{"id":1100,"date":"2016-08-30T00:00:00","date_gmt":"2016-08-30T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/08\/30\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail179-wdc02-mcdlv-net\/"},"modified":"2021-12-30T11:38:46","modified_gmt":"2021-12-30T11:38:46","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail179-wdc02-mcdlv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/08\/30\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail179-wdc02-mcdlv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail179.wdc02.mcdlv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo onto the news:<\/p>\n<p>State of the Network study: How security tasks are dominating IT staff<\/p>\n<p>The majority of networking teams are regularly involved in enterprise security tasks. Expert Kevin Beaver explains the phenomena and how to embrace it.<\/p>\n<p>The 2015 Network Instruments State of the Network Study found 85% of network teams regularly engage in security investigations today, with nearly one-fourth of those teams working on security tasks from 10 to 20 hours each week.<\/p>\n<p>One finding from the State of the Network Study that really stood out was the top three methods for identifying security issues:<\/p>\n<p>&#8211; syslogs<\/p>\n<p>&#8211; Simple Network Management Protocol<\/p>\n<p>&#8211; Tracking performance anomalies<\/p>\n<p>Link: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=61ac3b34df&#038;e=20056c7556<\/p>\n<p>Threat Intelligence May Not Be The Answer<\/p>\n<p>Rob Sloan Head of Cyber Content and Data, Dow Jones Risk and Compliance<\/p>\n<p>Threat intelligence, according to many security vendors, is a key part of the solution to network defense. Organizations are encouraged to spend tens of thousands of dollars on intelligence feeds that will actually do very little to substantially improve their cybersecurity. For many, threat intelligence will be a complete waste of money.<\/p>\n<p>The argument from the vendors is simple: knowing what threat actors are doing allows proactive protection of networks. To generate insight, vendors employ teams to analyze data from deployed security appliances or client networks where incident response work was conducted.<\/p>\n<p>At its best threat intelligence might provide occasional protection from attacks. At its worst it is an expensive source of information that bears no relevance to securing a network and may mislead decision-makers. Knowing the threat actors who are seeking to attack can be useful, as can identifying business critical data, but knowledge of other attacks is not required for that. Limited security budgets are better invested in resources and technology to strengthen defenses, identify and respond to attacks and to prevent damage rather than on cyber clairvoyance.<\/p>\n<p>Link: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c755773de0&#038;e=20056c7556<\/p>\n<p>Key Components of a High-Performing Information Risk Management Program<\/p>\n<p>Creating an information risk management program consists of designing, implementing and maturing security practices to protect confidential information, critical business processes and information assets across the organization. A high-performing information risk management program is one that recognizes IRM is an ongoing business process requiring the support of departments, functions and individuals throughout the organization. Over the years, these programs have evolved from a security operations and technology focus to a more holistic, organization-wide approach involving multiple levels of people, processes and technology. This has led to significant changes in the role and scope of the program and has expanded the portfolio of activities that fall under its umbrella.<\/p>\n<p>Typically, establishing a high-performing information risk management program can take three to five years in large organizations. Maintaining executive commitment and investment for the duration is essential. Carefully choosing a combination of both short-term, low-hanging-fruit projects that emphasize value and longer-term infrastructural and cultural change projects will provide incremental increases in program quality while strengthening executive support. Attempts to build a program can fail because management does not take advantage of the lessons learned from other organizations. Understanding and implementing the key components a high-performing information risk management program will ensure success.<\/p>\n<p>Link: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=72445bc420&#038;e=20056c7556<\/p>\n<p>Cybercrime costs SA in excess of R3 billion<\/p>\n<p>A new study has found that South Africa is the most affected by cybercrime in Africa. The study was conducted by the University of Johannesburg&#8217;s Centre for Cyber Security.<\/p>\n<p>\u201cThere are some international statistics proving that South Africa is third on the international list of the number of cybercrime victims, we are then number one in the African continent\u2026&#8221;<\/p>\n<p>Link: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e04af50b2f&#038;e=20056c7556<\/p>\n<p>CIOs And Security: Time To Rethink The Processes?<\/p>\n<p>Businesses need to develop new security responses to address gigantic attacks, and the CIO is in the best position to lead the way.<\/p>\n<p>First, IT needs to recognize that the traditional methods of dealing with security breaches are not enough to effectively respond to the massive break-ins. &#8220;Companies are under attack every day,&#8221; said Bill Stewart, executive VP at Booz Allen and leader of the firm&#8217;s commercial cyber-business, which in April issued a report titled &#8220;Emerging Trends: Big Changes in Cyber Risk, Detection, Improved Incident Response.\u201d<\/p>\n<p>To be successful, a business needs unprecedented levels of cooperation among different departments and a proactive, top-management-involved approach to dealing with security threats. The enterprise needs to form a cyber-crisis management team, a group that deals only with high-level threats.<\/p>\n<p>&#8220;We are seeing a slow but growing awareness among CIOs that a new approach is needed to dealing with massive breaches,&#8221; said Stewart. The process starts with the CIO recognizing the need for handling massive breaches in their own way and then putting the response pieces in place.<\/p>\n<p>Link: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=75ba812921&#038;e=20056c7556<\/p>\n<p>Research Reveals Great Disconnect Between Loss Prevention, IT and Other Business Units in Retail<\/p>\n<p>CHELMSFORD, Mass.&#8211;(BUSINESS WIRE)&#8211;Axis Communications, the global leader in network video surveillance, today revealed the results of \u201cThe Great Disconnect Between LP and IT,\u201d a 2015 study by IHL Group, a global research and advisory firm specializing in technologies for the retail and hospitality industries. The research illustrates the differing ways in which IT and loss prevention (LP) teams view priorities, including staff and budgetary allocation. It also outlines the barriers to a closer LP to IT relationship and new revenue-generating functions of IP-enabled technologies.<\/p>\n<p>Research suggests that after using IT budget to fund significant data breach protection and PCI certification efforts, retailers on average still have 6.4 percent of that budget left to spend on other LP priorities. As organization revenues increase, PCI and data breach protection costs level out, and IT budgets continue to grow linearly, larger retailers end up with two to three times more funds than smaller retailers for additional LP activities, such as organized retail crime and slip and fall prevention, electronic article surveillance (EAS), CCTV, video analytics and more.<\/p>\n<p>\u201cOur team has noticed a clear disconnect in retail between IT and LP departments when it comes to budget, focus and staffing,\u201d said Hedgie Bartol, Business Development Manager, Retail, for Axis Communications. \u201cThis is a natural and expected interaction given their differing priorities, but IHL Group\u2019s research has put in place actionable feedback and future-looking opportunities due to IP surveillance technology advancements that can be put in place organization-wide to create stronger relationships and ultimately, turn up revenue from a department otherwise known as a cost center.\u201d<\/p>\n<p>Link: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=63abaab30c&#038;e=20056c7556<\/p>\n<p>Ten data center trends driving change in 2015<\/p>\n<p>IT professionals need to pay attention to new developments, and consider the impact that those products or initiatives can have on the data center &#8212; and the business. At Gartner&#8217;s IT Operations Strategies and Solutions Summit 2015 here this week, analyst David J. Cappuccio outlined 10 IT trends poised to impact data centers over the next year and beyond.<\/p>\n<p>1. Non-stop demand<\/p>\n<p>2. Treating business units as technology startups<\/p>\n<p>3. Internet of Things<\/p>\n<p>4. Software-defined infrastructure<\/p>\n<p>5. Integrated systems evolution<\/p>\n<p>6. Disaggregated systems<\/p>\n<p>7. Proactive infrastructures<\/p>\n<p>8. IT service continuity<\/p>\n<p>9. Bimodal IT<\/p>\n<p>10. Scarcity of IT skills<\/p>\n<p>Link: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=22517b0acd&#038;e=20056c7556<\/p>\n<p>Akerman Joins in Launching Data Law Group<\/p>\n<p>Data security and information governance are the hot practice areas for law firms these days, and nearly every month a new law firm unveils a rebranding effort or a new practice group angling to grow its business in this area. The latest is Akerman, which launched an 18-person Data Law group this month that will focus on data security, information governance and eDiscovery.<\/p>\n<p>Like other law firms operating in this area, Akerman believes data law is a growth area, a view supported by many experts. Mary Meeker, of venture capital firm Kleiner Perkins Caufield &#038; Byers, also highlighted the need for better cybersecurity in her annual presentation on Internet trends earlier this year.<\/p>\n<p>There\u2019s also one other reason Akerman wants to make sure its clients know it has expertise in cybersecurity: Many clients are aware that law firms hold all their data and could be \u201cthe soft back door target\u201d for hackers if there data security isn\u2019t up to snuff, according to Tully.<\/p>\n<p>Link: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b487d69dff&#038;e=20056c7556<\/p>\n<p>Exploit code released for unpatched Internet Explorer flaw<\/p>\n<p>Researchers at computer giant HP have published exploit code that can be used to attack a weakness in Internet Explorer, after Microsoft refused to issue a patch.<\/p>\n<p>In a blog post, Dustin Childs, HP senior security content developer, said the move to publish the flaw was not out of &#8220;spite or malice,&#8221; but was in accordance with its own disclosure policy.<\/p>\n<p>&#8220;Microsoft confirmed in correspondence with us they do not plan to take action from this research, we felt the necessity of providing this information to the public,&#8221; said Childs. That&#8217;s in spite of Microsoft earlier this year awarding the team $125,000 &#8212; which was later donated &#8212; for discovering the flaw.<\/p>\n<p>The bug allows an attacker to bypass Address Space Layout Randomization (ASLR), which acts as one of the many lines of defense in the popular browser. But the flaw only affects 32-bit systems, which the HP researchers said still affects millions of systems, even if many systems nowadays are 64-bit.<\/p>\n<p>Link: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d5fbab84dc&#038;e=20056c7556<\/p>\n<p>How more joined-up security thinking could save billions in data breach costs<\/p>\n<p>A new study from the Centre for Economics and Business Research (CEBR) has found that data breaches are costing UK businesses \u00a334 billion a year. The report suggests this is made up of \u00a318 billion in lost revenue and \u00a316 billion in added security measures after breaches have occurred.<\/p>\n<p>Very often, security breaches are the result of simple oversights that cybercriminals are always quick to exploit. You can reduce these risks with a security framework that is integrated, coordinated, and context-aware. And as we have noted, this is especially critical for SMB organizations, which typically lack dedicated IT security personnel.<\/p>\n<p>Ultimately, such a joined-up approach will reduce costs and improve security at the same time, simply by requiring fewer products to procure, deploy, manage and expensively maintain.<\/p>\n<p>So maybe we can all think and act in a more joined-up way. With smart investment in the education of staff and products that work better together, we might see more businesses reducing the risk of breaches while avoiding some of the costs.<\/p>\n<p>Link: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=fc6837b74d&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If someone forwarded this email to you and you want to be added in,<br \/>\nplease click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=96a8020d36)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage2.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So onto the news: State of the Network study: How security tasks are dominating IT staff The majority of networking teams are regularly involved in enterprise security tasks. Expert Kevin Beaver explains&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1100","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1100"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1100\/revisions"}],"predecessor-version":[{"id":3587,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1100\/revisions\/3587"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}