Work on a Big Interactive Map. Facility is Full of Screens Showing Technical Data.getty
We are in a state of cyber-flux with new and many asymmetrical challenges to cybersecurity. As cybersecurity gaps abound, a new urgency in both industry and government has arisen on how to better protect the cyber landscape.
The digital attack surface has vastly expanded from the transitions by many companies and organizations to remote work, and from more interconnectivity of PCs and smart devices coming online from around the globe. For many companies and institutions, the overall IT perimeter is now more complex and dispersed with on-premises systems, cloud, and edge computing that necessitates more visibility, and a need for better threat detection, analysis, and incident response.
The cyber ecosystem is in a precarious situation. Emerging technologies such as the Internet of Things, Machine learning & artificial intelligence, and 5G are creating operational shifts that require new and more robust cybersecurity strategies. Exacerbating the cybersecurity challenge is the global dearth of qualified cybersecurity workers and expertise available to help defend the data at risk.
Finally, but not least of concern is the fact that criminal enterprises and state actors are posing a much more sophisticated and capable threat. They are sharing resources and tactics over Dark Web forums and using advanced hacking tools that enable them to discover vulnerable targets to infiltrate malware and automate attacks.
One vital and important development to meet these numerous cyber-threat challenges is the development of enhanced capabilities in Security Operations Centers (SOCs) used by companies, government, and organizations. SOCs provide an operational risk management structure for organizations to organize, monitor and respond to cybersecurity threats.
An effective SOC can manage corporate systems, control systems, and physical security. It is designed to deliver continuous prevention, protection, detection, and mitigation of threats to systems. SOC teams also uncover vulnerabilities, respond to threats, and handle incidents that may be in progress on your networks or systems. A SOCs success quotient depends on the rapid and accurate interpretation and response to threats by analysts and the security team. Please see my article on the key functions and operations of SOCs in Homeland Security Today at: Using SOCs and Cybersecurity Hubs to Prioritize Security Operations in a Critical Era - HS Today
Also, security operations center benefits are well defined in an article called Security Operations Center Trends for 2023 by Gilad David Maayan:
Improved Security Posture: A SOC helps to improve an organization's security posture by continuously monitoring for security threats and vulnerabilities and taking appropriate action to address them. This can help prevent security incidents and protect the organization's assets.
Enhanced Visibility: A SOC provides a centralized view of the organization's security posture, allowing security professionals to easily see what is happening across the organization's networks, systems, and applications.
Please see: Security Operations Center Trends for 2023 - DZone
Every year the RSA conference in San Francisco operates as a venue where many new cyber technologies are introduced for consideration to IT and security teams. SOC technologies have become a significant focus of those seeking improved cybersecurity. Other venues and conferences are also discussing the important role of SOCS for cybersecurity as the threat matrix grows. I have selected a few examples of solutions and products in different areas of SOC operations that can help advance SOCs and their operators for the years ahead.
IBM, a historical leader in developing tools for SOCs, has responded to new SOC challenges with an array of AI and security solutions designed to unify and accelerate the security analyst experience across their entire process of threat detection, investigation and response The IBM QRadar Suite offers a comprehensive set of security software built around a new user interface that is embedded with AI, and connects security data and response workflows between SOC analyst toolsets. It is delivered as SaaS and is designed so businesses small, medium, and large can select and customize products from the suite that specially fit their unique situations.
Specifically for SOC operators these products include AI/automation innovations for:
Alert triage; contextualizing threats, reducing false positives, and automatically prioritizing or closing alerts with AI trained on prior analyst response patterns,
Threat investigation; with the system automatically conducting early investigation steps that analysts would normally do manually, such as searching across systems for other evidence related to the security incident, and compiling results into easy to digest format for analysts to review and respond.
According to IBMs press release from the RSA conference, there are three core design elements of the QRadar Suite that immediately garnered my attention that bring immediate advantages to SOC operators to help ameliorate cyber-threats:
Please see RSA Press Release:
For more information also for a deeper dive on QRadar see:
Peripherals
Fibernet
An Israeli company called Fibernet LTD. known for their data center expertise (including for the CERN particle reactor), and has developed of a line of products for SOCs to keep secure USB, HDMI, and similar data lines. Their solutions allow companies to protect high-level secured environments, including multi-media peripherals that connect to SOCs, by separating source and data. Their new products can secure and simplify the aggregation of audio/visual data from multiple sources that may feed into a SOC. Fibernet restrings, emulates and separate signals, keeping functionality and avoiding any possibility of hacking through these lines.
Cybersecurity at the signal level is an interesting approach as physical security is based on the laws of physics it makes it physically impossible to transfer data in the wrong direction, denying an attacker access to your system.
For more information, please see:
Following The Audit and Log SOC Trail
A Canadian company called Datex created a technology called DataStealth that is beneficial for SOC operators performing audits. DataStealth is deployed between 2 endpoints: User to Application or Application to a database or even an On-Premises environment to a SaaS Service. Their platform then creates an audit record for everything that passes between.
The uniqueness of this approach is that the collection is performed at the transport layer enabling DataStealth to sit between any source and target, without any installation of collectors or agents. By collecting and reviewing audit logs, system administrators can achieve unparalleled granularity in tracking user activity, while security teams can easily and quickly investigate any security incidents to ensure full compliance with regulations, privacy laws, and governance requirements.
Please see: DataStealth Audit and Logging Use Case
While technologies are very important, there is no substitute for the human factor in cybersecurity and in especially managing the operations of a security operations center. There are a variety of organization that specialize in SOC certifications, two of them are described below.
SANS Institute
The SANS Institute was launched in 1989 as a cooperative for information security thought leadership. SANS ongoing mission to empower cyber security professionals with the practical skills and knowledge they need to make our world a safer place. SANS offers the latest SOC training certification and resources for SIEM, Elastic Stack, and modern detection techniques to help equip Blue Teamers with the right knowledge and ability that is needed to safeguard their organizations and drive security operations with actionable intelligence.
Please see: Security Operations Center | SANS Institute
CompTIA is another certification organization that offers excellent training for potential SOC analysts. The Computing Technology Industry Association (CompTIA) is a leading voice and advocate for the $5 trillion global information technology ecosystem; and the estimated 75 million industry and tech professionals who design, implement, manage and safeguard the technology that powers the worlds economy.
Please see: What Is a Security Operations Center | Cybersecurity | CompTIA
The State of The SOC
CompTia
The adage is that people, processes, and technologies are essential for holistic cybersecurity. I have discussed some interesting technology applications, but there are also newer processes that SOCs need to implement. While models can differ, below is a glimpse of the basic elements usually found in operating an SOC:
In the past, three significant risk management themes have been put forward to help ameliorate the digital risk ecosystem including: security by design, defense in depth, and zero trust. They are a triad, or three strong pillars of risk management needed for a successful cybersecurity strategy.
Security by Design is well defined in an article in United States Cybersecurity magazine, cybersecurity expert Jeff Spivey provided an excellent working definition: Security by Design ensures that security risk governance and management are monitored, managed, and maintained on a continuous basis. The value of this holistic approach is that it ensures that new security risks are prioritized, ordered, and addressed in a continual manner with continuous feedback and learning. Security by Design | United States Cybersecurity Magazine (uscybersecurity.net)
Security by Design is really the initiation point of a risk management processespecially if you are a software or hardware developer concerned with security. In fact, DHS CISA recently came out with a strategy for both the private and public sectors making security by designing a preferred course of action. Please see: Secure by Design, Secure by Default | CISA
Defense in Depth. A variety of strong definitions exist for defense in depth in the security community. A NIST publication defines the Defense-in-depth concept as an important security architecture principle that has significant application to industrial control systems (ICS), cloud services, storehouses of sensitive data, and many other areas. We claim that an ideal defense-in-depth posture is 'deep', containing many layers of security, and 'narrow', the number of node independent attack paths is minimized. Measuring and Improving the Effectiveness of Defense-in-Depth Postures | NIST
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets, and resources. A zero-trust architecture (ZTA) uses zero trust principles to plan industrial and enterprise infrastructure and workflows. Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership (enterprise or personally owned). Authentication and authorization (both subject and device) are discrete functions performed before a session to an enterprise resource is established. Zero trust is a response to enterprise network trends that include remote users, bring your own device (BYOD), and cloud- based assets that are not located within an enterprise-owned network boundary. Zero trust focuses on protecting resources (assets, services, workflows, network accounts, etc.), not network segments, as the network location is no longer seen as the prime component to the security posture of the resource. This document contains an abstract definition of zero trust architecture (ZTA) and gives general deployment models and use cases where zero trust could improve an enterprises overall information technology security posture. Zero Trust Architecture | NIST
Frameworks, processes, strategies, operational SOC are elements that should be prioritized in industry and government. I provided a working checklist in a recent article in Homeland Security Today on the topic that can be found at the following link: Using SOCs and Cybersecurity Hubs to Prioritize Security Operations in a Critical Era - HS Today
A useful publication to better understand the importance of the role of SOCs that was written in 2021 is The Evolution of Security Operations and Strategies for Building an Effective SOC by Lakshmi Narayanan Kaliyaperumal. The author noted that cybersecurity threats are becoming increasingly complex, sophisticated, malicious, well organized, and well-funded. The widespread adoption of artificial intelligence (AI)-powered tools and technologies will lead to customized; high-impact cyberattacks. Addressing the complexity and sophistication of such attacks requires an empowered security operations center (SOC). And that extended detection and response (XDR) and the integration of IT/operational technology (OT)/industrial control systems (ICS) are likely the next advancements in the SOC evolution. XDR evolved from current reactive threat detection and response solutions and integrates security technologies signals to extract threat events across identity, endpoints, the cloud, and the network. XDR capabilities include identity analytics, network analysis, integrated threat intelligence, AI/ML-based detection, and automated and orchestrated investigation response.
Please see: The Evolution of Security Operations and Strategies for Building an Effective SOC (isaca.org)
The Importance of SOCs is a global issue and the importance of the SOC role is recognized in new legislation by the European Community. The proposed EU Cyber Solidarity Act, aims to strengthen cybersecurity by creating better detection, preparedness, and response to significant or large-scale incidents. This involves creating a European Cybersecurity Shield and a Cyber Emergency Mechanism, using national and cross-border state-of-the-art Security Operations Centers (SOCs) tasked with detecting and acting on cyberthreats. The EUs Cyber Solidarity Act: Security Operations Centers to the rescue! | WeLiveSecurity
In summary, innovative technologies, (some of which I have highlighted) and which are being introduced in 2023 at RSA and other venues are focused on those capabilities and will significantly assist SOC operators with cybersecurity challenges. Being aware of the resources available and operational requirements for SOC cybersecurity is a starting point for business, government, and many organizations. The cyber threats and risks are too high not to be proactive in advancing the capabilities of security operations centers.
Chuck Brooks
Top Cyber News Magazine
Chuck Brooks is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. Chuck is also an Adjunct Faculty at Georgetown Universitys Graduate Cybersecurity Risk Management Program where he teaches courses on risk management, homeland security technologies, and cybersecurity. LinkedIn named Chuck as one of The Top 5 Tech People to Follow on LinkedIn. He was named Cybersecurity Person of the Year for 2022 by The Cyber Express, and as one of the worlds 10 Best Cyber Security and Technology Experts by Best Rated, as a Top 50 Global Influencer in Risk, Compliance, by Thompson Reuters, Best of The Word in Security by CISO Platform, and by IFSEC, and Thinkers 360 as the #2 Global Cybersecurity Influencer. He was featured in the 2020, 2021, and 2022 Onalytica "Who's Who in Cybersecurity" He was also named one of the Top 5 Executives to Follow on Cybersecurity by Executive Mosaic, He is a GovCon Expert for Executive Mosaic/GovCon Wire, He is also a Cybersecurity Expert for The Network at the Washington Post, Visiting Editor at Homeland Security Today, and a Contributor to Skytop Media, and to FORBES. He has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law.
Chuck Brooks, President of Brooks Consulting International, is a globally recognized thought leader and subject matter expert Cybersecurity and Emerging Technologies. Chuck is also Adjunct Faculty at Georgetown Universitys Graduate Applied Intelligence Program and the Graduate Cybersecurity Programs where he teaches courses on risk management, homeland security, and cybersecurity.
LinkedIn named Chuck as one of The Top 5 Tech People to Follow on LinkedIn. He was named as one of the worlds 10 Best Cyber Security and Technology Experts by Best Rated, as a Top 50 Global Influencer in Risk, Compliance, by Thompson Reuters, Best of The Word in Security by CISO Platform, and by IFSEC and Thinkers 360 as the #2 Global Cybersecurity Influencer. He was featured in the 2020, 2021, and 2022 Onalytica "Who's Who in Cybersecurity" as one of the top Influencers for cybersecurity.
Chuck has served at executive levels in both government and industry. He is a two-time Presidential Appointee and was one of the group of initial people hired to helped set up the Department of Homeland Security, including the Science & Technology Directorate.
Chuck has written over 300 articles and has keynoted dozens of conferences worldwide. He has over 82,000 followers on LinkedIn and almost 18,000 followers on Twitter.
Chuck has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law.
Follow Chuck on social media:
LinkedIn:https://www.linkedin.com/in/chuckbrooks/
Twitter:@ChuckDBrooks
See the rest here:
Advancing The Security Operations Center (SOC): New Technologies and Processes Can Help Mitigate Cyber Threats - Forbes
- Google researchers have cracked a key internet security tool - Recode [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Letter: Internet security is in jeopardy - INFORUM [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- New internet security device launched to safeguard schools against child abuse - Phys.Org [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Everything You Need to Know About Cloudbleed, the Latest Internet Security Disaster - Gizmodo [Last Updated On: February 26th, 2017] [Originally Added On: February 26th, 2017]
- Data from internet-connected teddy bears held ransom, security expert says - Fox News [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Emsisoft Internet Security 2017.2.0.7219 - TechCentral.ie [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- What you need to know about 'Cloudbleed,' the latest internet security bug - Globalnews.ca [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- Google cracks longtime pillar of internet security - MarketWatch [Last Updated On: February 28th, 2017] [Originally Added On: February 28th, 2017]
- BullGuard | Internet Security and Antivirus protection ... [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Internet Storm Center - SANS Internet Storm Center [Last Updated On: March 2nd, 2017] [Originally Added On: March 2nd, 2017]
- Internet-connected 'smart' devices are dunces about security - ABC News [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Derry internet security expert warns that advanced internet technology 'a risk to us all' - Derry Now [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Firewall Test, Web Tools and Free Internet Security Audit ... [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Internet security in the spotlight: How is the internet safer today than it was 20 years ago? - Mobile Business Insights (blog) [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Jim Mullen: Unsocial internet security | Columnists | auburnpub.com - Auburn Citizen [Last Updated On: March 11th, 2017] [Originally Added On: March 11th, 2017]
- Internet security company launches a perfume line to promote cybersecurity - Mashable [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Internet security - Wikipedia [Last Updated On: March 12th, 2017] [Originally Added On: March 12th, 2017]
- Are you undermining your web security by checking on it with the wrong tools? - The Register [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Bruce Schneier on New Security Threats from the Internet of Things - Linux.com (blog) [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Carpe Diem: home internet security - KFOX El Paso [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Motivation Monday: home internet security - KFOX El Paso [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Medical records of 26m patients at risk because of GP surgeries' failing internet security - The Sun [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Free Internet Security | Why Comodo Internet Security Suite ... [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Internet Security Software | Trend Micro USA [Last Updated On: March 18th, 2017] [Originally Added On: March 18th, 2017]
- Fix crap Internet of Things security, booms Internet daddy Cerf - The Register [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- Internet of Things security: What happens when every device is smart and you don't even know it? - ZDNet [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- CUJO is cuter than Wall-E, and it's the only internet security device you'll ever need - Yahoo News [Last Updated On: March 21st, 2017] [Originally Added On: March 21st, 2017]
- The Senate just voted to undo landmark rules covering your Internet privacy - Washington Post [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- What the Cloudbleed disaster says about the state of internet security - Information Age [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Google Has Declared Symantec Harmful To Internet Security - UPROXX [Last Updated On: March 25th, 2017] [Originally Added On: March 25th, 2017]
- Internet Security Analysts: North Korea Is Planning a Global Bank Heist - Breitbart News [Last Updated On: March 28th, 2017] [Originally Added On: March 28th, 2017]
- Internet Security Firm Confirms WikiLeaks 'Vault 7' At Least 40 Cyberattacks Tied to the CIA - The Ring of Fire Network [Last Updated On: April 14th, 2017] [Originally Added On: April 14th, 2017]
- Homeland Security warns of 'BrickerBot' malware that destroys unsecured internet-connected devices - ZDNet [Last Updated On: April 20th, 2017] [Originally Added On: April 20th, 2017]
- A Global Industry First: Industrial Internet Consortium and Plattform Industrie 4.0 to Host Joint IIoT Security ... - Business Wire (press release) [Last Updated On: April 20th, 2017] [Originally Added On: April 20th, 2017]
- Mucheru urges private sector to boost investment in internet security - The Standard (press release) [Last Updated On: April 25th, 2017] [Originally Added On: April 25th, 2017]
- Cloudflare debuts a security solution for IoT - TechCrunch [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- Russian-controlled telecom hijacks financial services' Internet traffic - Ars Technica [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- Avira Internet Security Suite v15.0.26 - TechCentral.ie [Last Updated On: April 28th, 2017] [Originally Added On: April 28th, 2017]
- NSA To Limit Some Collection Of Internet Communication - NPR [Last Updated On: April 29th, 2017] [Originally Added On: April 29th, 2017]
- Report Indicates '10 Concerts' Facebook Trend Could Compromise Your Internet Security - Complex [Last Updated On: April 29th, 2017] [Originally Added On: April 29th, 2017]
- "Improving the World" through Internet Security: Chatting with David Gorodyansky, CEO of AnchorFree - Huffington Post [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Don't Fall For This Tech Support Scam Targeting PC Users - KTLA [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Yikes! Antivirus Software Fails Basic Security Tests - Tom's Guide [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Watch Hackers Sabotage an Industrial Robot Arm - WIRED [Last Updated On: May 3rd, 2017] [Originally Added On: May 3rd, 2017]
- Decoding Internet Security: Spear phishing - Washington Post [Last Updated On: May 5th, 2017] [Originally Added On: May 5th, 2017]
- From the Desk of Jay Fallis: To internet vote, or not to internet vote - BarrieToday [Last Updated On: May 7th, 2017] [Originally Added On: May 7th, 2017]
- Crippling cyberattack continues to spread around the world - Los Angeles Times [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- Cyber Security Experts: Russia Disproportionately Targeted by Malware - Voice of America [Last Updated On: May 14th, 2017] [Originally Added On: May 14th, 2017]
- The Latest: 29000 Chinese institutions hit by cyberattack - ABC News [Last Updated On: May 15th, 2017] [Originally Added On: May 15th, 2017]
- Cyberattack Aftershock Feared as US Warns of Its Complexity - New York Times [Last Updated On: May 15th, 2017] [Originally Added On: May 15th, 2017]
- This week's poll: Priorities for improving internet security - The Engineer [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Akamai Releases First Quarter 2017 State of the Internet / Security Report - PR Newswire (press release) [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Do Macs get viruses? - PC Advisor [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Massive Ransomware Attack Underscores Threats To Internet Security - Benzinga [Last Updated On: May 19th, 2017] [Originally Added On: May 19th, 2017]
- Security News This Week: Hoo-Boy, Mar-a-Lago's Internet Is Insecure - WIRED [Last Updated On: May 20th, 2017] [Originally Added On: May 20th, 2017]
- Internet security firm calls for law to compel information sharing to ... - The Star, Kenya [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- Check It Out: No need to unplug after reading books on internet security - The Columbian [Last Updated On: May 22nd, 2017] [Originally Added On: May 22nd, 2017]
- How to beat security threats to 'internet of things' - BBC News - BBC News [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Best Mac antivirus 2017 - Macworld UK [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Avira, Kaspersky Top Windows 10 Antivirus Tests - Tom's Guide [Last Updated On: May 25th, 2017] [Originally Added On: May 25th, 2017]
- Paranoid about internet security? Here are the most secure OS options - The American Genius [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- Blockchain Offers Hope for the Broken Internet - Fortune [Last Updated On: May 28th, 2017] [Originally Added On: May 28th, 2017]
- New uses for RFID and security for the internet of things - Phys.Org [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Security Best Practices for the Internet of Things - Web Host Industry Review [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Internet infrastructure security guidelines for Africa unveiled - Premium Times [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- In addressing internet security issues, make sure to provide solutions - Minneapolis Star Tribune [Last Updated On: May 31st, 2017] [Originally Added On: May 31st, 2017]
- Whistic Partners with the Center for Internet Security to Extend the ... - PR Web (press release) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Internet Security Alliance: NIST framework metrics should focus on threats - Inside Cybersecurity (subscription) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- China cyber-security law will keep citizens' data within the Great Firewall - The Register [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Cyber security: Africa gets Internet security guidelines - TheNewsGuru [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- China to Implement Its First Law on Internet Security After Ransomware Attack - Sputnik International [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Decoding Internet Security: Ransomware - Washington Post [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- Internet security upgrade on course - Business Daily (press release) (blog) [Last Updated On: June 1st, 2017] [Originally Added On: June 1st, 2017]
- What's the Safest Laptop For Internet Security? - HuffPost [Last Updated On: June 2nd, 2017] [Originally Added On: June 2nd, 2017]
- Every Day Is Internet Security Day - The Chief-Leader [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]
- 5 Reasons why internet security is crucial in 2017 - Techworm [Last Updated On: June 3rd, 2017] [Originally Added On: June 3rd, 2017]
- Are Pop-Ups An Internet Security Threat? - Good Herald [Last Updated On: June 4th, 2017] [Originally Added On: June 4th, 2017]
- 3 Ways Software Programs Can Help With Internet Security in 2017 - Geek Snack [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- Inside Social Security: Make every day your internet security day - Santa Ynez Valley News [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]
- SOCIAL SECURITY: Every day is internet security day - Palm Beach Post [Last Updated On: June 7th, 2017] [Originally Added On: June 7th, 2017]