[From the desk of Paul Davis – his opinions and no-one else’s, apart from the reporter’s opinions ]
* NIST looks to reengineer thinking about cyber
* Cyber security ‘health checks’ for big business [Australia]
* Tech Industry Lines up Behind IT Modernization Fund Proposal
* Tangerine relaunches mobile app with new biometrics and security features
* This one chart explains why cybersecurity is so important [InfoGraphic]
* Lost in the threat maze: Uncertainty looms over global security landscape
* SME cyber security awareness jumps – national survey [New Zealand]
* AppRiver Reports Q1 2016 Spam, Malware Traffic Eclipses 2015 Highs
* Rethinking Cybersecurity In View Of The Relentless Nature Of Cybercrime
* Ransomware was the biggest cyber threat in the UK last week
* Malware menace with ‘scary’ backdoor strikes 12 million machines
* Breach Response Portal Added by Massachusetts Regulator
* A security professional’s guide to cyber insurance
* House unanimously passes Email Privacy Act, requiring warrants for obtaining emails
NIST looks to reengineer thinking about cyber
An updated draft of NIST’s 800-160 document will be released for public comment on May 4.
According to its lead author, Dr.
Ron Ross, the new 800-160 will kick off a difficult discussion over not only how federal agencies approach cybersecurity, but also how U.S. business and general population should think about it — not just as an add-on, but as an foundational component of any technology that touches the Internet.
The document, officially titled NIST Special Publication 800-160: Systems Security Engineering, has been overhauled from its two-year-old original draft.
The new iteration takes a more holistic approach to cyber defense.
It incorporates International Organization for Standardization systems engineering standards, including 30 different processes aimed at building security capabilities into products, services and systems.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=9a150155fe&e=20056c7556
Cyber security ‘health checks’ for big business [Australia]
The federal government will offer cyber security ‘health checks’ at some of Australia’s biggest companies.
The top 100 ASX-listed companies will be given the opportunity to get their voluntary check, which will be co-ordinated by the Australian Securities Exchange.
The plan was announced under the government’s new $230 million cyber security package, however involves no new government funding.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=5592494d5d&e=20056c7556
Tech Industry Lines up Behind IT Modernization Fund Proposal
Representatives of the tech industry are showing public support for legislation that would establish a $3.1 billion revolving fund to help federal agencies upgrade aging and obsolete IT systems.
Signing on to statements of approval are executives from Northrop Grumman, Cisco, Dell, Intel, CSRA and the pro-business U.S.
Chamber of Commerce, whose stance on the matter could be useful in thawing Republican opposition to the measure’s price tag.
The statements were collected in an April 26 release by Rep.
Steny Hoyer, D-Md., who introduced the IT Modernization Fund earlier this month.
The Obama administration first proposed the fund as part of its fiscal 2017 budget package, but it requires congressional approval.
Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=d8f2f12984&e=20056c7556
Tangerine relaunches mobile app with new biometrics and security features
Tangerine Bank has relaunched its mobile app for iOS, adding secure instant messaging support and new biometric security features, the Toronto-based direct banking firm announced today.
The biometric features, provided by Kansas City, Missouri-based EyeVerify Inc. and Burlington, Massachusetts-based Nuance Communications, allow users to protect their accounts with an eye-scan or vocal password, while the “Secure Chat” feature, developed in collaboration with IBM Corp. using Genesys technology, allows them to message a customer service representative under the in-app “Contact Us” section.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=59e20a0559&e=20056c7556
This one chart explains why cybersecurity is so important [InfoGraphic]
New hacking threats have emerged in the past two years, and with it has come an large increase in worldwide concern about cybersecurity.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=5ca8a399f5&e=20056c7556
Lost in the threat maze: Uncertainty looms over global security landscape
The Information Security Forum (ISF) recently released Threat Horizon 2018, the latest in our annual series of reports which provide organisations of all sizes with a forward-looking view of the increasing threats in our always-on, interconnected world.
In this report, we discussed the top three emerging threat themes, as determined by ISF research, to information security over the next two years.
Here are a few of the highlights:
As technology and connectivity spread, threats intensify and multiply
Today’s protective measures will not stand up to tomorrow’s threats
Government intervention and regulation will complicate security on a global scale
Plan now to be ready for rapidly emerging threats
Many organisations will struggle to cope as the pace of change intensifies.
Adopting new security measures while in the midst of radical change is like trying to build a house in a hurricane.
Set about laying a strong and resilient foundation now: do the groundwork of comprehensive risk management, weave business and IT leadership into a collaborative defensive strategy, and build an organisation capable of rapidly and proactively addressing changes in regulations, threats, and technologies.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=b800452f2d&e=20056c7556
SME cyber security awareness jumps – national survey [New Zealand]
Heightened interest in cyber security issues has driven a large increase in the number of small and medium businesses who are becoming more cyber aware according to leading online accountancy software provider MYOB.
The latest MYOB Business Monitor survey highlights that 70 percent of New Zealand SMEs now register concerns with one or more cyber security risk areas, an increase of 10 percent in just six months, with awareness up across all categories.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=5c1eb2cbca&e=20056c7556
AppRiver Reports Q1 2016 Spam, Malware Traffic Eclipses 2015 Highs
GULF BREEZE, Fla., April 27, 2016 (GLOBE NEWSWIRE) — via PRWEB – AppRiver, LLC, a leading provider of email messaging and Web security solutions, today confirmed that the levels of spam and malware email traffic it recorded during Q1 has already surpassed total levels documented during the whole of 2015, totaling at 2.3 billion malicious email messages, with 1.7 billion occurring in March alone.
GULF BREEZE, Fla., April 27, 2016 (GLOBE NEWSWIRE) — via PRWEB – AppRiver, LLC, a leading provider of email messaging and Web security solutions, today confirmed that the levels of spam and malware email traffic it recorded during Q1 has already surpassed total levels documented during the whole of 2015, totaling at 2.3 billion malicious email messages, with 1.7 billion occurring in March alone.
AppRiver has also seen an uptick in wire transfer attacks, typically targeting finance departments.
Custom communications are spoofed by the attackers to appear as if they come from within an organization, most often impersonating a company’s CEO.
A final trend AppRiver has been monitoring is the Distributed Spam Distraction (DSD) technique.
Fred Touchette, manager of security research at AppRiver, explains, “DSDs flood an individual’s inbox with spam emails in an attempt to hide critical confirmation emails for purchases or wire transfers made in the victim’s name.
With all of the spam in the victim’s inbox, the deed is done before the confirmation email is located, allowing the cybercriminal to make away with fraudulent purchases or wire transfers.”
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=5c7f496757&e=20056c7556
Rethinking Cybersecurity In View Of The Relentless Nature Of Cybercrime
One dirty secret of corporate hacking episodes is that the adversary’s code can be nearly impossible to remove—even after it’s discovered.
The hack may have made headlines a month ago, but without next-generation cybersecurity, there’s a good chance the hackers are still in there and capable of wreaking havoc.
Clearly, new approaches and solutions are necessary.
Organisations are beginning to discover two little-known but very effective security defences.
The first is network visibility—a way to see who is on your network every minute, map their locations and know everything they are accessing.
The second secret weapon is speed, and speedy remediation is a function of visibility.
The best-practice solution to harden networks is the installation of a centralised response centre.
This makes sense because many enterprises have plenty of security solutions for each individual problem.
But too many security solutions running parallel at the same time, without exchanging information, will not be able to reach a sustainable level of protection.
A recent survey by SC Magazine asked 350 corporate executives and consultants in the information security industry about their current set-up regarding security tools.
Respondents indicated that 52 percent of their companies use more than 13 security solutions.
Fully 78 percent of respondents would like to see these tools linked in order to increase their effectiveness.
The findings of the Frost & Sullivan survey showed that companies are looking for security architectures that operate on the network level and can exchange information with other solutions.
IT also needs an automated incident response centre that allows full insight.
The interaction with other tools, for instance, through the use of application programming interfaces (APIs), allows bi-directional integration so that information from existing security investments can be shared.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=28c8cc4360&e=20056c7556
Ransomware was the biggest cyber threat in the UK last week
According to data gathered by the security firm ESET’s LiveGrid telemetry, ransomware accounted for a third of the threats that targeted computer users in the UK during the past week.
A recent spike in the sheer volume of ransomware attacks in the UK has been attributed to new malicious code called JS/Danger.ScriptAttachment.
Once on a users’ computer, this code attempts to download and install various pieces of malware.
It then executes the ransomware Telsacrypt which encrypts user data and demands payment.
Users who pay the demanded fee will regain access to their data.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=b513ac76f7&e=20056c7556
Malware menace with ‘scary’ backdoor strikes 12 million machines
Cisco Talos has warned of a malware infection that has backdoor capabilities and 12 million machines in its grasp.
The malware can steal personal information and gain administration rights.
Talos calls it a ‘generic trojan’ made worse owing to its scale and payload.
A common theme in the malware is a lot of incidents of the word ‘Wizz’ in the code.
“The word ‘Wizz’ was in the name of every sample analysed, roughly 7,000 unique samples,” Talos said in a blog post.
Talos explained that the malware also includes a “scary” backdoor. “Inside our custom sandbox, the launcher executed and our WeAreWizzlabs registry key allows our analysis tools to avoid detection.
The module executed and installed on the victim machine,” the firm said.
“Aside from monetisation, when a malicious piece of software is able to gain a foothold in the victim machine and gain the ability to deliver any other possible binaries, the game is up.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=6d1df5800f&e=20056c7556
Breach Response Portal Added by Massachusetts Regulator
Pursuant to the Massachusetts data breach notification statute, M.G.L. 93H, notices must be provided to the affected resident, the Attorney General’s office and to the Office of Consumer Affairs and Business Regulation (OCABR).
It is not enough that Massachusetts has a sui generis breach notice content statutory requirement (you must tell affected residents of the breach, but you can’t tell them about the breach), now the OCABR has created its own notice submission portal that is a separate form and not just a place to upload a copy of the AG notice.
A letter sent out earlier this month also says “It is important to note that this electronic submission form only satisfies the notification requirement for OCABR.
The submission does not relieve businesses of their legal obligation to separately notify the AGO and the affected Massachusetts residents.”
Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=912820a307&e=20056c7556
A security professional’s guide to cyber insurance
As the saying goes, the best offense is a good defense.
Having a strong and well-documented security program in place can help to potentially reduce the cost of insurance or put a company in a stronger position to negotiate more favorable terms.
Companies that can demonstrate that they are following security best practices to prevent attacks and that they have a plan in place to manage a potential incident are often more attractive to insurers.
There are several steps that cybersecurity professionals can take to help in this process.
For starters, having a well-documented data breach response plan in place and practicing it on an ongoing basis better prepares and equips companies to respond to an attack in a timely and sensitive manner.
Further, regularly conducting internal and third-party audits of corporate networks, as well as third-party cloud providers or other organizations that have access to sensitive information, can help prove to insurers that the company is effectively managing security risks and is compliant with applicable laws.
Specifically, when working with brokers to evaluate policies and determine the coverage best suited for a company, there are several key pieces to look for:
– Existing exemptions
– Coverage for external vendors
– Coverage for response services
– Risk management services
Cybersecurity leaders play a major role in setting their companies up for success when buying insurance.
By establishing a strong security posture ahead of time, identifying their company’s needs, and sharing this information with risk managers and brokers they can greatly influence and benefit the purchasing process.
Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=b0bccb1c21&e=20056c7556
House unanimously passes Email Privacy Act, requiring warrants for obtaining emails
The U.S. House of Representatives has passed H.R. 699, the Email Privacy Act, sending it on to the Senate and from there, hopefully anyhow, to the President. The yeas were swift and unanimous. .
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=7d8c217326&e=20056c7556
============================================================
Feedback, questions? Our mailing address is: dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)
If you know someone else who would be interested in this Newsalert, please forwarded this email.
If you want to be added to the distribution list, please click this: Subscribe to this list (http://paulgdavis.us3.list-manage.com/subscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a)
Unsubscribe from this list (http://paulgdavis.us3.list-manage.com/unsubscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556&c=ba695e16a5)
Update subscription preferences (http://paulgdavis.us3.list-manage.com/profile?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556)