{"id":1226,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail166-atl61-mcsv-net-2\/"},"modified":"2021-12-30T11:38:59","modified_gmt":"2021-12-30T11:38:59","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail166-atl61-mcsv-net-2","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail166-atl61-mcsv-net-2\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail166.atl61.mcsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<\/p>\n<p>* 2016: The year of application layer security in public clouds<br \/>\n* Dangerous open-source bugs lurk inside most commercial apps<br \/>\n* The critical first hours of a data breach: What to do when your business has been hacked<br \/>\n* What&#8217;s Next For Network Security<br \/>\n* Why Physical Security Professionals Need to Get to Grips with Cyber Security<br \/>\n* Now experts say don\u2019t change your password! Security services say workers may be safer from hackers if they keep the same login<br \/>\n* Online transaction fraud to reach $25 billion by 2020<br \/>\n* Microsoft publishes Security Intelligence Report, including cloud data for the first time<br \/>\n* American Bar Association releases cyber insurance guide for lawyers<br \/>\n* Microsoft: 2015&#8217;s Most Popular Exploit Was a Vulnerability Discovered in 2010<\/p>\n<p>2016: The year of application layer security in public clouds<br \/>\nOur State of the Cloud Survey estimates that 93 per cent of respondents are adopting cloud \u2013 88 per cent are using public cloud, 63 per cent using private cloud, and 58 per cent using both.<br \/>\n\u2018Hybrid Cloud\u2019 will mean cloud computing resources are interoperable with all technologies, hardware, providers, and geographies.<br \/>\nDevelopers of the world will be free to build applications without any thought to the underlying architecture.<br \/>\nSecurity focus shifts from the datacentre to just the data<br \/>\nAs data platforms modernise, security will evolve as well.<br \/>\nNo longer will organisations just build massive walls around a corporate datacentre to keep out all potential attackers.<br \/>\nThe limitations of the physical network architectures will be magnified once enterprises see the difference between an underlay for bulk transport and an overlay for application specific use-case tuning.<br \/>\nThe glaring security holes in physical networks once obfuscated will reveal themselves.<br \/>\nThe collision between the cloud way and the physical datacentre way will be violent.<br \/>\nThe concept of an on-premise datacentre will change in 2016 both in how it will be built and how it will be consumed.<br \/>\nThose with groups already working in the cloud will easily transition to a more flexible and efficient environment.<br \/>\nIt may be called private cloud or software-defined datacentre, but the name won\u2019t matter.<br \/>\nThe question for 2017 is \u2018when will the traditional physical datacentre way become extinct?\u2019<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6506de72fb&#038;e=20056c7556<\/p>\n<p>Dangerous open-source bugs lurk inside most commercial apps<br \/>\nThe security of open-source components is a blind spot that&#8217;s leaving businesses exposed to dozens of very old bugs, security firm Black Duck Software contends in a new report, based on open-source security work it&#8217;s conducted.<br \/>\nIBM recently tapped Black Duck Software for its IBM Security AppScan to scan and map out potentially vulnerable open-source components in use.<br \/>\nThe report summarizes a review of 200 commercial applications it reviewed for customers in the six months to March.<br \/>\nThe firm finds that the average commercial application consists of over 100 open-source components.<br \/>\nHowever, at the beginning of an audit customers are only aware of about half of these.<br \/>\nIndeed, the report finds that 67 percent of commercial applications contain vulnerable open-source components and that each application, on average, has five vulnerable components that contain multiple individual vulnerabilities.<br \/>\nAccording to the firm&#8217;s numbers, each application has 22.5 individual vulnerabilities across different components.<br \/>\nBlack Duck Software product strategy VP Mike Pittenger said the problem isn&#8217;t the use of open source but rather the lack of visibility in its use and a lack of awareness of new vulnerabilities.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b69d5cf9bb&#038;e=20056c7556<\/p>\n<p>The critical first hours of a data breach: What to do when your business has been hacked<br \/>\nFirstly, a data breach costs money &#8211; \u00a31.2m on average according to the Risk:Value report from NTT Com Security.<br \/>\nBrand reputation also takes a huge hit from a data breach, you only need look at the impact of the TalkTalk data breach &#8211; over 100,000 customers and \u00a360m lost.<br \/>\nThe name of the data breach response game is protection &#8211; protect your assets, brand, reputation, customers and long-term future.<br \/>\nFollowing a data breach you must lock down your systems.<br \/>\nAfter having quarantined the vulnerability, it is imperative that you find out if the attackers have any other paths into your systems &#8211; the &#8216;three pronged attack&#8217; is becoming more and more popular among hackers, as Laurance Dine Managing Principal of investigative response at Verizon Enterprise Solutions told CBR:<br \/>\nRussell Kempley, Head of Cyber Technical Services at BAE Systems, advises implementing the following procedure:<br \/>\n1- Assign an incident co-ordinator who can liaise with investigation teams and management<br \/>\n2- Ensure evidence is being captured and preserved &#8211; logs should be collected from key devices and extra logging enabled if the attack is ongoing.<br \/>\nCompromised assets should be isolated from the network if appropriate to the type of threat and business impact.<br \/>\n3- Conduct an initial assessment to identify actual or potential business impacts; this informs the response strategy and what the key outstanding questions are<br \/>\n4- Call in specialist investigation support to help get accurate answers quickly and guide the business through the recovery.<br \/>\nThe UK Government \/ CESG has a scheme to certify incident response specialists so that you can choose a firm with confidence.<br \/>\n5- Take action, inform management and other stakeholders and seek advice from legal and communications teams.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=59ce80c491&#038;e=20056c7556<\/p>\n<p>What&#8217;s Next For Network Security<br \/>\nLAS VEGAS \u2013 Interop 2016 \u2013 Network security as we know it ultimately will operate hand in hand with software-defined networking (SDN) and virtualization, security experts here said.<br \/>\nBut a software-defined network architecture comes with some security risks of its own.<br \/>\nIt leaves organizations open to internal distributed denial-of-service (DDoS) attacks, says Camp, who in a presentation here tomorrow will show how malware can enter virtual environments.<br \/>\nIt\u2019s possible to hack a virtual machine and basically \u201cblow up that whole box and the network with it,\u201d he says.<br \/>\n\u201cYou can take the first few digits of a MAC address and &#8230; know it\u2019s a VM,\u201d he says. \u201cYou can take that VM and pop it and do resource-exhaustion\u201d and use that to DDoS the SDN.<br \/>\nThat would be an ironic twist, of course, since SDN can be used to mitigate external DDoS attacks.<br \/>\nThe best bet for protection would be to incorporate network defenses within those same boxes, Camp and other experts say.<br \/>\n\u201cSecurity is really just another part of the infrastructure, and a fundamental\u201d part of a software-defined security framework, he said.<br \/>\nBut firewall, IDS\/IPS, and other hardware-based platforms aren\u2019t going anywhere any time soon.<br \/>\nA virtual firewall would sit on a virtual switch like other network functions, and provide better visibility into network traffic, he says. \u201cAnd because it\u2019s in a VM, it\u2019s easier to scale, too.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e47236a7ba&#038;e=20056c7556<\/p>\n<p>Why Physical Security Professionals Need to Get to Grips with Cyber Security<br \/>\n\u2018Stop thinking cyber security is an IT problem, because it\u2019s not; it\u2019s a business problem\u2019, advised industry expert, Mike Gillespie, at a recent NSI Summit.<br \/>\nA couple of examples\u2026<\/p>\n<p>Number one: Last year, news broke that hundreds of CCTV systems were live-streaming content across the internet.<br \/>\nNearly all of those systems, Mike explained, had been compromised because an installer had not changed the default username and password.<\/p>\n<p>Number two: Mike identified a server on a client\u2019s network, but couldn\u2019t find it using schematics.<br \/>\nThe IT manager claimed to know nothing about it and, on paper, it didn\u2019t exist.<br \/>\nEventually, the Facilities Manager admitted he had added it to the system, without communicating the change or being aware of the threat.<br \/>\nThe key advice for attendees at the NSI Installer Summit was \u2018stop thinking \u201cI\u2019m not a big corporate, this doesn\u2019t matter to me\u201d\u2019.<br \/>\nThis is impacting real, physical environments and it has the potential to cause widespread chaos.<br \/>\nIt\u2019s not just the lazy hackers who are after us, but also well-resourced, capable people \u2013 sometimes state-sponsored, sometimes terrorists.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=fbaf839da4&#038;e=20056c7556<\/p>\n<p>Now experts say don\u2019t change your password! Security services say workers may be safer from hackers if they keep the same login<br \/>\nIn a new briefing to Whitehall, power stations, banks and the public sector, cyber experts at CESG \u2013 the information security arm of intelligence agency GCHQ \u2013 concluded: \u2018It\u2019s one of those counter-intuitive security scenarios; the more often users are forced to change passwords, the greater the overall vulnerability to attack.\u2019<br \/>\nThe advice continues: \u2018Most password policies insist that we have to keep changing them.<br \/>\nAnd when forced to change one, the chances are that the new password will be similar to the old one.<br \/>\n&#8216;Attackers can exploit this\u2026New passwords are also more likely to be forgotten, and this carries the productivity costs of users being locked out\u2026CESG now recommends organisations do not force regular password expiry.\u2019<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c76b0db6ea&#038;e=20056c7556<\/p>\n<p>Online transaction fraud to reach $25 billion by 2020<br \/>\nOnline transaction fraud is expected to reach $25.6 billion by 2020, up from $10.7 billion last year, according to Juniper Research.<br \/>\nThis means that by the end of the decade, $4 in every $1,000 of online payments will be fraudulent.<br \/>\nThe new study identified 3 hot areas for online fraud:<br \/>\neRetail (65% of fraud by value in 2020 \u2013 $16.6 billion)<br \/>\nBanking (27% \u2013 $6.9 billion)<br \/>\nAirline ticketing (6% \u2013 $1.5 billion).<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1c9e55579d&#038;e=20056c7556<\/p>\n<p>Microsoft publishes Security Intelligence Report, including cloud data for the first time<br \/>\nMicrosoft has published its latest biannual Security Intelligence Report (SIR), covering the second half of 2015.<br \/>\nThe SIR &#8220;analyzes the threat landscape of exploits, vulnerabilities, and malware using data from Internet services and over 600 million computers worldwide.&#8221;<br \/>\nThis report, its twentieth in the last ten years, includes security data from the Microsoft cloud for the first time, which the company says &#8220;reveals how we are leveraging an intelligent security graph to inform how we protect endpoints, better detect attacks and accelerate our response, to help protect our customers.&#8221;<br \/>\nrom a sensor network made up of hundreds of millions of systems running Microsoft anti-malware software, the data shows us that:<br \/>\nThe number of systems that encountered malware in 2015 increased in the second half of the year.<br \/>\nThe worldwide encounter rate increased to 20.5% by the end of 2015, an increase of 5.5% from six months earlier.<br \/>\nThe locations with the highest encounter rates were Pakistan, Indonesia, the Palestinian territories, Bangladesh, and Nepal which all had encounter rates above 50%.<br \/>\nExploit kits accounted for four of the 10 most commonly encountered exploits during the second half of 2015.<br \/>\nThe Angler exploit kit was the most commonly encountered exploit kit family.<br \/>\nAlthough ransomware had relatively low encounter rates (worldwide ER for ransomware in the first quarter of 2015 was 0.35 percent and 0.16 percent in the second quarter), its use in ransomware-as-a-service kits and targeted attacks is increasing.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1c76e4ce5c&#038;e=20056c7556<\/p>\n<p>American Bar Association releases cyber insurance guide for lawyers<br \/>\nThe American Bar Association&#8217;s Standing Committee on Lawyers&#8217; Professional Liability on Thursday introduced a guide for attorneys on cyber liability risk and insurance.<br \/>\nTopics in the guide, \u201cProtecting Against Cyber Threats: A Lawyer&#8217;s Guide to Choosing a Cyber-Liability Insurance Policy,\u201d include why law firms should purchase cyber liability insurance, understanding the coverage, how to prevent coverage gaps and the importance of breach response, among others.<br \/>\nThe guide also includes a list of cyber liability insurers that insure law firms and their contact information.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=fc1424a516&#038;e=20056c7556 (http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=66ace926d6&#038;e=20056c7556)<\/p>\n<p>Microsoft: 2015&#8217;s Most Popular Exploit Was a Vulnerability Discovered in 2010<br \/>\nAccording to Microsoft&#8217;s security team and data from its anti-malware products, during 2015, the most popular security exploit was CVE-2010-2568, a vulnerability discovered in 2010 and also used in the infamous Stuxnet attacks.<br \/>\nCVE-2010-2568 is a security bug found in older versions of the Windows Shell and affects Microsoft&#8217;s Windows 7, Vista, XP, Server 2008 and Server 2003 operating systems.<br \/>\nThe vulnerability allows an attacker to deploy LNK or PIF files on an affected system and then execute code on the user&#8217;s computer, effectively taking over the device.<br \/>\nThe report also highlights positive findings, the company revealing that the number of users that employ real-time security software is growing.<br \/>\nAccording to the company, the needle has moved from 74.3 percent to 77.1 percent during all last year.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b4e9c7996e&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is:  dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:    Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p> Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=e9dcbe007a)<\/p>\n<p> Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] * 2016: The year of application layer security in public clouds * Dangerous open-source bugs lurk inside most commercial apps * The critical first hours of a data breach: What to do&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1226","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1226"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1226\/revisions"}],"predecessor-version":[{"id":3713,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1226\/revisions\/3713"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}