{"id":1227,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail170-suw16-rsgsv-net\/"},"modified":"2021-12-30T11:38:59","modified_gmt":"2021-12-30T11:38:59","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail170-suw16-rsgsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail170-suw16-rsgsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail170.suw16.rsgsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<\/p>\n<p>Sorry for random delivery times, on PTO\/vacation<\/p>\n<p>* 2016: The year of application layer security in public clouds<br \/>\n* Dangerous open-source bugs lurk inside most commercial apps<br \/>\n* The critical first hours of a data breach: What to do when your business has been hacked<br \/>\n* What&#8217;s Next For Network Security<br \/>\n* Why Physical Security Professionals Need to Get to Grips with Cyber Security<br \/>\n* Now experts say don\u2019t change your password! Security services say workers may be safer from hackers if they keep the same login<br \/>\n* Online transaction fraud to reach $25 billion by 2020<br \/>\n* Microsoft publishes Security Intelligence Report, including cloud data for the first time<br \/>\n* American Bar Association releases cyber insurance guide for lawyers<br \/>\n* Microsoft: 2015&#8217;s Most Popular Exploit Was a Vulnerability Discovered in 2010<br \/>\n* Employers vicariously liable for data breaches caused by rogue employees<br \/>\n* Where to cut corners when the security budget gets tight<br \/>\n* IBM and eight universities to teach Watson computer system to fight cyber crime<br \/>\n* Top 2016 Cybersecurity Reports Out From AT&#038;T, Cisco, Dell, Google, IBM, McAfee, Symantec And Verizon<br \/>\n* FDIC launching new cyber initiative after 5 more breaches<br \/>\n* Verizon Breach Report Criticized<br \/>\n* Singapore\u2019s cloud security framework \u2013 multi-tiers and incident response guidelines<br \/>\n* Homeland Security warns of hackers exploiting SAP security flaw<\/p>\n<p>2016: The year of application layer security in public clouds<br \/>\nOur State of the Cloud Survey estimates that 93 per cent of respondents are adopting cloud \u2013 88 per cent are using public cloud, 63 per cent using private cloud, and 58 per cent using both.<br \/>\n\u2018Hybrid Cloud\u2019 will mean cloud computing resources are interoperable with all technologies, hardware, providers, and geographies.<br \/>\nDevelopers of the world will be free to build applications without any thought to the underlying architecture.<br \/>\nSecurity focus shifts from the datacentre to just the data<br \/>\nAs data platforms modernise, security will evolve as well.<br \/>\nNo longer will organisations just build massive walls around a corporate datacentre to keep out all potential attackers.<br \/>\nThe limitations of the physical network architectures will be magnified once enterprises see the difference between an underlay for bulk transport and an overlay for application specific use-case tuning.<br \/>\nThe glaring security holes in physical networks once obfuscated will reveal themselves.<br \/>\nThe collision between the cloud way and the physical datacentre way will be violent.<br \/>\nThe concept of an on-premise datacentre will change in 2016 both in how it will be built and how it will be consumed.<br \/>\nThose with groups already working in the cloud will easily transition to a more flexible and efficient environment.<br \/>\nIt may be called private cloud or software-defined datacentre, but the name won\u2019t matter.<br \/>\nThe question for 2017 is \u2018when will the traditional physical datacentre way become extinct?\u2019<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=389dcfabdd&#038;e=20056c7556<\/p>\n<p>Dangerous open-source bugs lurk inside most commercial apps<br \/>\nThe security of open-source components is a blind spot that&#8217;s leaving businesses exposed to dozens of very old bugs, security firm Black Duck Software contends in a new report, based on open-source security work it&#8217;s conducted.<br \/>\nIBM recently tapped Black Duck Software for its IBM Security AppScan to scan and map out potentially vulnerable open-source components in use.<br \/>\nThe report summarizes a review of 200 commercial applications it reviewed for customers in the six months to March.<br \/>\nThe firm finds that the average commercial application consists of over 100 open-source components.<br \/>\nHowever, at the beginning of an audit customers are only aware of about half of these.<br \/>\nIndeed, the report finds that 67 percent of commercial applications contain vulnerable open-source components and that each application, on average, has five vulnerable components that contain multiple individual vulnerabilities.<br \/>\nAccording to the firm&#8217;s numbers, each application has 22.5 individual vulnerabilities across different components.<br \/>\nBlack Duck Software product strategy VP Mike Pittenger said the problem isn&#8217;t the use of open source but rather the lack of visibility in its use and a lack of awareness of new vulnerabilities.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=7d3501555a&#038;e=20056c7556<\/p>\n<p>The critical first hours of a data breach: What to do when your business has been hacked<br \/>\nFirstly, a data breach costs money &#8211; \u00a31.2m on average according to the Risk:Value report from NTT Com Security.<br \/>\nBrand reputation also takes a huge hit from a data breach, you only need look at the impact of the TalkTalk data breach &#8211; over 100,000 customers and \u00a360m lost.<br \/>\nThe name of the data breach response game is protection &#8211; protect your assets, brand, reputation, customers and long-term future.<br \/>\nFollowing a data breach you must lock down your systems.<br \/>\nAfter having quarantined the vulnerability, it is imperative that you find out if the attackers have any other paths into your systems &#8211; the &#8216;three pronged attack&#8217; is becoming more and more popular among hackers, as Laurance Dine Managing Principal of investigative response at Verizon Enterprise Solutions told CBR:<br \/>\nRussell Kempley, Head of Cyber Technical Services at BAE Systems, advises implementing the following procedure:<br \/>\n1- Assign an incident co-ordinator who can liaise with investigation teams and management<br \/>\n2- Ensure evidence is being captured and preserved &#8211; logs should be collected from key devices and extra logging enabled if the attack is ongoing.<br \/>\nCompromised assets should be isolated from the network if appropriate to the type of threat and business impact.<br \/>\n3- Conduct an initial assessment to identify actual or potential business impacts; this informs the response strategy and what the key outstanding questions are<br \/>\n4- Call in specialist investigation support to help get accurate answers quickly and guide the business through the recovery.<br \/>\nThe UK Government \/ CESG has a scheme to certify incident response specialists so that you can choose a firm with confidence.<br \/>\n5- Take action, inform management and other stakeholders and seek advice from legal and communications teams.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6dcd72f9b5&#038;e=20056c7556<\/p>\n<p>What&#8217;s Next For Network Security<br \/>\nLAS VEGAS \u2013 Interop 2016 \u2013 Network security as we know it ultimately will operate hand in hand with software-defined networking (SDN) and virtualization, security experts here said.<br \/>\nBut a software-defined network architecture comes with some security risks of its own.<br \/>\nIt leaves organizations open to internal distributed denial-of-service (DDoS) attacks, says Camp, who in a presentation here tomorrow will show how malware can enter virtual environments.<br \/>\nIt\u2019s possible to hack a virtual machine and basically \u201cblow up that whole box and the network with it,\u201d he says.<br \/>\n\u201cYou can take the first few digits of a MAC address and &#8230; know it\u2019s a VM,\u201d he says. \u201cYou can take that VM and pop it and do resource-exhaustion\u201d and use that to DDoS the SDN.<br \/>\nThat would be an ironic twist, of course, since SDN can be used to mitigate external DDoS attacks.<br \/>\nThe best bet for protection would be to incorporate network defenses within those same boxes, Camp and other experts say.<br \/>\n\u201cSecurity is really just another part of the infrastructure, and a fundamental\u201d part of a software-defined security framework, he said.<br \/>\nBut firewall, IDS\/IPS, and other hardware-based platforms aren\u2019t going anywhere any time soon.<br \/>\nA virtual firewall would sit on a virtual switch like other network functions, and provide better visibility into network traffic, he says. \u201cAnd because it\u2019s in a VM, it\u2019s easier to scale, too.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=32205c88b0&#038;e=20056c7556<\/p>\n<p>Why Physical Security Professionals Need to Get to Grips with Cyber Security<br \/>\n\u2018Stop thinking cyber security is an IT problem, because it\u2019s not; it\u2019s a business problem\u2019, advised industry expert, Mike Gillespie, at a recent NSI Summit.<br \/>\nA couple of examples\u2026<\/p>\n<p>Number one: Last year, news broke that hundreds of CCTV systems were live-streaming content across the internet.  Nearly all of those systems, Mike explained, had been compromised because an installer had not changed the default username and password.<\/p>\n<p>Number two: Mike identified a server on a client\u2019s network, but couldn\u2019t find it using schematics.  The IT manager claimed to know nothing about it and, on paper, it didn\u2019t exist.  Eventually, the Facilities Manager admitted he had added it to the system, without communicating the change or being aware of the threat.<\/p>\n<p>The key advice for attendees at the NSI Installer Summit was \u2018stop thinking \u201cI\u2019m not a big corporate, this doesn\u2019t matter to me\u201d\u2019.<br \/>\nThis is impacting real, physical environments and it has the potential to cause widespread chaos.<br \/>\nIt\u2019s not just the lazy hackers who are after us, but also well-resourced, capable people \u2013 sometimes state-sponsored, sometimes terrorists.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b18dbd4fd5&#038;e=20056c7556<\/p>\n<p>Now experts say don\u2019t change your password! Security services say workers may be safer from hackers if they keep the same login<br \/>\nIn a new briefing to Whitehall, power stations, banks and the public sector, cyber experts at CESG \u2013 the information security arm of intelligence agency GCHQ \u2013 concluded: \u2018It\u2019s one of those counter-intuitive security scenarios; the more often users are forced to change passwords, the greater the overall vulnerability to attack.\u2019<br \/>\nThe advice continues: \u2018Most password policies insist that we have to keep changing them.<br \/>\nAnd when forced to change one, the chances are that the new password will be similar to the old one.<br \/>\n&#8216;Attackers can exploit this\u2026New passwords are also more likely to be forgotten, and this carries the productivity costs of users being locked out\u2026CESG now recommends organisations do not force regular password expiry.\u2019<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=101f5fcf2c&#038;e=20056c7556<\/p>\n<p>Online transaction fraud to reach $25 billion by 2020<br \/>\nOnline transaction fraud is expected to reach $25.6 billion by 2020, up from $10.7 billion last year, according to Juniper Research.<br \/>\nThis means that by the end of the decade, $4 in every $1,000 of online payments will be fraudulent.<br \/>\nThe new study identified 3 hot areas for online fraud:<br \/>\neRetail (65% of fraud by value in 2020 \u2013 $16.6 billion)<br \/>\nBanking (27% \u2013 $6.9 billion)<br \/>\nAirline ticketing (6% \u2013 $1.5 billion).<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2339e14bce&#038;e=20056c7556<\/p>\n<p>Microsoft publishes Security Intelligence Report, including cloud data for the first time<br \/>\nMicrosoft has published its latest biannual Security Intelligence Report (SIR), covering the second half of 2015.<br \/>\nThe SIR &#8220;analyzes the threat landscape of exploits, vulnerabilities, and malware using data from Internet services and over 600 million computers worldwide.&#8221;<br \/>\nThis report, its twentieth in the last ten years, includes security data from the Microsoft cloud for the first time, which the company says &#8220;reveals how we are leveraging an intelligent security graph to inform how we protect endpoints, better detect attacks and accelerate our response, to help protect our customers.&#8221;<br \/>\nrom a sensor network made up of hundreds of millions of systems running Microsoft anti-malware software, the data shows us that:<br \/>\nThe number of systems that encountered malware in 2015 increased in the second half of the year.<br \/>\nThe worldwide encounter rate increased to 20.5% by the end of 2015, an increase of 5.5% from six months earlier.<br \/>\nThe locations with the highest encounter rates were Pakistan, Indonesia, the Palestinian territories, Bangladesh, and Nepal which all had encounter rates above 50%.<br \/>\nExploit kits accounted for four of the 10 most commonly encountered exploits during the second half of 2015.<br \/>\nThe Angler exploit kit was the most commonly encountered exploit kit family.<br \/>\nAlthough ransomware had relatively low encounter rates (worldwide ER for ransomware in the first quarter of 2015 was 0.35 percent and 0.16 percent in the second quarter), its use in ransomware-as-a-service kits and targeted attacks is increasing.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=cd904f3674&#038;e=20056c7556<\/p>\n<p>American Bar Association releases cyber insurance guide for lawyers<br \/>\nThe American Bar Association&#8217;s Standing Committee on Lawyers&#8217; Professional Liability on Thursday introduced a guide for attorneys on cyber liability risk and insurance.<br \/>\nTopics in the guide, \u201cProtecting Against Cyber Threats: A Lawyer&#8217;s Guide to Choosing a Cyber-Liability Insurance Policy,\u201d include why law firms should purchase cyber liability insurance, understanding the coverage, how to prevent coverage gaps and the importance of breach response, among others.<br \/>\nThe guide also includes a list of cyber liability insurers that insure law firms and their contact information.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=53b8e39b1c&#038;e=20056c7556 (http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=22a25e885b&#038;e=20056c7556)<\/p>\n<p>Microsoft: 2015&#8217;s Most Popular Exploit Was a Vulnerability Discovered in 2010<br \/>\nAccording to Microsoft&#8217;s security team and data from its anti-malware products, during 2015, the most popular security exploit was CVE-2010-2568, a vulnerability discovered in 2010 and also used in the infamous Stuxnet attacks.<br \/>\nCVE-2010-2568 is a security bug found in older versions of the Windows Shell and affects Microsoft&#8217;s Windows 7, Vista, XP, Server 2008 and Server 2003 operating systems.<br \/>\nThe vulnerability allows an attacker to deploy LNK or PIF files on an affected system and then execute code on the user&#8217;s computer, effectively taking over the device.<br \/>\nThe report also highlights positive findings, the company revealing that the number of users that employ real-time security software is growing.<br \/>\nAccording to the company, the needle has moved from 74.3 percent to 77.1 percent during all last year.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c00ba2b612&#038;e=20056c7556<\/p>\n<p>Employers vicariously liable for data breaches caused by rogue employees<br \/>\nIn April 2016, the High Court of England and Wales issued its judgment in Axon v Ministry of Defence [2016] EWHC 787 (QB).<br \/>\nThe court emphasised (albeit obiter) the fact that employers can be liable for data breaches caused by rogue employees (in the present case, an employee who had passed on certain information to journalists without the permission of her employer).<br \/>\nThe impact of this decision on employers is potentially significant, and it serves as another reminder to employers to implement proper data protection processes and procedures, and to ensure that employees receive appropriate training on these issues.<br \/>\nThe decision in Axon highlights the risk that an employer may be vicariously liable for a data breach caused by a rogue employee, where the breach concerns private or confidential information to which the employee only has access by reason of the employment relationship.<br \/>\nWhile no business can ever be fully aware of every activity carried out by its employees, employers should take steps to minimise the risks of vicarious liability, by ensuring that they have in place: strong information security measures; appropriate privacy policies and enforcement of those policies; and sufficient training for employees handling personal data in the course of their duties.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8e15c33f91&#038;e=20056c7556<\/p>\n<p>Where to cut corners when the security budget gets tight<br \/>\nRick Howard, CSO at Palo Alto Networks, said the best thing CISOs can do to bolster their information security program in times of budget shortages is make sure the prevention controls they already have in place are working the way they thought they were going to work when they originally bought and installed them.<br \/>\nRick Howard, CSO at Palo Alto Networks, said the best thing CISOs can do to bolster their information security program in times of budget shortages is make sure the prevention controls they already have in place are working the way they thought they were going to work when they originally bought and installed them.<br \/>\nStan Black, CSO at Citrix, said organizations short on budget can perform simple but effective security checks like making sure admin logins and passwords aren\u2019t in use, network and access policies are up-to-date and compliance regulations are being met.<br \/>\nPerforming employee trainings on how to uphold security best practices for their own safety, as well as the company&#8217;s, can enormously help reduce risk and only costs time.<br \/>\nGareth O\u2019Sullivan, director of solutions architect \u2013 EMEA at WhiteHat Security, said maintaining a secure environment is not simply about adding more security products.<br \/>\nContrary to the notion of finding products for next to no cost, Jeff Schilling, CSO at Armor, said there is no magic bullet that allows a security team to have great security without investment.<br \/>\nRyan O\u2019Leary, vice president of Threat Research Center at WhiteHat Security, added: One of the best ways to improve security without having to pay a single cent is to implement a security centric development program.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=86a767dcfd&#038;e=20056c7556<\/p>\n<p>IBM and eight universities to teach Watson computer system to fight cyber crime<br \/>\nNow IBM is launching Watson for Cyber Security \u2014 a cloud-based version of their cognitive technology \u2014 that will be trained over the next year to examine threats of cybercrime.<br \/>\nCaleb Barlow, vice-president of IBM Security, said it is becoming increasingly difficult for security staff to deal with the growing number of cyber threats.<br \/>\n\u201cYour average enterprise is dealing with 200,000 incidents a day that they\u2019ve got to dig through.<br \/>\nHuman beings simply cannot look at all of that data,\u201d he said.<br \/>\nStudents at the eight universities, including the University of New Brunswick, University of Ottawa and the University of Waterloo, will put the information in a form the computer can understand and help train the system to use that information to examine cyber threats.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=68f21cba09&#038;e=20056c7556<\/p>\n<p>Top 2016 Cybersecurity Reports Out From AT&#038;T, Cisco, Dell, Google, IBM, McAfee, Symantec And Verizon<br \/>\nAT&#038;T Cybersecurity Insights Report<br \/>\nTakeaway: 458% increase in the number of times hackers searched Internet of Things connections for vulnerabilities<br \/>\nCisco Annual Security Report<br \/>\nTakeaway: There\u2019s a 221% increase in compromised WordPress sites<br \/>\nDell Security Annual Threat Report<br \/>\nTakeaway: Malware attacks nearly doubled to 8.19 billion, with Android ecosystem being the prime target<br \/>\nGoogle Android Security Annual Report<br \/>\nTakeaway: Google notified Google Play developers about potential security issues, which led to better security for 100,000+ apps<br \/>\nIBM X-Force Cyber Security Intelligence Index Report<br \/>\nTakeaway: The healthcare industry was the one most frequently attacked, speeding straight past financial services and manufacturing<br \/>\nMcAfee Labs Threat Predictions Report<br \/>\nTakeaway: Attacks on automobile systems will increase rapidly in 2016 due to the rapid increase in connected automobile hardware built without foundational security principles.<br \/>\nSymantec Internet Security Threat Report<br \/>\nTakeaway: Spear-phishing campaigns targeting employees increased 55% last year<br \/>\nVerizon Data Breach Investigation Report<br \/>\nTakeaway: 89% of all cyber attacks involve financial or espionage motivations.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=b60a869251&#038;e=20056c7556<\/p>\n<p>FDIC launching new cyber initiative after 5 more breaches<br \/>\nThe Federal Deposit Insurance Corporation is kicking its cybersecurity efforts into high gear after reporting five more security incidents that were unknowingly caused by outgoing employees.<br \/>\nThe FDIC on May 9 said five \u201clow risk\u201d incidents occurred since October, when outgoing employees downloaded customer data while they were saving personal information to their own devices.<br \/>\nFDIC said the cases would have been reported in its annual Federal Information Security Modernization Act (FISMA) report to Congress if not for recently revised guidance.<br \/>\nThe agency immediately addressed the incidents, the FDIC said.<br \/>\nMeredith Somers<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c016475cdd&#038;e=20056c7556<\/p>\n<p>Verizon Breach Report Criticized<br \/>\nThe 2016 Data Breach Investigations report, released on April 27, is considered one of the most comprehensive annual guides on data breach trends, compiling data contributed by a wide range of computer security companies, law enforcement and government agencies.<br \/>\nIt also draws on more than 3,100 confirmed data breaches, an impressive sampling of attacks (see Verizon&#8217;s Latest Breach Report: Same Attacks, More Damage).<br \/>\nBut since the release of the report this year, computer security experts have taken issue with a top 10 list of vulnerabilities that Verizon claims were responsible for 85 percent of successful exploit traffic throughout 2015.<br \/>\nThey assert that the list of vulnerabilities could mislead administrators into devoting remediation efforts toward long-known flaws that don&#8217;t reflect the real attack landscape.<br \/>\nEight of the vulnerabilities on the list were reported in 2003 or earlier.<br \/>\nOddly, the list did not contain any vulnerabilities for Adobe Systems applications such as Flash Player, which is one of the world&#8217;s most frequently targeted pieces of software.<br \/>\nIn contrast, the U.S.<br \/>\nComputer Emergency Readiness Team published a list of the 30 most commonly exploited vulnerabilities just three days after Verizon&#8217;s report.<br \/>\nNone of the top 10 vulnerabilities listed by Verizon are in US-CERT&#8217;s list.<br \/>\nIn an email statement, Verizon didn&#8217;t directly address the controversy, saying &#8220;we welcome and are open to feedback from the security community, which we continually evaluate in order to make each successive DBIR better than the next.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e308d491a2&#038;e=20056c7556<\/p>\n<p>Singapore\u2019s cloud security framework \u2013 multi-tiers and incident response guidelines<br \/>\nTo build assurance and trust in Singapore\u2019s cloud ecosystem, the Multi-Tier Cloud Security (MTCS) standard was developed by the government in 2013, providing businesses with greater transparency and clarity on the levels of security offered by different cloud service providers.<br \/>\nMTCS has seen strong takeup since its launch, with a total number of 64 certified cloud service providers as of 2016.<br \/>\nWith the MTCS framework, certified cloud service providers define the levels of security that they can offer to their users, while businesses can use the standards to better understand and assess the cloud security they require.<br \/>\nIn February 2016, IDA also introduced a set of Cloud Outage Incident Response (COIR) guidelines, the result of two years of discussion, scoping and development by public agencies and the industry.<br \/>\nMr Khoong said that the guidelines are to be used to map out how resilient a cloud service provider can be. \u201cEnterprises will then be able to gauge the relevant cloud service providers to them and procure according to their own business continuity management needs,\u201d he said.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=905392e5a5&#038;e=20056c7556<\/p>\n<p>Homeland Security warns of hackers exploiting SAP security flaw<br \/>\nThe department&#8217;s Computer Emergency Readiness Team (CERT) sent an alert on Wednesday warning that at least 36 unnamed organizations are running misconfigured or outdated software, which could leave them prone to remote attacks by hackers.<br \/>\nAccording to the alert, a hacker that successfully exploits the vulnerability can gain full access and complete control to an affected SAP platform &#8212; that includes business information and processes on those systems.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c41a475d39&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is:  dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:    Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p> Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=0229c58d94)<\/p>\n<p> Update subscription preferences (http:\/\/paulgdavis.us3.list-manage1.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] Sorry for random delivery times, on PTO\/vacation * 2016: The year of application layer security in public clouds * Dangerous open-source bugs lurk inside most commercial apps * The critical first hours&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1227","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1227"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1227\/revisions"}],"predecessor-version":[{"id":3714,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1227\/revisions\/3714"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}