{"id":1203,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail31-wdc03-rsgsv-net\/"},"modified":"2021-12-30T11:38:57","modified_gmt":"2021-12-30T11:38:57","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail31-wdc03-rsgsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail31-wdc03-rsgsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail31.wdc03.rsgsv.net;"},"content":{"rendered":"<p>People have been asking how many different mailing newsletter I produce.  Here&#8217;s a link to page that lists the IT Security Lists I produce, with subscribe links:  http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4a9bc271bc&#038;e=20056c7556<br \/>\nSubscribe to any you are interested in.<br \/>\nRegards<br \/>\nPaul<\/p>\n<p>* SAP security breaches are on the rise, so what&#8217;s being done about it?<br \/>\n* Your HR policies should help, not hinder, data breach response<br \/>\n* So You Want to Be a Security Researcher?<br \/>\n* IBM promotes bitcoin tech for banks<br \/>\n* Threat Intelligence: The hot topic that makes people hesitant<br \/>\n* Cybercriminals motives more diverse<br \/>\n* A Proactive Approach To Incident Response: 7 Benefits<\/p>\n<p>SAP security breaches are on the rise, so what&#8217;s being done about it?<br \/>\nSAP platforms are likely to contain malware: 75% of respondents say it is very likely (33%) or likely (42%) SAP platforms have one or more malware infections.<br \/>\nBreaches can&#8217;t be detected immediately: There is little confidence a breach involving the SAP platform would be detected immediately or within one week.<br \/>\nNo one is taking responsibility for SAP security: Respondents believe it is the responsibility of SAP, not their company, to ensure the security of its applications and platform, according to 54% of respondents.<br \/>\nNo one is accountable if a data breach involving a SAP system: 30% respondents say no one is most accountable<br \/>\nIoT and other new technologies are having a major impact: 59% of respondents believe new technologies and trends such as cloud, mobile, big data and the Internet of Things increases the attack surface of their SAP applications.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8b22e53643&#038;e=20056c7556<\/p>\n<p>Your HR policies should help, not hinder, data breach response<br \/>\nSAP platforms are likely to contain malware: 75% of respondents say it is very likely (33%) or likely (42%) SAP platforms have one or more malware infections.<br \/>\nBreaches can&#8217;t be detected immediately: There is little confidence a breach involving the SAP platform would be detected immediately or within one week.<br \/>\nI<br \/>\nNo one is taking responsibility for SAP security: Respondents believe it is the responsibility of SAP, not their company, to ensure the security of its applications and platform, according to 54% of respondents.<br \/>\nNo one is accountable if a data breach involving a SAP system: 30% respondents say no one is most accountable<br \/>\nIoT and other new technologies are having a major impact: 59% of respondents believe new technologies and trends such as cloud, mobile, big data and the Internet of Things increases the attack surface of their SAP applications.<br \/>\nHR policies should impose a duty on employees to promptly report any circumstances that may give rise to a data breach, such as the loss or theft of devices containing protected information, and to cooperate in any ensuing investigation.<br \/>\nIn response to a data security incident, your company will need the ability to access and forensically investigate its own computer systems and devices, including information created and stored by employees.<br \/>\nIn some incident scenarios, particularly for companies with a Bring Your Own Device (BYOD) policy or practice, incident response may require investigation of smartphones and other data storage devices owned by employees.<br \/>\nIf a mobile device containing protected information (whether or not encrypted) has gone missing or has been stolen, it is invaluable for the company to have the ability to geolocate the device, to remotely lock or \u201ckill\u201d the device, or otherwise make its data inaccessible.<br \/>\nIn other incidents, a physical search of company premises may be needed, such as to account for missing data storage devices, or in a rogue employee scenario.<br \/>\nCompanies must be cognizant of how these provisions interact with other policies in their employee handbook, and with workplace laws.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=7197f4f3cd&#038;e=20056c7556<\/p>\n<p>So You Want to Be a Security Researcher?<br \/>\nSecurity research includes a wide spectrum of tasks, says James Treinen, vice president of security research at ProtectWise, developer of a cloud-based platform that uses a virtual camera to record everything on an organization\u2019s network, letting security personnel see threats in real- time.<br \/>\nSecurity researchers take apart malware to see what vulnerabilities the malicious software is exploiting and glean intelligence out of the malware \u2013 how it communicates and how it is structured.<br \/>\nThey use that information to track adversaries and groups by the attack methods they have deployed.<br \/>\nAmong other things, they then build behavior profiles so security analysts and incident responders can find future instances of the malicious software.<br \/>\nAutomated tools let security analysts drill down to the malware\u2019s bits and assemble code to determine how it executed an attack.<br \/>\nThis is a different end of the security research spectrum.<br \/>\nOther security researchers\u2019 tasks might include building and hardening operating systems and networks, Treinen says.<br \/>\nA person looking to move into security research has to be immersed in technology with a desire to understand the workings of malware, encryption, and network forensics and web applications because they are all intertwined.<br \/>\nPlus, as a security researcher, you are not going do the same thing each day.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=03a8b3bda1&#038;e=20056c7556<\/p>\n<p>IBM promotes bitcoin tech for banks<br \/>\nMUMBAI: Tech giant IBM is seeing several uses for Blockchain &#8211; the technology behind Bitcoin cryptocurrency &#8211; in the financial sector.<br \/>\nBesides identifying it as a cost-efficient method of conducting transactions, IBM sees this as an alternative to one-time passwords in the long run.<br \/>\n&#8220;We are committed to Blockchain technology.<br \/>\nReleasing the code and making it available on the Linux platform is a start for us.<br \/>\nOnce developers take it on, then you will have use cases identified.<br \/>\nOnce the ecosystem is in place, then we expect that some of the players involved with clearing transactions will be the first to take it on,&#8221; said Vaibhav Khandelwal, Trusteer leader, IBM.<br \/>\nTrusteer is a security software firm founded in Israel and acquired by IBM in 2013.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=062d6d078f&#038;e=20056c7556<\/p>\n<p>Threat Intelligence: The hot topic that makes people hesitant<br \/>\nSAN FRANCISCO \u2013 All this week, Salted Hash will be walking the halls of the RSA Conference in California.<br \/>\nThe running theme this week is threat intelligence; what it is and what it isn&#8217;t, the vendors who produce it, and the people who use it.<br \/>\nFor two weeks, Salted Hash attempted to locate security practitioners in various market segments to talk about threat intelligence, incident response, and how the two areas overlap.<br \/>\nIt wasn&#8217;t easy.<br \/>\nFirst, while most were willing to share their experiences, they wouldn&#8217;t or couldn&#8217;t share proof of those experiences, such as redacted screenshots of the product, or anything that would confirm they were a customer of a given vendor.<br \/>\nSecond, there was another segment of people willing to talk, but only in a general sense, because the threat intelligence vendor was holding non-disclosure agreements over their heads.<br \/>\nFireEye was one of the vendors where customers stated they couldn&#8217;t speak due to a non-disclosure agreement.<br \/>\nAs it turns out, FireEye customers are in fact free to talk about their experiences, they just can&#8217;t share content.<br \/>\nMaybe the entire notion of a vendor forcing non-disclosure agreements needs to be examined.<br \/>\nIs it useful.<br \/>\nSure, keeping the sauce a secret has advantages, but how far is too far?<br \/>\nThe issue with false positives, too many alerts, and a lack of clear context will come up several times this week.<br \/>\nIt&#8217;s one of the largest sources of pain for practitioners working with threat intelligence feeds and platforms.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b9d731adb7&#038;e=20056c7556<\/p>\n<p>Cybercriminals motives more diverse<br \/>\nThis is one of the key findings from the sixth annual Mandiant M-Trends report (registration required for a free report), which was compiled from advanced threat investigations conducted by Mandiant consultants in 2015.<br \/>\nKevin Mandia, SVP, and president at FireEye said disruptive attacks had increased last year and were designed to cause either public or financial harm and were typically carried out by financially motivated attackers or hacktivist groups with political or social agendas.<br \/>\nThe report also found that organisations are discovering breaches sooner.<br \/>\nIn 2015, the median number of days\u2019 attackers were present on a victim\u2019s network before being discovered dropped to 146 days from 205 days in 2014; while this number is getting better, it\u2019s clear there is still room for improvement.<br \/>\nWhereas in years gone by attackers tended to stay silent in networks for as long as possible, the report found the rise of extortion and more disruptive attacks means an organisation may discover it has been breached by the culprit themselves.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=59512c7735&#038;e=20056c7556<\/p>\n<p>A Proactive Approach To Incident Response: 7 Benefits<br \/>\nHere are six examples of how digital forensic readiness can enhance an organization\u2019s proactive approach to incident response.<br \/>\nBenefit 1: Lower Investigative Costs<br \/>\nBenefit 2: Targeted Security Monitoring<br \/>\nBenefit 3: Crime Deterrence<br \/>\nBenefit 4: Investor Confidence<br \/>\nBenefit 5: Enhanced eDiscovery<br \/>\nBenefit 6: Fast Disclosure &#038; Penalty Avoidance<br \/>\nBenefit 7: You\u2019re Probably Already Doing It<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=71f8c707f3&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is:  dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:    Subscribe to this list (http:\/\/paulgdavis.us3.list-manage1.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p> Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage1.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=02af41a0b8)<\/p>\n<p> Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>People have been asking how many different mailing newsletter I produce. Here&#8217;s a link to page that lists the IT Security Lists I produce, with subscribe links: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4a9bc271bc&#038;e=20056c7556 Subscribe to any you are interested in. Regards Paul * SAP security breaches are on the rise, so what&#8217;s being done about&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1203","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1203"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1203\/revisions"}],"predecessor-version":[{"id":3690,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1203\/revisions\/3690"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}