Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail42.atl11.rsgsv.net;

Posted on September 11, 2016December 30, 2021 by admini

[From the desk of Paul Davis – his opinions and no-one else’s]
Apart from the reporter’s opinions 😉
So onto the news:

Dutch Data Protection Authority publishes consultation version of guidelines on breach notice law
On the heels of the enactment of the Dutch breach notice law, the Dutch Data Protection Authority (CBP) published a consultation document with draft guidelines on the breach notice obligation of data controllers in the Netherlands.
Under the law, data controllers are required to provide notice of data breaches to the CBP and, under certain circumstances, to the affected individuals.
This obligation will take effect on January 1, 2016.
The guidelines define a data breach as a security incident that has, or poses a significant risk of having, serious adverse consequences for the protection of personal data.
The CBP has invited interested parties to share their comments on the draft guidelines ultimately by October 19, 2015.
The final version of the guidelines will become effective on January 1, 2016.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=47343d0465&e=20056c7556

Outsourcing IT Security : A Recipe for Success or Disaster?
Is it worth it to let other people manage my sensitive data and give my company a competitive advantage?”
According to a growing number of companies, the answer is a yes.
IT research firm, Computer Economics, recently published a report called “IT Outsourcing Statistics 2015/2016,” where it has been found that more and more companies are outsourcing their IT functions.
With these tasks being outsourced, the result has been that companies are able to “preserve capital, reduce costs, improve operational flexibility, increase service levels, reduce management overhead or rapidly deploy new capabilities,” according to the study.Clearly, the outsourcing of these IT tasks have been beneficial to modern companies.
You have to be vigilant in keeping an eye on your outsourced IT security staff.
Though they may be contract-bound to keep your data private, in reality, they’ll have little to lose as opposed to your company—in case your data falls into the wrong hands.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=587d381104&e=20056c7556

Using Tiger Teams during a major incident
In a major incident there are a number of Tiger Teams, up to six, that can be established to assist in resolving incidents.
These are the (Echo/Delta/Romeo/Whisky/Bravo/Alpha) teams.
We will briefly describe each of these teams below:
The Echo team is the Escalations Team and is responsible for stakeholder communications and owns the major incident from cradle to grave.
The Delta team is the team responsible for diagnostics and also collaborates with the resources responsible for detection.
The Romeo team executes the repair which includes the recovery (component has been recovered to previous state as listed in CMDB) and restore (normal business operations have resumed).
The Whisky team is responsible for workaround implementation.
The Bravo team is responsible for business continuity and serve the purpose of business resumption in the event of a high level major incident.
The Alpha team is responsible for producing an analysis of the major incident after it has been resolved.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=ec63011f3e&e=20056c7556

Cyber Weapon Market – Global Industry Analysis, Size, Share, Growth, Trends and Forecast 2015 – 2021
The cyber weapon market is anticipated to grow during the forecast period owing to the increasing investment by government and utility organizations to identify zero-day vulnerabilities or exploits in a system or software application.
Intelligence agencies, government, and other organizations are increasingly investing in cyber units and other cyber resources to identify zero-day exploits and use them against enemy systems or networks when necessary.
Additionally expansion of traditional arms manufacturing companies such as Lockheed Martin Corporation, BAE Systems and Raytheon Company among others in cybersecurity business is driving the market growth.
Demand for advanced cyber warfare techniques is further fueling the growth of this market.
Furthermore, growth of cyber weapon market is attributed to the increasing need for security in critical infrastructure and utilities including national defense system, industrial control system and smart power grid among others.
The major factor restraining the growth of this market is due to the rising government regulations on non-proliferation of cyber weapons aimed to restrict usage of cyber weapon to ethical hackers, legal cyber professionals and organizations only.
Emergence of cyber as new domain for warfare is paving new opportunities for new and existing players in the market.
Cyber weapon is considered as complementary to conventional warfare techniques.
Additionally, cost-effectiveness of cyber weapons is leading to reduced funds for military expenses, thus providing new opportunities to players in the cyber weapon market.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=285e38093f&e=20056c7556

120-day patching gap puts many firms at risk of cyber attack, study shows
The probability of a vulnerability being exploited hits 90% between 40-60 days after discovery, but many firms are taking up to 60 days beyond that to patch, while others are failing to patch at all, a study shows
A study by risk and vulnerability software-as-a-service firm Kenna found that, despite the best intentions, most companies take an average of 100-120 days to remediate vulnerabilities.
According to the report, exploitation is almost guaranteed.
The probability of a vulnerability being exploited hits 90% between 40-60 days after discovery.
This means the length of time a company has to react before attackers strike is within 40-60 days of release for well-known vulnerabilities, the report said, which creates a remediation gap – or time that a vulnerability is most likely to be exploited before it is closed – of nearly 60 days.
According to the study report, non-targeted attacks pose a different challenge to businesses than the more widely publicised advanced persistent threats (APTs).
Due to the inability of information security teams to match the pace of automated attacks, a significant gap has appeared in the time that critical vulnerabilities appear and the time it takes for security teams to fix those vulnerabilities, the report concludes.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=59e32a4916&e=20056c7556

Bank ratings could be cut if cyber defences are weak, S&P warns
“We view weak cybersecurity as an emerging threat that has the potential to pose a higher risk to financial firms in the future, and possibly result in downgrades,” the ratings agency said on Tuesday.
S&P’s credit analyst Stuart Plesser said banks’ retail presence, the value of the data they hold and their role in the financial system made them “natural targets facing a high threat of cyber-risk” and a successful attack could create reputational risk and “serious monetary and legal damages.”
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=dc4e698bfd&e=20056c7556

Why Many Organizations Still Don’t Use Threat Intelligence Portals
Their main reasons for not employing threat intel services: 44% say the attacks they’ve experienced thus far haven’t been “serious enough” to warrant using threat intel; 36% say threat intel is too expensive; 36% say it’s “not a good fit” for them; and 24% say they can’t get budget to pay for threat intel.
Even so, four out of five respondents in the survey said their organization would indeed use threat intel data if it was available to them.
Some more advanced and feature-rich threat intel feeds can cost hundreds of thousands of dollars a year, but there also are free open-source feeds.
Some 82% say they would use threat intelligence data if they had the budget for it, the survey found.
Even so, 15% say they don’t want to share their threat intelligence information with other organizations.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=5fea3f8739&e=20056c7556

Best Practices for Cybersecurity Breaches, Incident Response
The PCI Security Standards Council has announced new guidelines to help organizations respond to data breaches.
“Responding to a Data Breach: A How-to Guide for Incident Management” provides retailers and service providers with key recommendations so they can be prepared to react quickly if a breach is suspected.
It specifically suggests what they should do to contain damage and launch an effective investigation.
Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=cd9b140e9c&e=20056c7556

============================================================
Feedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)

If you know someone else who would be interested in this Newsalert, please forwarded this email.
If you want to be added to the distribution list, please click this: ** Subscribe to this list (http://paulgdavis.us3.list-manage.com/subscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a)

** Unsubscribe from this list (http://paulgdavis.us3.list-manage.com/unsubscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556&c=b2f8bfc176)

** Update subscription preferences (http://paulgdavis.us3.list-manage2.com/profile?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556)

Leave a Reply

You must be logged in to post a comment.

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme