{"id":1143,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail160-atl171-mcdlv-net\/"},"modified":"2021-12-30T11:38:50","modified_gmt":"2021-12-30T11:38:50","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail160-atl171-mcdlv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail160-atl171-mcdlv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail160.atl171.mcdlv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo onto the news:<\/p>\n<p>End-to-end encryption is key for securing the Internet of Things<br \/>\nThe Internet of Things (IoT) is one of the hottest buzzwords these days.<br \/>\nIt seems like almost everything is being connected, including cars, streetlights, oil rigs, wearables and more.<br \/>\nBy the end of this decade, Gartner estimates there will be 26 billion IoT devices in service, while IDC predicts 28.1 billion.<br \/>\nThose attacks are in addition to those that leverage the IoT to steal credit information, corporate secrets and other data.<br \/>\nThe Ponemon Institute\u2019s 2015 Cost of Data Breach Study: Global Analysis says the average cost of each lost or stolen record containing sensitive and confidential information increased from $145 in 2014 to $154 this year.<br \/>\nIoT will drive that cost even higher simply because it increases the number of attack opportunities.<br \/>\nIn fact, IDC predicts that by the end of 2016, 90 percent of all IT networks will have experienced an IoT-based security breach.<br \/>\nWithin the next five years, 90 percent of all IoT data will reside in third-party clouds, IDC predicts.<br \/>\nThat statistic is just one example of why enterprises, government agencies and other organizations should take adopt an \u201cencrypt-everything\u201d strategy to protect against IoT-enabled breaches.<br \/>\nIn the Internet of Everything, data will reside everywhere, which means a lot of that data can\u2019t be protected by traditional, network-centric devices such as firewalls.<br \/>\nOnly end-to-end encryption can provide the security necessary to minimize IoT-enabled breaches.<br \/>\nHowever, the encryption technology must be designed for modern use cases and devices, such as by making the most efficient possible use of processors and batteries.<br \/>\nOrganizations that choose the right encryption solution and then apply it everywhere will be best equipped to address IoT-enabled threats.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c4e0619f8f&#038;e=20056c7556<\/p>\n<p>Why you Should Start Considering an Endpoint Management Upgrade<br \/>\nRather than managing and reporting on all endpoints in a holistic way, today\u2019s marketplaces are managing different endpoint classes (PCs, servers, mobile devices) and non-traditional endpoints (ATMs, kiosks, and POS systems), with a wide range of tools\u2014and sometimes with completely different IT teams.<br \/>\nOn top of that, they may use a variety of tools for different environments (Windows, Mac, Linux, etc.), as well as for different lifecycle functions (configuration, security enforcement, patching automation, etc.).<br \/>\nThis system of management is becoming extremely inefficient.<br \/>\nUnified endpoint management (UEM) is the solution to IT\u2019s fragmented endpoint management issue.<br \/>\nThis full lifecycle management of endpoints allows organizations to utilize one single vendor and systems management platform to support a diverse and ever-growing deployment environment.<br \/>\nVDC Research recently released a full report on the business value of UEM solutions, in addition to discussing the top businesses innovating in the space.<br \/>\nIn this report, VDC Research analyzed survey data from over 90 IT decision-makers, who either had direct involvement in purchasing and\/or using endpoint management solutions within their organization.<br \/>\nIt\u2019s a veritable smorgasbord of information that makes a serious business case for switching to UEM solutions.<br \/>\nEven with this rather apparent need for multi-endpoint management, few solutions have emerged that are truly implementing an effective, worthwhile endpoint management strategy for both traditional and mobile endpoints.<br \/>\nVDC stresses the operational and cost efficiencies that UEM solutions provide, which exceed the limitations of two separate management tools.<br \/>\nAlong with the shared use of hardware, people, resources, and policy infrastructure, UEM offers IT admins with improved organization-wide mobility that encompasses all endpoint devices \u2013 one endpoint management solution to rule them all.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ab132e5f07&#038;e=20056c7556<\/p>\n<p>EU, U.S. clinch data-sharing deal for security, terrorism cases: document<br \/>\nBRUSSELS (Reuters) &#8211; The European Union and the United States have clinched a deal protecting personal data shared for law enforcement purposes such as terrorism investigations, according to a document seen by Reuters.<br \/>\nThe text of the agreement has been finalized, according to the document.<br \/>\nA person familiar with the matter said it will be initialed by the chief negotiators in Luxembourg on Monday or Tuesday.<br \/>\nThat would signal the end of talks.<br \/>\nThe two sides have been negotiating for four years over the so-called &#8220;umbrella agreement&#8221; that would protect personal data exchanged between police and judicial authorities in the course of investigations, as well as between companies and law enforcement authorities.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e4f3eca411&#038;e=20056c7556<\/p>\n<p>Six Security Hang-ups: Beware the Black Holes<br \/>\nHow secure are you about your security.<br \/>\nAccording to the past three Trustwave Global Security Reports, the hospitality industry is one of the top three most compromised industries.<br \/>\nAnd Privacyrights.org reports a 50 percent increase in hospitality breach disclosures in 2014.<br \/>\nBelow are the top security pitfalls among hospitality businesses as identified by Trustwave:<br \/>\n&#8211; Insufficient malware protection<br \/>\n&#8211; Employees have too much access<br \/>\n&#8211; Lack of BYOD security<br \/>\n&#8211; Outdated security controls<br \/>\n&#8211; Unsecure applications and databases<br \/>\n&#8211; Customer approval supersedes security<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d388b17105&#038;e=20056c7556<\/p>\n<p>Act on your Threat Intelligence<br \/>\nWarning intelligence attempts to answer two main questions: what\u2019smost likely to happen and what\u2019s the most dangerous thing that can happen.<br \/>\nThe idea being if you\u2019re prepared for the worst, anything that falls short should be dealt with handily.<br \/>\nThe problem of course is that few people think the worst is going to happen to them.<br \/>\nA decision-maker may opt toheighten readiness (\u201cHey everyone, keep your eyes open this week\u201d) but take no far-reaching action because the \u201cmost likely\u201d scenario is something existing mechanisms and capabilities can address.<br \/>\nBut what about the \u201cmost dangerous\u201d scenario.<br \/>\nWell, what used to happen, with alarming frequency, was that decision-makers would look at their position (Generals or Admirals) and trust in the thought- and decision-making process that got them those stars and say, \u201cWhat do those nerds know anyway.<br \/>\nHow could a bunch of hackers cause me any pain and suffering?\u201d<br \/>\nCyber threat intelligence is just one of many things that you can use to help defend your enterprise, but it is not a silver bullet.<br \/>\nThe vast majority of the time the warnings you receive are going to be busts.<br \/>\nYou\u2019re going to start to think over time that because nothing you have been warned about has ever happened nothing will ever happen.<br \/>\nThat\u2019s the point at which you\u2019re going to devalue intelligence and be caught by \u201csurprise.\u201d Intelligence will have \u201cfailed\u201d you and you will go looking for heads to cut off.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1bbc4e9f79&#038;e=20056c7556<\/p>\n<p>Borderless Cyber 2015<br \/>\nOASIS, in collaboration with The World Bank, will bring together public and private sector security professionals from around the world to evaluate, debate, and collaborate on cyber threat intelligence best practices and tools.<br \/>\nHosted at The World Bank D.C. headquarters, the forum program will feature presentations from experts responsible for cyber security initiatives for public, private, and global institutional sectors.<br \/>\nIn order to facilitate meaningful interaction, attendees are encouraged to share their questions, challenges, experiences and recommendations with our expert panel of presenters.<br \/>\nCurrent initiatives aimed at sharing cyber threat intelligences and response information in real time through systems and software will be a highlight.<br \/>\nBest practices, standards, specifications, and tools, such as STIX, TAXII and CybOX, will be part of the program.<br \/>\nExecutives responsible for developing, influencing and managing critical infrastructure security decisions are invited to attend this conference.<br \/>\nThis includes&#8230;<br \/>\nOnsite participation is limited, use our online reservation form to reserve a seat.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=9eb790c569&#038;e=20056c7556<\/p>\n<p>Akerlof And Shiller, Phishing For Phools<br \/>\nGeorge A.<br \/>\nAkerlof and Robert J.<br \/>\nShiller, who previously collaborated to produce Animal Spirits, have joined forces again.<br \/>\nTheir new book is Phishing for Phools: The Economics of Manipulation and Deception (Princeton University Press, 2015).<br \/>\nTheir thesis is simple but powerful: that &#8220;competitive markets by their very nature spawn deception and trickery, as a result of the same profit motives that give us our prosperity.&#8221; (p. 165) Economies &#8220;have a phishing equilibrium in which every chance for profit more than the ordinary will be taken up.&#8221; (p. 2) Free-market equilibrium undermines our plans to eat healthily, it makes us pay too much for our cars and houses, it transforms rotten assets into gold.<br \/>\nWe have weaknesses that can be exploited (monkeys on our shoulders), weaknesses that free markets by their very nature exploit.<br \/>\nAkerlof and Shiller modestly claim to be making only &#8220;a small tweak to the usual economics (by noticing the difference between optimality in terms of our real tastes and optimality in terms of our monkey-on-the-shoulder tastes).<br \/>\nBut that small tweak for economics makes a great difference to our lives.<br \/>\nIt&#8217;s a major reason why just letting people be Free to Choose &#8211; which Milton and Rose Friedman, for example, consider the sine qua non of good public policy &#8211; leads to serious economic problems.&#8221; (p. 6)<br \/>\nPhishing for Phools forswears technical language, making this book accessible not only to economists but to consumers and policymakers.<br \/>\nIt should make everyone rethink the unfettered free-market model.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6062027455&#038;e=20056c7556<\/p>\n<p>Angler plonks August&#8217;s Flash feeding frenzy into its boat<br \/>\nCrooks behind the world&#8217;s worst exploit kit, Angler, have added the latest Adobe Flash vulnerabilities to the suite&#8217;s long list of attack vectors.<br \/>\nAngler now sports support for some of the 35 Flash player holes detailed and patched last month that includes eight memory corruption flaws and five type confusion bugs.<br \/>\nFrench malware man Kafeine said that Angler had added an integer overflow (CVE-2015-5560) that allows for arbitrary code execution via unspecified vectors.<br \/>\nThe Angler exploit uses Diffie-Hellman key exchange to help tailor attacks to victims, a method authors used last month when they rolled in an Internet Explorer double-free vulnerability into the hacking kit. \u00ae<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b9b648fbed&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If someone forwarded this email to you and you want to be added in,<br \/>\nplease click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage1.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=59c58fe616)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage2.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So onto the news: End-to-end encryption is key for securing the Internet of Things The Internet of Things (IoT) is one of the hottest buzzwords these days. It seems like almost everything&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1143","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1143"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1143\/revisions"}],"predecessor-version":[{"id":3630,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1143\/revisions\/3630"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1143"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}