{"id":1167,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail166-atl61-mcsv-net\/"},"modified":"2021-12-30T11:38:53","modified_gmt":"2021-12-30T11:38:53","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail166-atl61-mcsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail166-atl61-mcsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail166.atl61.mcsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo onto the news:<\/p>\n<p>Cyber Attacks on the Rise in Media Biz Since Sony Hack: Survey (Exclusive)<br \/>\nFindings exclusively provided to Variety by PwC from its forthcoming annual Global State of Information Security Survey portray an industry that may be far more focused on cybersecurity, yet still beleaguered by invasions from both inside and outside their companies.<br \/>\nOf the 319 execs in the media business surveyed worldwide in May and June, 46% reported having been subject to cyberattacks over the past year from third parties such as hackers that targeted digital media in advance of a major launch such as theatrical or DVD releases (see chart below).<br \/>\nWhen asked the same question last year, only 29% reported such incursions.<br \/>\nHackers aren\u2019t the only people media companies need to worry about; their own employees are becoming a more worrisome threat over the past year, according to 45% of those surveyed, as are vendors that work with the company (37%).<br \/>\nBoth employees and vendors were moderately less problematic last year, considering 2015 survey results.<br \/>\nThe increasing threat has ignited a wave of higher spending in entertainment companies\u2019 security budgets, with the average total information security budget jumping from $3.6 million last year to $4.5 million this year.<br \/>\nAverage total financial losses as a result of security incidents, however, dropped from $2.3 million to $1.9 million.<br \/>\nRespondents indicated that they appreciated Big Data security results, as it provided them with improved understanding of both external and internal security threats, prioritizing the two almost equally above Big Data\u2019s other benefits (like understanding of user behavior or prior detection of threats).<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=12f6108e60&#038;e=20056c7556<\/p>\n<p>Survey Finds 47% of Companies and Government Agencies Have Been Breached in Last Two Years<br \/>\nIID, the source for clear cyberthreat intelligence, today announced the immediate availability of the IID and Ponemon Institute survey entitled, \u201cExchanging Cyber Threat Intelligence: There Has to Be a Better Way.\u201d The second annual survey includes insight from 692 IT and IT security professionals from both global businesses and government agencies, who answered more than three-dozen questions around threat intelligence sharing.<br \/>\nThe majority of organizations where those employees work have more than 1,000 employees.<br \/>\n&#8211; Exchanging threat intelligence is imperative and good for the U.S.<br \/>\n&#8211; Timeliness is the most important threat intelligence quality<br \/>\n&#8211; Most using free sources, but not confident in data<br \/>\n&#8211; Issues are still stopping the exchange of threat intelligence<br \/>\nTo download the complete survey findings, go to internetidentity.com.Stock trades at over 10x sales with an increasing share count.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=50f13f1a81&#038;e=20056c7556<\/p>\n<p>Cybersecurity: The Hottest Millennial Career Track<br \/>\nIt seems as if every week a major corporation, government office or retailer suffers from a hacking, resulting in compromised personal information for millions of employees or customers.<br \/>\nAccording to a recent survey from Raytheon (RTN), 79% of U.S. businesses suffered a cybersecurity incident within the last year.<br \/>\nRaytheon\u2019s survey found that 41% of Millennials are interested in cybersecurity careers provided they know what the job entails.<br \/>\nUp until now, it\u2019s easy to envision cybersecurity professionals as \u201cloners sitting in a dark room\u201d says Maclin.<br \/>\nRaytheon cites that exposing students to cybersecurity studies earlier in their education can help with the perception.<br \/>\nBut Millennials are interested in the profession&#8211;they just have a difficult time accessing the field.<br \/>\nAccording to Raytheon, the majority of Millennials are not exposed to careers in cybersecurity during their education.<br \/>\nThe survey found that 64% of Millennials had never heard about cybersecurity careers from a teacher, while 43% said that there were no cybersecurity programs or activities available to them in school.<br \/>\nAnd there\u2019s a gap within the gap, with just 33% of female Millennials aware of cybersecurity professions compared to 51% of men.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e1978d1bdf&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=8b6275c4f6)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So onto the news: Cyber Attacks on the Rise in Media Biz Since Sony Hack: Survey (Exclusive) Findings exclusively provided to Variety by PwC from its forthcoming annual Global State of Information&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1167","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1167"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1167\/revisions"}],"predecessor-version":[{"id":3654,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1167\/revisions\/3654"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}