{"id":1213,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail173-atl21-rsgsv-net\/"},"modified":"2021-12-30T11:38:58","modified_gmt":"2021-12-30T11:38:58","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail173-atl21-rsgsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail173-atl21-rsgsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail173.atl21.rsgsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<\/p>\n<p>* Breaking down the walls between IT and physical security<br \/>\n* How to Prepare for a DDOS attack<br \/>\n* What Is Data Minimization? And Why It Matters In The Age Of Big Data<br \/>\n* Taking the pulse of your information security culture<br \/>\n* How to review and test backup procedures to ensure data restoration<br \/>\n* Imperva Hacker Intelligence Initiative Report Finds Insider Threats In 100 Percent of Studied Environments<br \/>\n* Good morning. Thank you for inviting me to be the first speaker at the inaugural Incident Response Forum of the Cybersecurity Docket. I want to take a moment to underscore the importance of what you are launching here today, and that is to sponsor an event that focuses exclusively on response and re<br \/>\n* Beyond Technology: Managing the Blind Spots of Database Security<br \/>\n* Infosys : \u200bACM and Infosys Foundation Honor Innovator in Network Security Research<br \/>\n* Neustar : Security Report Shows Increased Use of Dangerous Multi-Vector DDoS Attacks Targeting Companies<br \/>\n* Healthcare industry seeks to reform its position as hacking target<br \/>\n* Ransomware: Time for a HIPAA Update?<br \/>\n* Cyber insurance rates fall with lull in major hacks<br \/>\n* Chubb adds cyber bullying coverage to U.S. home insurance policies<br \/>\n* New Portal Launched For ICS\/SCADA Threat Intelligence-Sharing Among Nations<br \/>\n* Vulnerability Spotlight: Lhasa Integer Underflow Exploit<br \/>\n* Risk and compliance largest information management drivers<br \/>\n* Machine Learning In Security: Good &#038; Bad News About Signatures<br \/>\n* SecureWorld Boston highlights value of partnerships<\/p>\n<p>Breaking down the walls between IT and physical security<br \/>\nAccording to Kelsey, one of the systemic problems is that each side \u2013 physical security and cybersecurity \u2013 has been seen as less important by the other and the biggest consequence for that way thinking is increased security exposure for organizations.<br \/>\nIn their ambition to realize all of the benefits that connected technology provides, Kelsey believes there has been \u201cblindness\u201d on the part of organizations and even security professionals when it comes to attaching mission critical systems to the Internet.<br \/>\nGiven the threats organizations face today, Rosenquist believes that physical and IT security need to find common ground upon which they can both work together more efficiently to improve the overall security posture of the businesses for which they work.<br \/>\n\u201cWhat I\u2019m starting to see is the budgets are merging,\u201d Kelsey said. \u201cA lot of the fighting within organizations is because they perceive they\u2019re fighting for the same budget dollar, but as you merge those budgets\u2026 those walls start to come down.<br \/>\nI think if you push the money together, you end up getting better results.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=dfd3e3e1b1&#038;e=20056c7556<\/p>\n<p>How to Prepare for a DDOS attack<br \/>\nVisibility is critical when preparing for issues in your network.<br \/>\nSNMP graphing platforms will tell you an extraordinary amount of information on volumetric attacks.<br \/>\nYou\u2019ll be able to see and (depending on the platform) sometimes even alert on anomalous bandwidth events.<br \/>\nYou\u2019ll be able to track at which port it entered your network, if it\u2019s saturating any links, and even where the attack is headed.<br \/>\nIt\u2019s surprising how many companies I\u2019ve worked with over the years that do not deploy this because it\u2019s such an easy and basic thing to implement.<br \/>\nPrimarily, you need devices that can speak SNMP, such as managed switches, routers, etc., and then you need a platform to query them.<br \/>\nSNMP certainly won\u2019t catch everything, even when the attack is volumetric.<br \/>\nWait, what.<br \/>\nYes, it\u2019s true, they\u2019re good at monitoring traffic levels, but the downside is that they only poll devices on preconfigured intervals.<br \/>\nThe most recent Global Network &#038; Application Security Report found that 57% of cyber attacks lasted less than one hour.<br \/>\nCapacity is a tricky one, though, because how do you plan for enough capacity for a volumetric attack.<br \/>\nDo you buy another 1G link.<br \/>\nMore 10G links.<br \/>\nThere\u2019s a point where that doesn\u2019t become cost effective, and I\u2019ll discuss Radware\u2019s solutions for that at the end, but capacity is a tool that you can use to help alleviate bottlenecks.<br \/>\nYou need a tool that can detect and mitigate instantly.<br \/>\nTraditional firewalls can\u2019t do this and they can even cause an outage, as I\u2019ve shown in a previous post.<br \/>\nTo truly have complete coverage, you need a purpose-built DDoS mitigation appliance that can handle these complex attacks and can begin mitigating instantly.<br \/>\nOur award-winning DefensePro product can help you do just that.<br \/>\nThere are several ways to test your network and the attack vector doesn\u2019t necessarily matter for this.<br \/>\nEssentially, you want to go through the steps of a mock attack to see how your plan works.<br \/>\nPersonally, I believe that the best approach is to begin with detection and mitigation at the perimeter of the network.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4047e96946&#038;e=20056c7556<\/p>\n<p>What Is Data Minimization? And Why It Matters In The Age Of Big Data<br \/>\nthe European Union has recently included this in new laws of the Data Protection Act that will come into effect soon.<br \/>\nThe act says, \u201cPersonal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.\u201d<br \/>\nThe Act doesn\u2019t define \u201cadequate, relevant and not excessive,\u201d but in effect it means collecting and holding only the minimum amount of personal data needed to fulfil your purpose.<br \/>\nThis is part of the practice known as \u201cdata minimization.\u201d<br \/>\nInstead of a \u201csave everything\u201d approach, smart data managers are now embracing a data minimization policy, keeping only what\u2019s relevant and necessary.<br \/>\nEven Walmart only relies on the previous 4 weeks of data for its day-to-day merchandising strategies.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2389c7438c&#038;e=20056c7556<\/p>\n<p>Taking the pulse of your information security culture<br \/>\nSecurity culture begins at the top, with the CEO or head of the company.<br \/>\nThis person must model good security practices themselves, and speak sincerely about it at every opportunity.<br \/>\nI have been involved in many an all-hands meeting where the CEO attempted to speak sincerely on a topic while reading to a script created by marketing.<br \/>\nIt is pretty easy for the employees to see right through this.<br \/>\nThe company head must understand enough about security to really speak about it.<br \/>\nAs with the CEO, every manager must live and model good security practice.<br \/>\nTheir involvement must go deeper, however.<br \/>\nSurvey the workforce<br \/>\nTrain the workforce<br \/>\nMake security a campaign<br \/>\nReward good practices<br \/>\nBottom line &#8212; follow the right steps, and your security culture will form on its own.<br \/>\nThe reward will be a workforce focused on keeping the organization safe.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ff09593585&#038;e=20056c7556<\/p>\n<p>How to review and test backup procedures to ensure data restoration<br \/>\nIn this third approach to improving information security incident response, CSO maps your route to successful backup procedure tests and reviews.<br \/>\nBy properly testing and ensuring that your backups are existent and recoverable when data disaster rears its gruesome head, you can rest in the knowledge that information security incidents that could rob your data and interrupt its use will not also leave you without your data altogether.<br \/>\nMicrosoft Technet publishes tips for testing backup and restore procedures under the heading \u201cDeveloping Backup and Restore Procedures\u201d at \u201cTesting Backup and Restore Procedures\u201d.<br \/>\nIt\u2019s important to test often enough as well as to test in a quality sort of fashion.<br \/>\nyou need a formal change management system.<br \/>\nSuch a system will ensure an awareness of change, its potential affects and consequences, and the need to prepare for these ahead of time since something could go wrong during even planned change, according to Gordon.<br \/>\nYou should use commonly occurring real life data disaster scenarios to simulate what your backups will and won\u2019t do in a crisis.<br \/>\nou need to account for instances where you might test backups and restores differently than you typically would.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8c8a95a067&#038;e=20056c7556<\/p>\n<p>Imperva Hacker Intelligence Initiative Report Finds Insider Threats In 100 Percent of Studied Environments<br \/>\nREDWOOD SHORES, Calif., March 31, 2016 (GLOBE NEWSWIRE) &#8212; Imperva, Inc. (NYSE:IMPV), committed to protecting business-critical data and applications in the cloud and on-premises, today unveiled the March Hacker Intelligence Initiative Report: \u201cInsiders: The Threat is Already Within.\u201d This new report, published by the Imperva Defense Center and based on primary research conducted by Imperva, shows that insider threat events were found in 100 percent of the studied environments and went undetected by in-place security measures.<br \/>\nBased on the studied environments and follow-on analysis, the researchers found:<br \/>\nInsider threat events were present in 100 percent of the studied environments, confirming suspicions that insider abuse of data is routinely undetected.<br \/>\nDeception technology, deployed to complement behavioral analysis, positively identified insider threats.<br \/>\nInsider threat incidents were not identified by any existing in-place security infrastructure.<br \/>\nIdentified insider threats spanned malicious, compromised and careless insiders.<br \/>\nIn most cases, insiders took advantage of granted, trusted access to data, rather than trying to directly hack in to databases and file shares.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e6646ca3a5&#038;e=20056c7556<\/p>\n<p>Good morning. Thank you for inviting me to be the first speaker at the inaugural Incident Response Forum of the Cybersecurity Docket. I want to take a moment to underscore the importance of what you are launching here today, and that is to sponsor an event that focuses exclusively on response and re<br \/>\nGood morning.<br \/>\nThank you for inviting me to be the first speaker at the inaugural Incident Response Forum of the Cybersecurity Docket.<br \/>\nI want to take a moment to underscore the importance of what you are launching here today, and that is to sponsor an event that focuses exclusively on response and recovery in the event of a cyberattack.<br \/>\nSo far, the global economy and our financial infrastructure have been spared a cyber attack with far-reaching consequences to our financial system and our nation\u2019s economy.<br \/>\nHand in hand with the financial sector, as many of you know, we have discussed creating a cyber-resilient financial structure by focusing on three imperatives: First, we have discussed at length the importance of information sharing, which we emphasize is a necessary shield to attacks coming from the same IP addresses, from the same malware, from the same vectors.<br \/>\nSecond, we have discussed\u2014at length\u2014baseline protections.[2] We stay apprised of attack methods and vectors that are actually being deployed and with this forensic analysis, we derive a constantly updated set of baseline protections that we recommend that firms deploy.<br \/>\nThe third imperative is the subject of today\u2019s conference.<br \/>\nToday, under your leadership, we\u2019re going to discuss together what we can do once attacked, once intruded upon, once we are forced to perhaps shut down, to respond to the incident and then to recover from it in a way that minimizes both the short-term and long-term costs and damage.<br \/>\nThe variable that we want to minimize is time.<br \/>\nThe longer we take to respond and recover, the greater the damage to the firm, to the firm\u2019s customers, to the entire financial sector, and ultimately and possibly to the nation\u2019s economy and the global economy.<br \/>\nHow to minimize the variable of time, in the age of internet speed, is the challenge of effective response and recovery.<br \/>\nGiven the increasing number and morphing nature of cyber assaults, we must prepare for the eventuality of significant cyber incidents.<br \/>\nBy deploying the tools of preparation, coordination, and practice, the government, the financial sector, and their advisors can exponentially accelerate cyber response and can recover in a way that does not prolong the opportunity for damage\u2014damage not only to the firms that compose our nation\u2019s financial infrastructure, but also damage to the people of our country who rely on this financial infrastructure.<br \/>\nWith this preparation, if and when a significant cyber incident occurs, we will be better equipped to respond and recover with level heads, and carry on with the business of returning to normal functioning.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=86a0d44f04&#038;e=20056c7556<\/p>\n<p>Beyond Technology: Managing the Blind Spots of Database Security<br \/>\nA truly effective database security program must incorporate people, process, and policy into a holistic approach customized for every company&#8217;s needs, and then be reinforced with robust security technologies.<br \/>\nThe technology is not a cure-all on its own, and the human element plays a major role in creating an effective, security program.<br \/>\nOnly when done thoroughly and effectively does this strategy provide a solid security framework for a business.<br \/>\nContinuous assessment is the first step to creating an effective database security plan.<br \/>\nYou need to know where your data resides in order for you to protect it.<br \/>\nOnce you know where your data resides, you can work to monitor it, and protect it from intruders.<br \/>\nOnce all baselines\u2014asset and human behavior alike\u2014are created, businesses can begin effectively monitoring for anomalies to enter the database.<br \/>\nEffective database security should be accurate and intuitive, scalable for a distributed architecture, customizable in its policies, comprehensive in its reports and helpful in the prioritization of issues to be addressed.<br \/>\nIt should also be layered with existing security efforts and solutions in order to provide a holistic approach to security.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=fe41e96352&#038;e=20056c7556<\/p>\n<p>Infosys : \u200bACM and Infosys Foundation Honor Innovator in Network Security Research<br \/>\nNEW YORK and BANGALORE, March 30, 2016 &#8211; ACM, the Association for Computing Machinery, (www.acm.org) and the Infosys Foundation announced today that Stefan Savage from the University of California, San Diego is the recipient of the 2015 ACM-Infosys Foundation Award in the Computing Sciences.<br \/>\nHe was cited for innovative research in network security, privacy and reliability that has taught us to view attacks and attackers as elements of an integrated technological, societal and economic system.<br \/>\nSavage&#8217;s impact on the field of network security stems from the systematic approach he takes to assessing problems and combating adversaries ranging from malicious software and computer worms to distributed attacks.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d2a335d49f&#038;e=20056c7556<\/p>\n<p>Neustar : Security Report Shows Increased Use of Dangerous Multi-Vector DDoS Attacks Targeting Companies<br \/>\nNeustar, Inc. (NYSE: NSR), a trusted, neutral provider of real-time information services, today released its first report from the Neustar Security Operations Center (SOC) that shares technical insights gained from the distributed denial of service (DDoS) attacks mitigated by the company in 2015.<br \/>\nOne of the most alarming trends noted in the findings is the rise of multi-vector attacks.<br \/>\nRather than just use one style of method to breach a company&#8217;s infrastructure, attackers are increasingly turning to multi-vector attacks to exhaust defenses.<br \/>\nStatistics from Neustar&#8217;sSecurity Operations Center uncovered:<br \/>\n\u2022 47 percent of all multi-vector attacks occurred in the fourth quarter<br \/>\n\u2022 17 percent of attacks involved multiple vectors<br \/>\n\u2022 57 percent of all multi-vector attacks involved reflection attacks<br \/>\nFoster calls out the following five key takeaways for CIOs:<br \/>\nDeath by a Thousand Cuts.<br \/>\nNot every attack is intended to cause an outage<br \/>\n\u2022 They Are the Most Dangerous Times of the Year.<br \/>\n\u2022 Attackers chose high-volume transaction periods \u2013 such as the tax return period and Q4 for some of their most vicious strikes.<br \/>\n\u2022 Defend your DNS.<br \/>\n\u2022 The Combat Continues.<br \/>\nDDoS attacks are inevitable.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=27b328e4c4&#038;e=20056c7556<\/p>\n<p>Healthcare industry seeks to reform its position as hacking target<br \/>\nIn a heavily regulated industry like healthcare, IT security officers are not only expected to have data-security chops but also a solid background in compliance \u2014 including specific experience with HIPAA, HITECH, and PCI DSS \u2014 which isn&#8217;t easy to come by in an employment market where even newbie cybersecurity pros are being offered comfortable starting salaries.<br \/>\n\u201cWhat has changed in the past couple of years is that most entities are asking what their partners are doing to protect information,\u201d Wilkinson says.<br \/>\nTo that end, more large healthcare organizations are giving their chief information security officer a seat at the table in vendor evaluations.<br \/>\nPlus, they&#8217;re conducting more frequent and more thorough security audits and demanding that vendors and subcontractors do the same.<br \/>\nFinally, many healthcare organizations have adopted a data-centric approach to their security practices by locating and classifying their protected healthcare data and applying security controls based on those classifications.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=410bff37dd&#038;e=20056c7556<\/p>\n<p>Ransomware: Time for a HIPAA Update?<br \/>\n&#8220;New cyber threats require Congress to vigilantly review and update the laws already on the books,&#8221; says Rep.<br \/>\nTed Lieu, D-Calif, in a statement provided to Information Security Media Group. &#8220;As ransomware attacks against hospitals become more frequent, it is critical for patients to know when their records are being held hostage and for the government to understand the scope of the problem.<br \/>\nI am actively exploring legislation to achieve that transparency.&#8221;<br \/>\nBut a spokesman for the Department of Health and Human Services&#8217; Office for Civil Rights says in a statement provided to ISMG that some such attacks already are reportable under HIPAA.<br \/>\nMeanwhile, Sen.<br \/>\nLamar Alexander, R-Tenn., chairman of the Senate Committee on Health, Education, Labor and Pensions, said the attack on MedStar Health shows the need for the Department of Health and Human Services to immediately implement provisions of the Cybersecurity Information Sharing Act of 2015.<br \/>\nThe cyber legislation, the senator notes, calls for HHS to &#8220;give hospitals and doctors clear information on the best ways to prevent a hack in the first place &#8230;<br \/>\nYesterday&#8217;s attack, which, unfortunately, is not unique, shows the need for HHS to implement the law with the urgency patients and hospitals deserve.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b55ba7dc6b&#038;e=20056c7556<\/p>\n<p>Cyber insurance rates fall with lull in major hacks<br \/>\nA lull in high-profile data breaches prompted insurers to cut cyber insurance rates for high-risk businesses such as retailers and healthcare companies during the first three months of this year, according to insurance industry brokers.<br \/>\nThe dip comes after sudden rate hikes for many firms last year in the wake of a spate of attacks on Home Depot Inc, Target Corp, Anthem Inc and others.<br \/>\nThe average price companies in high-risk industries paid for $1 million in cyber insurance coverage fell 13 percent to $18,756 in the first three months of 2016, according to broker Marsh, a unit of Marsh &#038; McLennan Cos Inc.<br \/>\nIt said the average premium rose 28 percent last year to $21,642 for comparable buyers in industries such as retail and healthcare.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=582584d5c7&#038;e=20056c7556<\/p>\n<p>Chubb adds cyber bullying coverage to U.S. home insurance policies<br \/>\nInsurer Chubb Ltd said on Wednesday it has added coverage to help U.S. victims of cyber bullying pay for costs, including mental health treatment, legal expenses and lost wages.<br \/>\nThe company said it added $60,000 of cyber bullying coverage to its U.S.<br \/>\nMasterpiece Family Protection policy, a $70-a-year add-on.<br \/>\nThe insurance already covers threats including stalking, carjacking, home invasion, air rage, hijacking and child abduction.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=5e672e01d0&#038;e=20056c7556<\/p>\n<p>New Portal Launched For ICS\/SCADA Threat Intelligence-Sharing Among Nations<br \/>\nThe EWI Information Sharing Community portal is based on the Facebook At Work collaboration platform, and initially is being used for sharing threat information, best practices, lessons learned, and other information.<br \/>\nIt ultimately will be built out to share more sensitive threat intel including indicators of compromise such as malware markers or malicious IP addresses associated with an attack suffered by a power plant, for example.<br \/>\nBlask says while groups such as the ICS-ISAC are open to international members, it\u2019s still a US-based entity, so the new portal backed by EWI provides a more global connection for ICS\/SCADA operators and interests. \u201cThey are using this platform for building [online] groups and communities,\u201d he says, and ultimately, it will be built out for real-time, machine-readable threat intel feeds via the STIX (Structured Threat Information Expression) and TAXII (Trusted Automation Exchange of Indicator Information) protocols, he says.<br \/>\nPatterson, who is vice president and global security leader for Unisys, says the EWI Information Sharing Community is not technically a global ISAC or ISAO for ICS\/SCADA, but more of a place for public and private sector operators of critical infrastructure, different nations&#8217; ISACs, and government agencies to collaborate.<br \/>\nThe ICS-ISAC has set up a registration page for the new portal.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c52efed1ba&#038;e=20056c7556<\/p>\n<p>Vulnerability Spotlight: Lhasa Integer Underflow Exploit<br \/>\nTalos is disclosing the discovery of vulnerability TALOS-2016-0095 \/ CVE-2016-2347 in the Lhasa LZH\/LHA decompression tool and library.<br \/>\nThis vulnerability is due to an integer underflow condition.<br \/>\nThe software verifies that header values are not too large, but does not check for a too small header length.<br \/>\nDecompressing a LHA or LZH file containing an under-value header size leads to the decompression software allocating a pointer to point to released memory on the heap.<br \/>\nAn attacker controlling the length and content of such a file can use the vulnerability to overwrite the heap with arbitrary code.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2463c0712b&#038;e=20056c7556<\/p>\n<p>Risk and compliance largest information management drivers<br \/>\nWhile smaller businesses use Information Management (IM) to save money and improve productivity, large businesses (44 per cent of them) do it mostly out of fear of risks and compliance.<br \/>\nThose are the results of a new study conducted by AIIM, which says that the number of large companies citing risk and compliance as the main factors behind IM rose from 38 per cent to 59 per cent in a year.<br \/>\nThe report, entitled Information Management: State of the Industry 2016, says IM \/ Enterprise Content Management (ECM) systems and Information Governance are not aligned.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d5071da6eb&#038;e=20056c7556<\/p>\n<p>Machine Learning In Security: Good &#038; Bad News About Signatures<br \/>\nWhy security teams that rely solely on signature-based detection are overwhelmed by a high number of alerts.<br \/>\nFirst in a series of two articles about the history of signature-based detections, and how the methodology has evolved to identify different types of cybersecurity threats.<br \/>\nOver the years, signature-based systems have changed and advanced, but the core concepts still lie at the heart of all modern detection systems \u2013 and will continue to be integral for the foreseeable future.<br \/>\nTo understand what a \u201csignature system\u201d is in reality, we need to understand the evolution of the detection path as directed and discovered by human intervention.<br \/>\nHistorically, the linear progression and sophistication of signature-based detection systems have been dependent upon human signature writers.<br \/>\nFor each new threat, a unique signature or signature artifact is created by a skilled engineer or security researcher.<br \/>\nThis pairing between signature and its human creator means that as the number of threats have increased, so too have the number of skilled personnel needed to develop and support the signatures that detect them.<br \/>\nFor obvious reasons, this is not a scalable business proposition \u2013 for neither the vendor or customer.<br \/>\nNew developments in machine learning \u2013 in particular supervised and unsupervised learning algorithms \u2013 are now being applied to information security and are paving the way to a new class of signature systems capable of economically scaling to the threat.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4e3ce4b4ef&#038;e=20056c7556<\/p>\n<p>SecureWorld Boston highlights value of partnerships<br \/>\nThe conference dived into cloud, IoT, network and mobile security as well as supply chain risk management and tips for defending against nearly all types of cyberthreats, but if there\u2019s one big takeaway from all the sessions at the conference, it\u2019s the importance of partnerships \u2014 both internal and external \u2014 in helping keep one\u2019s company secure and compliant in today\u2019s threat-laden enterprise.<br \/>\nIn her keynote presentation, Dawn-Marie Hutchinson stressed the importance of partnerships in incident response, explaining that forming (and nurturing) key relationships before a breach occurs is the best form of incident response.<br \/>\nShe broke down her list of important partnerships into three categories:<br \/>\nData inventory is a key component of any compliance initiative, according to Michael Corby, Executive Consultant at CGI.<br \/>\nIt helps companies stay within regulation boundaries and avoid costly investigations into their companies\u2019 data management.<br \/>\nBut a good data inventory project needs a solid team.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=918342bb54&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is:  dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:    Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p> Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=44a4b28800)<\/p>\n<p> Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] * Breaking down the walls between IT and physical security * How to Prepare for a DDOS attack * What Is Data Minimization? And Why It Matters In The Age Of Big&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1213","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1213"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1213\/revisions"}],"predecessor-version":[{"id":3700,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1213\/revisions\/3700"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}