{"id":1156,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail42-atl11-rsgsv-net-2\/"},"modified":"2021-12-30T11:38:52","modified_gmt":"2021-12-30T11:38:52","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail42-atl11-rsgsv-net-2","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail42-atl11-rsgsv-net-2\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail42.atl11.rsgsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo onto the news:<\/p>\n<p>Cost? Here&#8217;s why many companies not using threat intelligence portals<br \/>\nA new survey conducted by Osterman Research on behalf of DomainTools found that only 50 percent of companies with an average of 20,000 employees, where the majority had experienced a data breach over the past 12 months, use a threat intelligence portal.<br \/>\nDespite the 66 percent year-over-year increase in cyber attacks since 2009, nearly 50 percent of respondents do not currently have a threat intelligence solution, said the report.<br \/>\nFor many, cost is the main blocking issue with 60 percent of organisations concerned about the expense of implementing a threat intelligence platform to mitigate a &#8220;potential&#8221; breach before it happens.<br \/>\nA strong majority of identified attacks continue to come from either email or website navigation, making DNS (in the form of email or web domains and IP addresses) a key component for attack execution.<br \/>\nOnly 1 percent of organisations would not use a threat intelligence solution if it were made available to them, the report stated.<br \/>\nIf given a modest budget increase, only 21 percent said they would invest in staffing, while 70 percent would choose either infrastructure, SIEM or threat intelligence.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=cde9aa79bc&#038;e=20056c7556<\/p>\n<p>Verisign opens up its DNS<br \/>\nVerisign is throwing its hat into the \u201cfree DNS\u201d ring, promising not to retain information about recursive requests to its just-launched service.<br \/>\nVerisign Public DNS is at 64.6.64.6 \/ 64.6.65.6, alas nowhere near as easy for people to remember as Google&#8217;s 8.8.8.8 \/ 8.8.4.4.<br \/>\nIn the blog post launching the service, the director of product management for the service Michael Kaczmarek says most people don&#8217;t understand that their recursive DNS requests can be, and routinely are, harvested, stored, mined and \u201csold to the highest bidder\u201d.<br \/>\nFor the more advanced users, there&#8217;s also IPv6 servers at 2620:74:1b::1:1 \/ 2620:74:1c::2:2.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=35d4aeb89b&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage1.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage1.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=37547cdc7e)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So onto the news: Cost? Here&#8217;s why many companies not using threat intelligence portals A new survey conducted by Osterman Research on behalf of DomainTools found that only 50 percent of companies&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1156","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1156"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1156\/revisions"}],"predecessor-version":[{"id":3643,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1156\/revisions\/3643"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}