{"id":1194,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail152-atl21-rsgsv-net\/"},"modified":"2021-12-30T11:38:56","modified_gmt":"2021-12-30T11:38:56","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail152-atl21-rsgsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail152-atl21-rsgsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail152.atl21.rsgsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s]<br \/>\nApart from the reporter&#8217;s opinions \ud83d\ude09<br \/>\nSo Im going to be working on a table of contents for the top so look out for that. Im the meantime,<br \/>\nSo onto the news:<\/p>\n<p>Google expands Chrome&#8217;s Safe Browsing defenses to sniff out ad scams<br \/>\nGoogle today said it is expanding its Safe Browsing technology to take into account online ads that try to scam users into divulging personal information or downloading malware masquerading as name-brand software in need of an update.<br \/>\nAds that Google considers &#8220;deceptive&#8221; will trigger a warning in Chrome &#8212; a bright red screen with text that starts, &#8220;Deceptive site ahead&#8221; &#8212; said Ballard.<br \/>\nGoogle&#8217;s broad definition of &#8220;deceptive&#8221; includes any ad that &#8220;pretends to act or look and feel, like a trusted entity,&#8221; or one that tries to &#8220;trick you into doing something you&#8217;d only do for a trusted entity.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a65d0d00b6&#038;e=20056c7556<\/p>\n<p>5 New Rules to Make Escalations More Effective and Efficient<br \/>\nThere is a new adage in the security world: don\u2019t assume you will be hacked, but assume you have already been hacked.<br \/>\nThis forces security professionals to re-examine the validity of the Cyber Kill Chain model\u2014which reinforces traditional, perimeter-focused, malware-prevention thinking\u2014and develop new strategies to deal with persistent and smart attackers, including insider threats.<br \/>\nThese factors make escalation of cyber incidents a huge problem for security staff.<br \/>\nTo this, here are 5 new rules organizations can enforce to make (inevitable) escalations more effective and efficient.<br \/>\n1) Always full cycle, full stack.<br \/>\nIf application developers or DevOps teams can build security practices and software into applications, it reduces vulnerabilities later and provides critical information to response teams trying to track down the source or movement of a breach.<br \/>\n2) Shrink your \u201cattack surface.\u201d<br \/>\nNew approaches such as \u201cringfencing\u201d or microsegmentation of applications and workload mean security teams not only shrink the connections among compromised and uncompromised workloads, they shrink the number of places security investigators must look for incidents.<br \/>\n3) Gain visibility.<br \/>\nYou cannot stop what you cannot see.<br \/>\n4) Increase the speed to quarantine.<br \/>\nTime to discovery and remediation of compromised computing is one of the most critical factors in limiting the scope of damage of an attack.<br \/>\n5) Reduce the human middleware.<br \/>\nIncreasingly, software intelligence that is based on algorithms and machine intelligence will play a huge role in dealing with the speed and scope of escalations.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0825a85336&#038;e=20056c7556<\/p>\n<p>Cisco sees eight-fold increase in mobile data by 2020<br \/>\nThe increase will have a dramatic impact on businesses, as IT managers struggle to securely support mobile workers with wearables and other smart devices that increasingly rely on mobile video.<br \/>\nCisco said that smartphones alone will account for 81% of global mobile traffic by 2020.<br \/>\nIn 2020, mobile data traffic will reach 367 exabytes, up from 44 exabytes in 2015, Cisco said.<br \/>\nThe 2020 forecast number is equivalent to 81 trillion images on MMS, or 28 daily images per person on earth for a year.<br \/>\nIt is also equivalent to 7 trillion video clips, like those on YouTube, which is more than 2.5 daily video clips per person on the planet per year.<br \/>\nMeanwhile, a separate survey &#8212; also released Wednesday &#8212; of 500 U.S.-based IT managers shows that companies already spend an average of $1,840 to support each employee&#8217;s mobile device every year.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ff6f949c7b&#038;e=20056c7556<\/p>\n<p>Security flaws not so critical if admin rights are taken away<br \/>\nPatching software is important, but there are often good reasons why it can&#8217;t happen right away.<br \/>\nA recent analysis of Microsoft&#8217;s 2015 security bulletins shows that restricting account privileges effectively mitigates a majority of the issues.<br \/>\nPrivilege management can protect users while buying time for IT to test and deploy patches.<br \/>\nOverall, 63 percent of all vulnerabilities Microsoft patched in 2015 could have been mitigated by removing administrator rights from user accounts, the company found.<br \/>\nThe figure jumps when narrowing the focus to only critical vulnerabilities.<br \/>\nA little less than half, or 48 percent, of the 2015 patches were rated as critical, but Avecto found that 86 percent of critical flaws could have been mitigated by removing administrator rights.<br \/>\nMicrosoft may call Windows 10 the &#8220;most secure Windows ever,&#8221; but Avecto found the same pattern for Windows 10.<br \/>\nOver a quarter of critical vulnerabilities Microsoft fixed in 2015 affected Windows 10, and 82 percent of vulnerabilities that affected Windows 10 could have been mitigated.<br \/>\nServer operating systems weren&#8217;t exempt from this analysis either, since Avecto found that 85 percent of critical vulnerabilities affecting Windows Server could be mitigated just by paying attention to the user privileges.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d6256e9f18&#038;e=20056c7556<\/p>\n<p>Bouygues forms IoT subsidiary Objenious<br \/>\nFrench operator Bouygues Telecom has formed IoT subsidiary Objenious.<br \/>\nThe new connected objects division is headed by Stephane Allaire, with around 20 staff members.<br \/>\nObjenious will use the LoRa network Bouygues Telecom is deploying to connect millions of objects.<br \/>\nThe network is already in place in fifteen metro areas and is expected to cover half of the French population by the middle of the year.<br \/>\nIt will be activated with the first 4,000 antennas at the end of the year.<br \/>\nBouygues is working with partners such as Watteco, Eolane and Finsecure to address its clients\u2019 different requirements.<br \/>\nThe cloud service is based on HP Enterprise\u2019s IoT platform (HPE IoT Platform).<br \/>\nIngenious will provide connectivity and secure data centre storage, data collection and network visualisation to industry standards.<br \/>\nAtos subsidiary Bull is supplying its KMS security software tp deliver end-to-end encryption.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=30485362f9&#038;e=20056c7556<\/p>\n<p>Allot MobileTrends Report Reveals Mobile Business Users Incur Highest Malware Risk<br \/>\nHOD HASHARON, Israel, Feb. 3, 2016 \/PRNewswire\/ &#8212; Allot Communications Ltd. (NASDAQ, TASE: ALLT), a leading global provider of security and monetization solutions that enable service providers to protect and personalize the digital experience, together with Kaspersky Lab announced today the release of Allot MobileTrends Report H1 2016, Mobile Users at Risk.<br \/>\nUsing a range of behavioral profiles, the report analyzes the correlation between mobile apps and URLs usage and user potential for malware risk.<br \/>\nFindings show that individual behavior is a significant and even decisive indicator of malware risk.<br \/>\nThe report goes on to suggest that communication service providers (CSPs) are uniquely positioned to safeguard mobile users at risk with targeted Security-as-a-Service delivered from their network or cloud.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=aa4b8a1bb1&#038;e=20056c7556<\/p>\n<p>Cyber Crime Forensics, LLC Unveils Cybercrime Forensics Training Center to Train New Breed of Cyber Professionals<br \/>\nBOISE, Idaho, Feb. 3, 2016 \/PRNewswire\/ &#8212; Cybercrime is the fastest growing area of crime in the world.<br \/>\nThe demand for cyber security professionals is higher than ever.<br \/>\nTo help solve these critical issues, Richard Plummer, CEO of Cyber Crime Forensics, LLC is launching the Cybercrime Forensics Training Center in Boise Idaho, to train a new breed of cyber warriors.<br \/>\nCCFTC provides the world&#8217;s best digital forensics and cyber security training to produce the most advanced digital forensics experts in computer forensics, incident response and media exploitation.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=bb2c96e6e6&#038;e=20056c7556<\/p>\n<p>New Ponemon Institute Study Reveals Nearly 80 Percent of German Organizations Aren\u2019t Prepared for a Cyber Security Incident<br \/>\nThe latest research on Cyber Resilience from the prestigious Ponemon Institute shows that 79 percent of security executives reported that they aren\u2019t prepared for a cyber security incident.<br \/>\nAnd only 21 percent have the technology in place to respond to a cyberattack.<br \/>\nThis new independent study, The Cyber Resilient Organisation in Germany: Learning to Thrive against Threats, from privacy and information security research firm Ponemon Institute, benchmarks German organisations\u2019 resilience to cyber threats.<br \/>\nSurprisingly, the German study also revealed that 54 percent rated their cyber resilience as high, suggesting a gap between perceived resilience and reality.<br \/>\nThis is the third report in a series of cyber resilient studies, with founding sponsor, Resilient Systems, the leader in incident response management software.<br \/>\nThe first study was published in the US last year and the second study was released earlier this week in the UK.<br \/>\nSimilar to the UK findings, insufficient planning and preparedness and organisational factors are identified as major barriers to achieving cyber resilience.<br \/>\nGermany is undergoing significant changes to its regulations around cybersecurity.<br \/>\nThe Upper House of the German Parliament ratified legislation on the cyber protection of critical infrastructure in July 2015 and German lawmakers have been driving the upcoming EU-wide Network and Information Systems Directive (NISD) and the General Data Protection Regulation (GDPR), which contain mandatory breach reporting requirements and require companies to clearly document their incident response strategies.<br \/>\n79% reported that they have either ad-hoc or no cyber-incident response plans.<br \/>\nThe majority of German security leaders reported that the state of cyber resilience in their organisation is high even without a planned or practiced response<br \/>\nPersistent attacks are the greatest threat to cyber resilience<br \/>\nOrganisational factors also make cyber resilience difficult to achieve<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6af04e7a49&#038;e=20056c7556<\/p>\n<p>Australian companies &#8216;open to cyber crime&#8217;<br \/>\nAustralian companies could risk becoming &#8220;low-hanging fruit&#8221; for cyber criminals due to a lack of education and an unwillingness to properly deal with threats.<br \/>\nJames Nunn-Price, who leads Deloitte&#8217;s Asia Pacific Cyber unit, said companies were failing to report ransomware &#8211; which locks users out of their computers until they pay a fee &#8211; and instead perpetuate the practice by coughing up the cash.<br \/>\n&#8220;I&#8217;m amazed at how many Australian businesses pay the money &#8230; certainly some super funds, insurers and corporates pay the money because it&#8217;s just easier to pay a few hundred dollars and then they wonder why six weeks later they get hit again,&#8221; Mr Nunn-Price told reporters on Monday.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=83ba65b42b&#038;e=20056c7556<\/p>\n<p>Tripwire Study: Two-Thirds of Energy Sector IT Professionals Lack Visibility into Cyber Attacks That Cause Physical Damage<br \/>\nTripwire, Inc., a leading global provider of advanced threat, security and compliance solutions, today announced the results of a study conducted for Tripwire by Dimensional Research on the cyber security challenges faced by organizations in the energy sector.<br \/>\nThe study was carried out in November 2015, and respondents included over 150 IT professionals in the energy, utilities, and oil and gas industries.<br \/>\nAccording to Tripwire\u2019s study, eighty-two percent of the respondents said a cyber attack on the operational technology (OT) in their organization could cause physical damage.<br \/>\nHowever, when asked if their organization has the ability to accurately track all the threats targeting their OT networks, sixty-five percent replied, \u201cno.\u201d<br \/>\nAdditional findings from the study include:<br \/>\nMore than three out of four respondents (seventy-six percent) believe their organizations are targets for cyber attacks that could cause physical damage.<br \/>\nSeventy-eight percent of respondents said their organizations are potential targets for nation-state cyber attacks.<br \/>\nOne-hundred percent of energy executive respondents believe a kinetic cyber attack on operational technology would cause physical damage.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d77bce16a9&#038;e=20056c7556<\/p>\n<p>What can be done to protect Singapore from cyber attacks?<br \/>\nThe Cyber Security Agency was set up in 2015 to work with various sectors to ensure that Singapore stays resilient against cyber attacks.<br \/>\nA new five-year National Cyber Security Masterplan 2018 has also been launched by the Infocomm Development Authority, aimed at strengthening Singapore\u2019s cyber security efforts.<br \/>\nLast year, global intelligence agency Interpol\u2019s Global Complex for Innovation (IGCI) set up a Digital Crime Centre in Singapore to enable more information sharing between law enforcement agencies and the private sector to combat cyber crimes.<br \/>\nAs cyber attacks get more sophisticated, Singapore has even looked beyond its shores to strengthen its cyber defences, partnering with countries such as India and the United States in information sharing in this field.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e4cddedde9&#038;e=20056c7556<\/p>\n<p>Air Force Academy&#8217;s Innovation Center has big cyber plans<br \/>\nAcademy Superintendent Lt. Gen. Michelle Johnson told a crowd Wednesday at the Rocky Mountain Cyberspace Symposium at The Broadmoor that the Air Force Cyber Innovation Center, being established this year on the campus, will eventually study technical, social and legal problems in the online world.<br \/>\nJohnson spoke to the largest gathering of cybersecurity experts in the region who are in the midst of a three-day conference sponsored by the local chapter of the Armed Forces Communication and Electronics Association that ends Thursday.<br \/>\nThe symposium drew 2,000 participants including top military brass and industry leaders.<br \/>\nThe academy&#8217;s cyber efforts, she said, will be closely tied to work at Air Force Space Command, which is leading Air Force computer warfare efforts.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=0aaab8328b&#038;e=20056c7556<\/p>\n<p>Europe, US Cut 11th Hour Safe Harbor Deal<br \/>\nEurope and the United States on Tuesday announced a new Safe Harbor agreement that neutralizes the threat of enforcement actions against domestic companies handling overseas data.<br \/>\nCalled the &#8220;EU-US Privacy Shield,&#8221; the agreement aims to protect the privacy of data belonging to European citizens when it&#8217;s handled by U.S. companies.<br \/>\nWithout a new Safe Harbor agreement to protect U.S. companies handling the data of European citizens from EU privacy restrictions, enforcement actions would have begun immediately, noted Neil Stelzer, general counsel for Identity Finder.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c1fc89834a&#038;e=20056c7556<\/p>\n<p>Information governance hard to achieve, worth effort to protect data<br \/>\nInformation governance (IG) is nearly impossible to achieve, but is a goal worth pursuing to protect the privacy of sensitive data and ensure organizations can meet discovery requests, according to a panel at the LegalTech show in New York.<br \/>\nChris Sitter, eDiscovery &#038; Digital Forensics Senior manager, Juniper Networks: \u201cIt&#8217;s the dream to chase, the ideal,\u201d said Chris Sitter, eDiscovery &#038; digital forensics senior manager at Juniper Networks.<br \/>\nWith current tech almost impossible to achieve.\u201d<br \/>\nAllan Hsu, director of eDiscovery\/ligitation at Fannie Mae, warned against treating all data the same. \u201cIt creates unneeded complexity and will likely cause non-compliance among your employees,\u201d he said, noting that it&#8217;s important to create workable solutions for protecting information.<br \/>\nHe pointed to BYOD as an example where employees use personal devices to store and move corporate information. \u201cYou could put them in a container but it&#8217;s not efficient,\u201d he said, raising the specter of personal privacy issues. \u201cCan you really collect someone&#8217;s personal device.<br \/>\nIt&#8217;s like going into their house and looking through their drawers.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=93a40e46f3&#038;e=20056c7556<\/p>\n<p>What\u2019s Worse Than Stolen Data? Altered Data<br \/>\nAttacks that previously were considered advanced threats are commodities today, with sophisticated malware and exploits available for the price of a movie ticket, according to Amit Yoran, president of RSA, the security division of EMC.<br \/>\nAnd yet, important results due to this evolution seem to be misunderstood; the threats that matter most are attack campaigns that use multiple exploitation methods and backdoors to assure persistence. &#8220;Incomplete incident scoping has become a critical and consistent mistake made by security teams,&#8221; Yoran said.<br \/>\nThis year was also characterized by security vendors claiming to be able to prevent advanced threat breaches when, in fact, they cannot, he said.<br \/>\nOrganizations recognized the need to monitor and defend their digital environments differently, but continued to center the security programs on the same technologies and approaches they have always used\u2014hoping for a different outcome, but not acting differently.<br \/>\nHere are some emerging trends Yoran advises you to prepare for this year.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=18a4bf3aa3&#038;e=20056c7556<\/p>\n<p>U.S. businesses on their own when facing foreign cyber attacks<br \/>\nBOCA RATON, Fla. \u2014 Cyber attacks by nation states are a serious threat to U.S. business, and companies should not rely on the government to protect them from the attacks, said Mike Rogers, a former chairman of the House Intelligence Committee.<br \/>\nChina, Russia, North Korea and Iran are targeting U.S. businesses, in many cases to steal intellectual property and in other cases to disrupt operations, but privacy laws in the U.S. prevent government security agencies from protecting commercial enterprises from the attacks, said the former Republican congressman from Michigan.<br \/>\n\u201cThe (National Security Agency) is not permitted to be on your networks; it&#8217;s against the law of the United States.<br \/>\nThe only way they catch an attack coming in is if they catch it overseas first, so every American with your own network, you&#8217;re on your own,\u201d he said.<br \/>\nBuying cyber insurance can help concentrate the minds of executives on cyber security, he said.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=7304529802&#038;e=20056c7556 (http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=66e4a3fb59&#038;e=20056c7556)<\/p>\n<p>IoT poses one of insurance industry&#8217;s biggest underwriting challenges: Rosenbaum<br \/>\nOne of the insurance industry&#8217;s biggest challenges on the underwriting side is \u201chow to effectively and profitably transfer cyber risk with respect to machine-to-machine technology,\u201d so-called Internet of Things, Brian Rosenbaum, national director of the Legal and Research Practice at Aon Risk Solutions, said Tuesday during an industry event.<br \/>\n\u201cI really can\u2019t overestimate how significant the risks associated with machine-to-machine technology are, despite the tremendous benefits that the Internet of Things will confer,\u201d Rosenbaum told those assembled for the 49th Annual Canadian Insurance Claims Managers Association\/ Canadian Independent Adjusters\u2019 Association Ontario Chapter Joint Conference in downtown Toronto.<br \/>\nReports are that by 2020, billions of machines will be exchanging data on a daily basis, he said. \u201cWhat I\u2019m concerned about is that the underwriting community is not ready for this.<br \/>\nWe don\u2019t really appreciate how vulnerable we are to cyber terrorism, extortion, systems breakdown and just plain mischief.\u201d<br \/>\nIndeed, typical cyber policies contain a bodily injury and property exclusion that applies to third-party liability, meaning \u201cthat will lead to a lack of coverage for any of these Internet of Things exposures we\u2019re talking about today,\u201d Rosenbaum said.<br \/>\nThe same is true of E&#038;O (errors and omissions) and D&#038;O when they contain the same type of exclusionary language, he said.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a0688b62a2&#038;e=20056c7556<\/p>\n<p>CrowdStrike Global Threat Report Analyses the Biggest Cyber Crime and Targeted Intrusion Trends<br \/>\nIRVINE, Calif.&#8211;(BUSINESS WIRE)&#8211;CrowdStrike Inc., a leader in cloud-delivered next-generation endpoint protection, threat intelligence and response services, today announced the release of its 2015 Global Threat Report.<br \/>\nThe report, issued annually, analyzes more than 70 designated adversaries, providing details about their behavior, capabilities, and intentions related to targeted intrusions, e-crime, and hacktivist campaigns.<br \/>\nNotable Highlights of the 2015 Global Threat Report:<br \/>\nEconomic, geopolitical and diplomatic events are becoming the driving force behind today\u2019s cyber threat landscape, the effects of which are being felt by organizations around the world.<br \/>\nDeep dive into the key factors shaping the targeted intrusion campaigns of notable nation-state adversaries, including China, Russia, Iran, North Korea, etc.<br \/>\nThe rise of extortion-based criminal operations including use of ransomware, banking trojans, and exploit kits, along with intelligence-powered social engineering scams, phishing campaigns, and more.<br \/>\nUptick in sophistication and scale of terrorism-related hacktivist groups and online censorship in the Middle East.<br \/>\nForward-looking predictions about emerging threats, espionage activity, personally identifiable information usage, new e-crime waves, and disruptive attacks that impact businesses globally<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4eed117cbc&#038;e=20056c7556<\/p>\n<p>Target exec joins cybersecurity board<br \/>\nBrad Maiorino, Target senior VP and chief information security officer, is the newest member of the Retail Cyber Intelligence Sharing Center (R-CISC) board of directors.<br \/>\nIn addition, R-CISC recently teamed up with Target to host the first Retail Cybersecurity Analyst Hunting Expedition at Target\u2019s headquarters in Minneapolis.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=081e1fb9f7&#038;e=20056c7556<\/p>\n<p>5 ways analysts can find priority threats<br \/>\nThe big question is: How can IT directors ensure that their analysts accomplish these things and, subsequently, pinpoint which threats they should be spending time on.<br \/>\nThere are five key tactics that will help directors improve their incident readiness and response and reduce risks early on, which they can then share with their analysts.<br \/>\n1) Clearly define analysts\u2019 roles and responsibilities<br \/>\n2) Enhance training on avoiding advanced threats<br \/>\n3) Formalise response processes and procedures<br \/>\n4) Improve formalised incident response tracking\/workflow<br \/>\n5) Focus on Cyber Threat Intelligence<br \/>\nThe above procedures are a must-have for organisations in the fight against the growing sophistication of cyber threats.<br \/>\nIt\u2019s imperative that organisations are proactive.<br \/>\nCyber criminals like to stay on the cutting edge and security analysts must stay right on that edge with them in order to protect sensitive data.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e9189f93e5&#038;e=20056c7556<\/p>\n<p>Europol, a new move against terrorism and money laundering<br \/>\nSince 1 January 2016, Europol has increased the level of integration among the nodes of the decentralised computer network of the European Union Member States\u2019 Financial Intelligence Units (FIUs), the FIU.net.<br \/>\n\u201cFIU.NET is a decentralised computer network supporting the FIUs in the European Union in their fight against Money Laundering and Terrorist Financing.<br \/>\nDecentralised meaning, that there is no central database in one specific Member State where all the exchanged data is stored.<br \/>\nWhen sending the information from one FIU to another, the exchanged data is only and safely stored on the FIU.NET databases at the premises of the FIUs involved in the exchange.\u201d states the description on the website of the FIU network.<br \/>\nThis is an important step against crime and terrorism, data from financial intelligence could be integrated with information related criminal intelligence activity conducted by the Europol, an important knowledge sustained with data provided by the Law Enforcement agencies of the EU countries.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e12dbdb750&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:   ** Subscribe to this list (http:\/\/paulgdavis.us3.list-manage1.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p>** Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage2.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=bf17584a05)<\/p>\n<p>** Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s] Apart from the reporter&#8217;s opinions \ud83d\ude09 So Im going to be working on a table of contents for the top so look out for that. Im the meantime, So onto the news: Google expands Chrome&#8217;s Safe Browsing defenses&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1194","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1194"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1194\/revisions"}],"predecessor-version":[{"id":3681,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1194\/revisions\/3681"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}