critical To Your Career by Forbes’ Marshall Phelps

The article has some good points about why intellectual property (IP) is important, but it is also critical for cyber defenders to read it. Cyber defenders must understand what IP is because it is the value of many organizations ranging from patents, copyrights, trademarks and trade secrets.

The article notes that IP is now 35% of the total U.S. economy, which is interesting because much of IP is stored on computers and available to exploitation of others. This increases the risk of cyber espionage.

Intellectual property is responsible for enhancements and growth in research and development, science, business and most professions. These are all areas where cyber defense can build a niche service understanding R&D intellectual property and how to defend it. Job opportunities will be in the future of people with an understanding of cyber defense and intellectual property.

Cybersecurity Holes in Connected Cars by Insurance Thought Leadership’s Byron Acohido

According to this article, the National Highway Traffic Safety Administration has issued a consumer warning about the potential of hackers attacking human-driven cars. This warning will increase thoughts about how insurance companies will bring hacking into the insurance equation for assessing risk in future cars.

If insurers think that insuring human-driven vehicles is difficult, wait until driverless cars increase their population on the roads. Currently, driverless cars are owned by large companies that can afford to pay for an accident and carry no insurance.  They have money saved and allocated for these problems.

When normal citizens become owners of driverless cars, this will change the risk issues for insurance companies. Cyber security and cyber defense will keep growing in need and criticality.

This article highlights cyber news that influences cyber defenders. Information is retrieved from aggregators and credit given to them.

Privacy Legionnaire aggregated today’s information! Join the Legion!

James R. Lint retired as the (GG-15) civilian director for intelligence and security, G2, U.S. Army Communications Electronics Command. James has been involved in cyberespionage events from just after the turn of the century in Korea supporting 1st Signal Brigade to the DHS Office of Intelligence and Analysis as the first government cyber intelligence analyst. He has 38 years of experience in military intelligence with the U.S. Marine Corps and U.S. Army.

Comments are closed.