Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail160.atl171.mcdlv.net;

Posted on September 11, 2016December 30, 2021 by admini

[From the desk of Paul Davis – his opinions and no-one else’s]
Apart from the reporter’s opinions 😉
So onto the news:

End-to-end encryption is key for securing the Internet of Things
The Internet of Things (IoT) is one of the hottest buzzwords these days.
It seems like almost everything is being connected, including cars, streetlights, oil rigs, wearables and more.
By the end of this decade, Gartner estimates there will be 26 billion IoT devices in service, while IDC predicts 28.1 billion.
Those attacks are in addition to those that leverage the IoT to steal credit information, corporate secrets and other data.
The Ponemon Institute’s 2015 Cost of Data Breach Study: Global Analysis says the average cost of each lost or stolen record containing sensitive and confidential information increased from $145 in 2014 to $154 this year.
IoT will drive that cost even higher simply because it increases the number of attack opportunities.
In fact, IDC predicts that by the end of 2016, 90 percent of all IT networks will have experienced an IoT-based security breach.
Within the next five years, 90 percent of all IoT data will reside in third-party clouds, IDC predicts.
That statistic is just one example of why enterprises, government agencies and other organizations should take adopt an “encrypt-everything” strategy to protect against IoT-enabled breaches.
In the Internet of Everything, data will reside everywhere, which means a lot of that data can’t be protected by traditional, network-centric devices such as firewalls.
Only end-to-end encryption can provide the security necessary to minimize IoT-enabled breaches.
However, the encryption technology must be designed for modern use cases and devices, such as by making the most efficient possible use of processors and batteries.
Organizations that choose the right encryption solution and then apply it everywhere will be best equipped to address IoT-enabled threats.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=c4e0619f8f&e=20056c7556

Why you Should Start Considering an Endpoint Management Upgrade
Rather than managing and reporting on all endpoints in a holistic way, today’s marketplaces are managing different endpoint classes (PCs, servers, mobile devices) and non-traditional endpoints (ATMs, kiosks, and POS systems), with a wide range of tools—and sometimes with completely different IT teams.
On top of that, they may use a variety of tools for different environments (Windows, Mac, Linux, etc.), as well as for different lifecycle functions (configuration, security enforcement, patching automation, etc.).
This system of management is becoming extremely inefficient.
Unified endpoint management (UEM) is the solution to IT’s fragmented endpoint management issue.
This full lifecycle management of endpoints allows organizations to utilize one single vendor and systems management platform to support a diverse and ever-growing deployment environment.
VDC Research recently released a full report on the business value of UEM solutions, in addition to discussing the top businesses innovating in the space.
In this report, VDC Research analyzed survey data from over 90 IT decision-makers, who either had direct involvement in purchasing and/or using endpoint management solutions within their organization.
It’s a veritable smorgasbord of information that makes a serious business case for switching to UEM solutions.
Even with this rather apparent need for multi-endpoint management, few solutions have emerged that are truly implementing an effective, worthwhile endpoint management strategy for both traditional and mobile endpoints.
VDC stresses the operational and cost efficiencies that UEM solutions provide, which exceed the limitations of two separate management tools.
Along with the shared use of hardware, people, resources, and policy infrastructure, UEM offers IT admins with improved organization-wide mobility that encompasses all endpoint devices – one endpoint management solution to rule them all.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=ab132e5f07&e=20056c7556

EU, U.S. clinch data-sharing deal for security, terrorism cases: document
BRUSSELS (Reuters) – The European Union and the United States have clinched a deal protecting personal data shared for law enforcement purposes such as terrorism investigations, according to a document seen by Reuters.
The text of the agreement has been finalized, according to the document.
A person familiar with the matter said it will be initialed by the chief negotiators in Luxembourg on Monday or Tuesday.
That would signal the end of talks.
The two sides have been negotiating for four years over the so-called “umbrella agreement” that would protect personal data exchanged between police and judicial authorities in the course of investigations, as well as between companies and law enforcement authorities.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=e4f3eca411&e=20056c7556

Six Security Hang-ups: Beware the Black Holes
How secure are you about your security.
According to the past three Trustwave Global Security Reports, the hospitality industry is one of the top three most compromised industries.
And Privacyrights.org reports a 50 percent increase in hospitality breach disclosures in 2014.
Below are the top security pitfalls among hospitality businesses as identified by Trustwave:
– Insufficient malware protection
– Employees have too much access
– Lack of BYOD security
– Outdated security controls
– Unsecure applications and databases
– Customer approval supersedes security
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=d388b17105&e=20056c7556

Act on your Threat Intelligence
Warning intelligence attempts to answer two main questions: what’smost likely to happen and what’s the most dangerous thing that can happen.
The idea being if you’re prepared for the worst, anything that falls short should be dealt with handily.
The problem of course is that few people think the worst is going to happen to them.
A decision-maker may opt toheighten readiness (“Hey everyone, keep your eyes open this week”) but take no far-reaching action because the “most likely” scenario is something existing mechanisms and capabilities can address.
But what about the “most dangerous” scenario.
Well, what used to happen, with alarming frequency, was that decision-makers would look at their position (Generals or Admirals) and trust in the thought- and decision-making process that got them those stars and say, “What do those nerds know anyway.
How could a bunch of hackers cause me any pain and suffering?”
Cyber threat intelligence is just one of many things that you can use to help defend your enterprise, but it is not a silver bullet.
The vast majority of the time the warnings you receive are going to be busts.
You’re going to start to think over time that because nothing you have been warned about has ever happened nothing will ever happen.
That’s the point at which you’re going to devalue intelligence and be caught by “surprise.” Intelligence will have “failed” you and you will go looking for heads to cut off.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=1bbc4e9f79&e=20056c7556

Borderless Cyber 2015
OASIS, in collaboration with The World Bank, will bring together public and private sector security professionals from around the world to evaluate, debate, and collaborate on cyber threat intelligence best practices and tools.
Hosted at The World Bank D.C. headquarters, the forum program will feature presentations from experts responsible for cyber security initiatives for public, private, and global institutional sectors.
In order to facilitate meaningful interaction, attendees are encouraged to share their questions, challenges, experiences and recommendations with our expert panel of presenters.
Current initiatives aimed at sharing cyber threat intelligences and response information in real time through systems and software will be a highlight.
Best practices, standards, specifications, and tools, such as STIX, TAXII and CybOX, will be part of the program.
Executives responsible for developing, influencing and managing critical infrastructure security decisions are invited to attend this conference.
This includes…
Onsite participation is limited, use our online reservation form to reserve a seat.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=9eb790c569&e=20056c7556

Akerlof And Shiller, Phishing For Phools
George A.
Akerlof and Robert J.
Shiller, who previously collaborated to produce Animal Spirits, have joined forces again.
Their new book is Phishing for Phools: The Economics of Manipulation and Deception (Princeton University Press, 2015).
Their thesis is simple but powerful: that “competitive markets by their very nature spawn deception and trickery, as a result of the same profit motives that give us our prosperity.” (p. 165) Economies “have a phishing equilibrium in which every chance for profit more than the ordinary will be taken up.” (p. 2) Free-market equilibrium undermines our plans to eat healthily, it makes us pay too much for our cars and houses, it transforms rotten assets into gold.
We have weaknesses that can be exploited (monkeys on our shoulders), weaknesses that free markets by their very nature exploit.
Akerlof and Shiller modestly claim to be making only “a small tweak to the usual economics (by noticing the difference between optimality in terms of our real tastes and optimality in terms of our monkey-on-the-shoulder tastes).
But that small tweak for economics makes a great difference to our lives.
It’s a major reason why just letting people be Free to Choose – which Milton and Rose Friedman, for example, consider the sine qua non of good public policy – leads to serious economic problems.” (p. 6)
Phishing for Phools forswears technical language, making this book accessible not only to economists but to consumers and policymakers.
It should make everyone rethink the unfettered free-market model.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=6062027455&e=20056c7556

Angler plonks August’s Flash feeding frenzy into its boat
Crooks behind the world’s worst exploit kit, Angler, have added the latest Adobe Flash vulnerabilities to the suite’s long list of attack vectors.
Angler now sports support for some of the 35 Flash player holes detailed and patched last month that includes eight memory corruption flaws and five type confusion bugs.
French malware man Kafeine said that Angler had added an integer overflow (CVE-2015-5560) that allows for arbitrary code execution via unspecified vectors.
The Angler exploit uses Diffie-Hellman key exchange to help tailor attacks to victims, a method authors used last month when they rolled in an Internet Explorer double-free vulnerability into the hacking kit. ÂŽ
Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=b9b648fbed&e=20056c7556

============================================================
Feedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)

If someone forwarded this email to you and you want to be added in,
please click this: ** Subscribe to this list (http://paulgdavis.us3.list-manage1.com/subscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a)

** Unsubscribe from this list (http://paulgdavis.us3.list-manage.com/unsubscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556&c=59c58fe616)

** Update subscription preferences (http://paulgdavis.us3.list-manage2.com/profile?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556)

Leave a Reply

You must be logged in to post a comment.

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme