{"id":1208,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail206-suw14-mcdlv-net\/"},"modified":"2021-12-30T11:38:57","modified_gmt":"2021-12-30T11:38:57","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail206-suw14-mcdlv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail206-suw14-mcdlv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail206.suw14.mcdlv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<\/p>\n<p>* These 5 Facts Explain the Increasingly Tense Geopolitics in Asia<br \/>\n* Army app invites public to thwart terrorism<br \/>\n* Avoid Key Cloud Services Mistakes<br \/>\n* TeslaCrypt ransomware now impossible to crack, researchers say<br \/>\n* XO Communications research reveals that 56 percent of businesses worry about cloud data security<br \/>\n* \u201cDizzying\u201d threat-analytics growth reflects demand for high-speed, hybrid security tools: Arbor exec<br \/>\n* Merchants Ask Court for Relief from EMV Liability Shift<br \/>\n* LinkedIn being used as a &#8216;front door&#8217; to phishing attacks<br \/>\n* Cert-RO sees rise in malware<br \/>\n* Sverdis Offers Businesses Free 14-Step Ransomeware Protection Plan for a Limited Time<br \/>\n* Cyphort and Ponemon Institute Study Reveals Alarming Number of CEOs Still in the Dark About Cyber Threats and Companies Spend Majority of Time Chasing False Positives<br \/>\n* Attackers Continue to Access Valuable, Sensitive Data According to SANS Endpoint Security Survey<br \/>\n* Rethinking branch IT in the new age of security<br \/>\n* BAE Profiles \u2018World\u2019s Most Dangerous Cybercriminals\u2019<br \/>\n* Why the next wave of cybersecurity talent won\u2019t have a \u2018security\u2019 job title<br \/>\n* Top U.S. Cybersecurity Salaries Hit $420,000<br \/>\n* Mitre Takes On Critics, Set To Revamp CVE Vulnerability Reporting<br \/>\n* Security On-Demand Partners with National University to Launch Cybersecurity Internship Program<\/p>\n<p>These 5 Facts Explain the Increasingly Tense Geopolitics in Asia<br \/>\nThe Middle East gets all the attention, but Asia is a major security concern for the U.S.<br \/>\nAnd the situation is getting more tense<br \/>\nWhile the geopolitics of Asia look relatively stable in 2016\u2014especially compared to other hot spots\u2014there\u2019s no shortage of conflicts simmering beneath the surface.<br \/>\nThese five facts detail what you need to know about Asia\u2019s fluid security situation:<br \/>\nt\u2019s a very large ocean away, but the U.S. is still Asia\u2019s dominant military presence.<br \/>\nWith the Trans-Pacific Partnership trade deal on the horizon, the U.S. will have even more incentive to maintain a strong military presence in the region.<br \/>\nChina is less than thrilled by that prospect.<br \/>\nAs its economy has soared in recent decades, so has its military spending.<br \/>\nExhibit A: the South China Sea.<br \/>\nDisputes among China, Vietnam, Malaysia, Brunei, Taiwan and the Philippines over who controls these waters have raged for more than a century.<br \/>\nAt stake is a deep reservoir of oil and natural gas, and control of one of the world\u2019s most important trading channels.<br \/>\nRoughly 30 percent of all maritime trade travels through the South China Sea every year.<br \/>\nSince the end of World War II, Japan has pursued a purely defensive military strategy, outsourcing its security to Washington.<br \/>\nBut Japan doubts America\u2019s longer term staying power in Asia, and Tokyo fears that conflicts in the South China Sea will set a dangerous precedent for its maritime disputes with China in the East China Sea.<br \/>\nThe flare-up in the East China Sea a few years ago caused Japanese shipments to China to fall 14.1 percent from a year earlier after Chinese began boycotts.<br \/>\nThe Democratic People\u2019s Republic of Korea is the black box of international politics.<br \/>\nEven traditional ally China can\u2019t be certain what\u2019s going on there.<br \/>\nBeijing understands that North Korea\u2019s belligerence keeps thousands of U.S. troops in South Korea.<br \/>\nBut to avoid regime collapse and a flood of North Korean refugees\u2014as many as 200,000 of them\u2014China continues to prop up Kim Jong-un.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8ecd3b86c0&#038;e=20056c7556<\/p>\n<p>Army app invites public to thwart terrorism<br \/>\nThe latest app from the Army is all about safety and security.<br \/>\nRedstone Arsenal leaders now calling on the public to thwart terrorist activity.<br \/>\nIt\u2019s called iWatch.<br \/>\nIt\u2019s the latest in Redstone Arsenal\u2019s anti-terrorism efforts.<br \/>\nUsers can choose to receive messages, such as emergency notifications and Amber alerts.<br \/>\nYou can find the app by searching with the term iWatch Army.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b3e902cd92&#038;e=20056c7556<\/p>\n<p>Avoid Key Cloud Services Mistakes<br \/>\nThis first of a three-article series on the cloud takes a look at where the security industry was coming from 10 years ago, and contrasts that with where the industry is now with regard to cloud adoption.<br \/>\nA lot of mistakes have been made to date in the adoption of information technology, which makes it likely that mistakes will be made with regard to security industry cloud services.<br \/>\nThe primary challenge for security industry manufacturers is to keep up with information technology developments when technology advancement continues to accelerate at a pace that is hard to imagine.<br \/>\nRight now many security industry companies are working hard to catch up, a challenge that is very much like running up a down escalator that keeps moving faster and faster.<br \/>\nThe first mistake on the part of industry manufacturers was due to confusion about what was meant by the term \u201ccloud service\u201d or \u201ccloud system.\u201d The mistake was thinking that a \u201ccloud system\u201d was any kind of server or system connected to the Internet.<br \/>\nThis came about because companies \u2014 not just in the security industry \u2014 provided \u201chosted systems,\u201d which were client-server systems that customers could connect to over the Internet.<br \/>\nThey came to think that \u201ccloud\u201d was just a new name for what they already had in place.<br \/>\nCloud services can be much more secure than systems deployed on customer premises.<br \/>\nThis is because the cost of security is shared by many customers, all of whom benefit equally from the security controls that are in place.<br \/>\nThis is why security can be better \u2014 including system redundancy in multiple geographic locations \u2014 and still cost less for each customer than the customer\u2019s own security controls would cost, for both physical and electronic security measures.<br \/>\nCloud service providers can staff top-notch system security teams, the equivalent to which would be cost-prohibitive for a customer to establish.<br \/>\nDocumentation for a cloud service is important \u2014 and on a positive note, many security industry companies generally do a good job on product and system documentation.<br \/>\nHowever, it is not just cloud system architecture design information that is needed.<br \/>\nWhere and how data is stored, including backups and redundant system elements must be provided; along with the lifecycle of backed up data, the standard to which data erasure is performed and encryption details.<br \/>\nThere are legal considerations having to do with privacy protection that vary from country to country, and must be taken into account.<br \/>\nSome countries require that data of private citizens not leave the country.<br \/>\nNote: The next two articles in this series will cover evaluating cloud services \u2014 including cloud services architecture from the National Institute of Standards and Technology, and security guidance from the Cloud Security Alliance \u2014 and providing value-add components to cloud services that integrators provide to their customers.<br \/>\nLook for them in upcoming issues of SD&#038;I.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=75375426a0&#038;e=20056c7556<\/p>\n<p>TeslaCrypt ransomware now impossible to crack, researchers say<br \/>\nThe latest version of the TeslaCrypt ransomware has tidied up a weakness in previous versions that in some cases allowed victims to recover their files without paying a ransom.<br \/>\nCisco&#8217;s Talos research group found that TeslaCrypt 3.0.1 has improved its implementation of a cryptographic algorithm making it impossible now to decrypt files.<br \/>\nWeaknesses in versions of TeslaCrypt allowed researchers to create tools including TeslaCrack, Tesladecrypt and TeslaDecoder for people to decrypt their files without paying a ransom.<br \/>\nThat encryption weakness has now been closed.<br \/>\nBacking up files is the best defense, but the FBI warned last month that cybercriminals are increasingly aiming &#8220;to infect whole networks with ransomware and use persistent access to locate and delete network backups,&#8221; according to the Security Ledger.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=7b9a8df94c&#038;e=20056c7556<\/p>\n<p>XO Communications research reveals that 56 percent of businesses worry about cloud data security<br \/>\nFifty-six percent of businesses are concerned that security gaps at the connection point between their Wide Area Network (WAN) and public cloud service providers may compromise their data used in the cloud, according to a recent XO Communications-commissioned study.<br \/>\nXO Communications (XO) commissioned IDG to conduct research regarding business concerns about the security and visibility of wide area network (WAN) connection points with the public cloud.<br \/>\nThe survey respondents were employees at organizations that plan to connect their WAN to a public cloud services provider.<br \/>\nThe results were published in a whitepaper entitled Where Cloud Meets WAN.<br \/>\nVisibility and management of the connection between the WAN and the public cloud provider is a growing challenge that many IT departments are now facing.<br \/>\nAccording to the XO study, only thirty-eight percent of respondents have excellent or very good visibility into their WAN cloud connection points.<br \/>\nThis lack of visibility has led many organizations to deploy or investigate a solution to protect network traffic.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a71a639280&#038;e=20056c7556<\/p>\n<p>\u201cDizzying\u201d threat-analytics growth reflects demand for high-speed, hybrid security tools: Arbor exec<br \/>\nRecent rapid growth in the market for threat-analytics tools has been \u201ca little bit dizzying\u201d but new approaches to network security are compensating for limitations on \u201coverwhelmed\u201d security incident and event management (SIEM) tools, according to an Arbor Networks senior executive who has been pleasantly surprised with the strong response to the company&#8217;s high-speed security technology.<br \/>\nArbor Networks, which has built out a suite of products and services focused on detecting and blocking distributed denial of service (DDoS) attacks, joined Cisco a year ago to integrate its anti-DDoS technology with Cisco&#8217;s modular Aggregation Services Router 9000 (ASR-9000) product.<br \/>\n\u201cIn Spectrum we&#8217;ve got a technology that looks at the packets, understands what&#8217;s going on and can help stitch together very quickly and accurately, things that can be very nefarious in nature,\u201d he said. \u201cUltimately we can avoid where you have to go into that full postmortem cleanup.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2ec9120dd4&#038;e=20056c7556<\/p>\n<p>Merchants Ask Court for Relief from EMV Liability Shift<br \/>\nIn an anti-trust complaint, two small merchants in Florida say they, and many other retailers, are unfairly being forced to pay fraud-related expenses as a result of the EMV liability shift even though they converted to EMV technology by the card brands&#8217; deadline.<br \/>\nThe merchants claim that, despite their timely efforts to purchase and install EMV-compliant point-of-sale equipment, as well as train staff about the shift from magnetic-stripe transactions to EMV chip payments, the card brands and issuing banks failed to ensure those terminals were certified EMV-ready by the Oct. 1, 2015, liability shift date.<br \/>\nAs a result, the merchants claim they have racked up combined total expenses of more than $10,000 to cover fraudulent transactions and fees from Oct. 1 through Feb. 15.<br \/>\nAmong other things, the lawsuit is asking the court to order that the card brands and banks pay affected merchants damages to compensate for fraud expenses that have been shifted back.<br \/>\nAdditionally, the suit asks that the card brands pay merchants for so-called &#8220;overcharges,&#8221; or their perceived overpayment for fraud, because the interchange fees they pay the card networks to process transactions are, in part, set up to cover fraud losses.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=23f05fa40a&#038;e=20056c7556<\/p>\n<p>LinkedIn being used as a &#8216;front door&#8217; to phishing attacks<br \/>\nLinkedIn is now being used by hackers to make contact with potential victims, in order to encourage them to open their malicious emails, and click on their links.<br \/>\n&#8220;We have had both via an email and telephone an attempt to extort money by someone purporting to be the CFO.<br \/>\nIt was intercepted both times because we have some very vigilant people trained to spot things that don&#8217;t look right.<br \/>\nWe had one this week, a scam email passed to me by a partner, and the person who sent [the scam mail] had connected with the partner on LinkedIn prior to sending the email.<br \/>\nEwan gave the example of a fake email which purported to come from vehicle registration and licensing body the DVLA, which appeared at BLM recently.<br \/>\n&#8220;One day we had 2,500 copies of same email in 10 minutes, which purported to come from the DVLA.<br \/>\nThe email had a specific car registration number, and people still clicked on it [despite the registration number listed not being their own].<br \/>\nOne person clicked who didn&#8217;t even have a car.<br \/>\nIt&#8217;s because people are very busy, and the default is to click on things.&#8221;<br \/>\n&#8220;We now sandbox all attachments, and we receive around 35,000 per week, and we check all URLs that come in.<br \/>\nWe see between five and 10 malicious attachments per week.<br \/>\nOf the 6,500 URLs clicked per week, about 10 go to malicious sites.<br \/>\nIt&#8217;s interesting to see how messy the internal environment would be if we didn&#8217;t have that protection,&#8221; she concluded.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=9cc8adb45f&#038;e=20056c7556<\/p>\n<p>Cert-RO sees rise in malware<br \/>\nRomania&#8217;s National Centre for Cyber \u200b\u200bSecurity Incident Response (Cert-RO) has presented its annual report for 2015 and plans for 2016.<br \/>\nLast year the centre received and processed over 68.2 million incident reports.<br \/>\nIn total, over 2.3 million unique IP addresses were involved.<br \/>\nThe majority of alerts (78%) were about vulnerable systems, that were not secure or improperly protected.<br \/>\nJust over one in five alerts involved forms of malware, and around 6 percent were related to botnet systems.<br \/>\nTowards the end of the year, Cert-RO said it saw an increasing number of incidents affecting local government bodies, including cases of ransomware, and it expects the latter problem to increase in 2016.<br \/>\nThis year it plans, in cooperation with the communications ministry, to conduct a cyber security exercise involving the public and private sector.<br \/>\nIt will also help set up the new Centre for Innovation in Cyber \u200b\u200bSecurity and start projects on a early warning and real-time information system and education for students on cyber security.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3cc0156c37&#038;e=20056c7556<\/p>\n<p>Sverdis Offers Businesses Free 14-Step Ransomeware Protection Plan for a Limited Time<br \/>\nThe guide, which can be found at http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1367bbf3c8&#038;e=20056c7556 offers a cyber security expert&#8217;s guidelines on how to prevent a malware or ransomware attack from unscrupulous terrorists who now have the talent and finances to create malware that fools even the most vigilant of users.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=901817a720&#038;e=20056c7556<\/p>\n<p>Cyphort and Ponemon Institute Study Reveals Alarming Number of CEOs Still in the Dark About Cyber Threats and Companies Spend Majority of Time Chasing False Positives<br \/>\nSANTA CLARA, Calif.&#8211;(BUSINESS WIRE)&#8211;Cyphort, the next generation Advanced Persistent Threat (APT) defense company, today announced the results of a Ponemon Institute survey titled The State of Malware Detection &#038; Prevention.<br \/>\nAccording to the study, 34 percent of CEOs and other C-level executives are completely in the dark about cyber-attacks against their companies.<br \/>\nThis is despite the fact that 63 percent of respondents admitted that their companies had been the victims of one or more advanced attacks during the past 12 months.<br \/>\nThis lack of senior executive awareness parallels the fact that 39 percent of respondents don\u2019t believe their company has the necessary intelligence to make a convincing case to the C-suite about the threats facing their company.<br \/>\nOther key survey findings include:<br \/>\n&#8211; There is good and bad news regarding advanced attacks against the surveyed companies.<br \/>\n&#8211; The Bad: 21 percent of respondents took anywhere from 1-2+ years to detect the attack.<br \/>\n&#8211; Getting malware attacks under control continues to be a challenge for companies.<br \/>\n&#8211; Thirteen percent of companies expect their 2016 security budget to decrease.<br \/>\n&#8211; You Can\u2019t Stop What You Can\u2019t See.<br \/>\n&#8211; Investigations of malware alerts often are false positives.<br \/>\n&#8211; Organizations reimage endpoints based on malware detected in the network.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=df960bb46a&#038;e=20056c7556<\/p>\n<p>Attackers Continue to Access Valuable, Sensitive Data According to SANS Endpoint Security Survey<br \/>\nPASADENA, Calif.&#8211;(BUSINESS WIRE)&#8211;Cyber attackers are gaining access to valuable, sensitive data, such as login and access credentials, according to the 3rd Annual SANS Endpoint Security Survey conducted by SANS Institute and co-sponsored by Guidance Software.<br \/>\nThis data can be used to further compromise networks and gain access to sensitive information on employees, customers and company intellectual property and trade secrets.<br \/>\nOther highly compromised data included email files (28 percent) and sensitive customer or employee data (17 percent).<br \/>\nThe survey results highlight the need for a more proactive approach to detecting threats and compromises.<br \/>\nWhile 44 percent of respondents said that their endpoint systems have been compromised within the last 24 months, 15 percent reported that they didn\u2019t know how many threats were detected through proactive hunting.<br \/>\nFor the second year in a row, more than a quarter of respondents were notified of a breach by a third party.<br \/>\nThe complete survey results will be discussed in greater detail in a two-part webcast titled, \u201cSANS 2016 Endpoint Security Survey Part 2: Can We Say Next-Gen Yet?\u201d on Friday, March 18 at 1 p.m.<br \/>\nET. \u201cHow Close We Are to Having Next-Gen Capabilities\u201d will be covered on March 19 at 1 p.m.<br \/>\nET.<br \/>\nFor more information and to register, please visit: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=9ca9c6e1b8&#038;e=20056c7556.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=deb831f3e1&#038;e=20056c7556<\/p>\n<p>Rethinking branch IT in the new age of security<br \/>\nconsider this: as of now, nearly 50% of enterprise data is stored in branch offices and remote locations \u2013 far from a secure datacenter \u2014 an average of 50% of employees are located in branch offices, and nearly 50% of IT\u2019s budget is dedicated to supporting branch and remote locations.<br \/>\nThis in itself is not surprising given that branch offices are the revenue-generating front lines of business.<br \/>\nBut if we\u2019ve learned anything from recent events, it\u2019s that storing sensitive data in remote locations can be very bad news.<br \/>\nThis should raise a red flag, because if there\u2019s anywhere in your organization where you need to improve operations and application performance, it\u2019s at your branch offices.<br \/>\nCompanies have on average 55 remote IT facilities for every large datacenter. (Source: IDC 2013 Enhancing Business Value with an Edge-Optimized Virtual Server and Storage Delivery Solution.)<br \/>\nThe solution may seem radically counter-intuitive: eliminate traditional server, storage and backup systems at each branch office; instead rethink branch IT and create a \u201cZero Branch IT\u201d model comprised of a hyper-converged infrastructure that dynamically projects apps and data from the centralized datacenter, dramatically reducing corporate risk with no compromise to performance at remote locations \u2013 regardless of distance from the datacenter.<br \/>\nImplementing a Zero Branch IT model enables CIOs to escape this cycle by extending the security, resilience and flexibility of the datacenter out to the edge of the distributed enterprise.<br \/>\nThe technology exists now to deliver new services and applications to each and every branch location quickly and easily as creating new virtual machines in your datacenter.<br \/>\nIn fact, the technology exists now to deploy entirely new branch locations faster than the physical location being ready for business.<br \/>\nCIOs should look for best-practice approaches to managing business-critical branches and remote sites that integrates proven virtualization, storage and WAN optimization technologies, ensuring superior application performance regardless of distance, and for all types of branch applications, whether they\u2019re traditionally run locally at the branch, served from on-premises datacenters, or delivered from private or public clouds.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=53bc4954f1&#038;e=20056c7556<\/p>\n<p>BAE Profiles \u2018World\u2019s Most Dangerous Cybercriminals\u2019<br \/>\nBAE Systems, the London-based, multinational security company, recently released profiles of \u201csix prominent types of cybercriminals\u201d and detailed how they could hurt companies around the globe, officials say.<br \/>\nThe Mule \u2013 naive opportunists that may not even realize they work for criminal gangs to launder money;<br \/>\nThe Professional \u2013 career criminals who work 9-to-5 in the digital shadows;<br \/>\nThe Nation State Actor \u2013 individuals who work directly or indirectly for their government to steal sensitive information and disrupt enemies\u2019 capabilities;<br \/>\nThe Activist \u2013 motivated to change the world via questionable means;<br \/>\nThe Getaway \u2013 the youthful teenager who can escape a custodial sentence due to their age;<br \/>\nAnd The Insider \u2013 disillusioned, blackmailed or even over-helpful employees operating from within the walls of their own company.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3b7f7b6148&#038;e=20056c7556<\/p>\n<p>Why the next wave of cybersecurity talent won\u2019t have a \u2018security\u2019 job title<br \/>\n&#8230;<br \/>\nOver the past five years, we\u2019ve witnessed the state of cybersecurity become chaotic \u2013 and, quite frankly, grim \u2013 across a variety of industries.<br \/>\nHotels, financial institutions, consumer electronics, hospitals, universities, governments, retail chains, telecom providers, airlines, vehicles.<br \/>\nYou name it; it has been hacked.<br \/>\nThis talent war, however, has stemmed from companies associating the threat of data loss with malicious hackers or stolen property.<br \/>\nAnd that is a significant miscalculation on their part.<br \/>\nover the next five years, we will see the next cybersecurity talent war waged over ITAD (IT asset disposition) specialists and managers.<br \/>\nAn ITAD manager\u2019s 360-degree view enables companies to not only reduce security risks, but also to meet the increasingly stringent regulatory requirements for asset disposal, and to avoid costly data breaches and fines from industry regulators or environmental agencies, along with other repercussions that could damage customer loyalty, sales or even stock prices.<br \/>\nThe next several years will be critical for businesses to wrap their heads around the importance of securing defenses internally, in addition to guarding against external threats.<br \/>\nThose that hire an ITAD manager are ahead of the pack in securing every piece of IT equipment, no matter what stage of the lifecycle it is in.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=9c21a99605&#038;e=20056c7556<\/p>\n<p>Top U.S. Cybersecurity Salaries Hit $420,000<br \/>\nIt pays to be in cybersecurity, and it pays well if you&#8217;re at the top of the corporate ladder.<br \/>\nA new report from SilverBull, a technology recruiting firm, reveals how much Chief Information Security Officers make across the United States.<br \/>\nIt&#8217;s no surprise that the highest paying gigs correlate with the cost of living in each city.<br \/>\nAccording to the report, there are currently almost 500 CISO openings across the country.<br \/>\nWe all know that there&#8217;s a major shortage of cybersecurity professionals, so these salaries will continue to trend upwards.<br \/>\nIf you&#8217;re not in cybersecurity, now is the perfect time to jump in.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e3ca836ef1&#038;e=20056c7556<\/p>\n<p>Mitre Takes On Critics, Set To Revamp CVE Vulnerability Reporting<br \/>\nMitre Corporation will introduce a new pilot program for classifying Common Vulnerabilities and Exposures (CVE) in the coming weeks.<br \/>\nThe move is in response to a backlash in the security community where some critics contend Mitre is failing to keep pace with a massive influx in the number of reported vulnerabilities to the organization.<br \/>\nThe pilot program, called Federated CVE-ID Assignment Process, enlists an unspecified number of Mitre partners.<br \/>\nMitre says its editorial board, which includes Cisco, Microsoft, Red Hat and Oracle, will determine how many federated groups will be a part of the pilot.<br \/>\nUnder the program Mitre gives up central control over receiving reported threats, vetting them and assigning them CVE numbers.<br \/>\nInstead, Mitre would share CVE duties with federated partners and act as the administrator of the program.<br \/>\nFor its part, Mitre says it\u2019s working hard to keep pace with a doubling in the number of reported vulnerabilities it has received over the past year.<br \/>\nAccording to Mitre, the agency received 20,000 reported vulnerabilities in 2015 compared to just under 10,000 in 2014.<br \/>\nOthers within the private sector, such as financial institutions and the defense industry, have specialized Information Sharing and Analysis Center (ISAC) groups for tracking latest threats.<br \/>\nKouns himself oversees the Open Source Vulnerability Database (OSVDB), another third-party database and reporting agency.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6dde84e28e&#038;e=20056c7556<\/p>\n<p>Security On-Demand Partners with National University to Launch Cybersecurity Internship Program<br \/>\nSAN DIEGO, March 17, 2016 \/PRNewswire\/ &#8212; Security On-Demand, a leading provider of next generation managed security services announces the launch of the Cybersecurity Internship Program in partnership with National University, the second-largest private nonprofit university in California.<br \/>\nThe program is designed to offer mentorship opportunities with senior security experts and to cultivate careers for students studying cybersecurity.<br \/>\nOver the course of the internship program, students will gain valuable hands-on experience working alongside security analysts in Security On-Demand&#8217;s San Diego Security Operations Center.<br \/>\nNational University is the first and only university in San Diego to be recognized by the National Security Agency and the Department of Homeland Security as a National Center of Academic Excellence in Cyber Defense Education. &#8220;We are thrilled to be partnering with Security On-Demand to offer our students the real-world experience of working in a Security Operations Center,&#8221; said Dr.<br \/>\nJohn Cicero, Dean of National University&#8217;s School of Engineering and Computing.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=98039dd880&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is:  dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:    Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p> Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=e82d288bd6)<\/p>\n<p> Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] * These 5 Facts Explain the Increasingly Tense Geopolitics in Asia * Army app invites public to thwart terrorism * Avoid Key Cloud Services Mistakes * TeslaCrypt ransomware now impossible to crack,&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1208","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1208"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1208\/revisions"}],"predecessor-version":[{"id":3695,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1208\/revisions\/3695"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}