{"id":1230,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail25-us4-mcsv-net\/"},"modified":"2021-12-30T11:39:00","modified_gmt":"2021-12-30T11:39:00","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail25-us4-mcsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail25-us4-mcsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail25.us4.mcsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<\/p>\n<p>* Cisco Systems : Software products or application platforms, do I have to choose?<br \/>\n* Russia\u2019s Swift Alternative Looks Tempting After Hackers Steal Millions<br \/>\n* Experian : Data Breach Resolution and Ponemon Institute study reveals organizations are not doing enough to prevent employee-caused security incidents<br \/>\n* What is the right DDoS protection cloud service for your organization?<br \/>\n* Swift CEO to Say More Banks May Have Been Breached by Hackers<br \/>\n* Encryption is the foundation of the new data center<br \/>\n* 46% of German companies get external IT security services<br \/>\n* SWIFT Promises Security Overhaul, Fraud Detection<br \/>\n* Anonymised database will make UK number one for cyber insurance: ABI<br \/>\n* Liability of Cloud-Based Service Provider For Data Breach<br \/>\n* House Lawmakers Turn Up Heat on FDIC Over Cybersecurity<br \/>\n* OWASP set to address API security risks<\/p>\n<p>Cisco Systems : Software products or application platforms, do I have to choose?<br \/>\nThis is the final post in a series that has been focused on providing different ways to think about the job of a modern day software technology architect.<br \/>\nThe series began with the idea of defining an architecture that blends physical and digital worlds, taking more of an omni-channel approach.<br \/>\nThe next post expanded on this idea by discussing the era of the Platform Economy and the platform ecosystem.<br \/>\nIt is here that the idea of three architectural patterns (orchestration, interaction and acquisition) was introduced.<br \/>\nSome resources were provided that highlight some starting points into understanding more about platform architecture thinking.<br \/>\nOne of the more interesting elements presented was a comment by Marshall Van Alstyne (research professor MIT) during a MIT panel discussion, &#8216;products have features and platforms have communities.&#8217; A second provocative comment in this panel discussion worth exploring is the perspective that, platforms beat products every time.<br \/>\nFor me this led to a question, &#8216;is that true and if not, how do I choose and do I have to choose?&#8217; In general, I do believe platforms beat products, and that platforms will begin to have a larger footprint in most company&#8217;s architecture landscape\u2026in the right context, for the right purpose to achieve flexible, yet targeted outcomes.<br \/>\nit is very easy to get over zealous and think that this lays the ground work for an &#8216;either\/or&#8217; debate, similar to a make versus buy discussion.<br \/>\nAn either\/or approach to software is dangerous and incorrect thinking.<br \/>\nMost business environments require both, at least for the foreseeable future.<br \/>\nThus, the key is to know why to choose which technology based on the desired outcomes and culture of the organization.<br \/>\nPotentially the most important selection criteria is to understand the mix of skills that exist and can be acquired at a cost the organization is willing to invest.<br \/>\nThe benefit of traditional application software programs is that there is a broad availability of skills, training programs and experience to mitigate the risk of selecting the right technology.<br \/>\nThe benefit of application platforms is the ability to adapt more readily to technology changes and avoid locking into a single vendor for extended periods of time that become painful to change.<br \/>\nIn the end, the real decision is what culture does the organization have and what investment is the organization willing to make for the desired end state?<br \/>\nDetermine if you are solving a distinct business problem versus solving a broader enterprise problem.<br \/>\nMany enterprises are focused on scale that has been tested, which is different than being able to scale.<br \/>\nWhile skills may be the most important decision criteria, time will most likely determine the final decision.<br \/>\nTo really begin appreciating the power of software platforms versus products, I recommend spending time gaining hands on experience with multiple platforms such as those mentioned earlier.<br \/>\nAfter that experience, see you agree or disagree with my position of the power and eventuality on platforms taking a greater percentage of enterprise mindshare and architecture footprint.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d65f343685&#038;e=20056c7556<\/p>\n<p>Russia\u2019s Swift Alternative Looks Tempting After Hackers Steal Millions<br \/>\nThe Society for Worldwide Interbank Financial Telecommunication (Swift) has been engulfed by a wave of cyber attacks where criminals have been able to steal tens of millions of dollars from banks in Bangladesh, Ecuador and Vietnam.<br \/>\nSwift, a global member-owned cooperative, based in Belgium, also stated that its services, network, and software were not compromised.<br \/>\nIt stated that steps were being taken, along with specific measures to reduce cyber attacks.<br \/>\nThe network service explained that from now on it would notify customers immediately of any known cases of malware, and that it would share best practices to improve security.<br \/>\nThe incidents have highlighted the fact that the banking network may not be as secure as it was once thought to be.<br \/>\nRussia proposed an alternative to Swift last year as part of an effort among BRIC nations to create a transfer service that provides better security and is free of disruption.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=81cdfa16d4&#038;e=20056c7556<\/p>\n<p>Experian : Data Breach Resolution and Ponemon Institute study reveals organizations are not doing enough to prevent employee-caused security incidents<br \/>\nCOSTA MESA, Calif., May 23, 2016 \/PRNewswire\/ &#8212; Experian Data Breach Resolution and Ponemon Institute today released an industry study revealing that while employee-related security risks are the number-one concern for security professionals, organizations are not taking adequate steps to prevent negligent employee behavior.<br \/>\nThe study, Managing Insider Risk Through Training &#038; Culture, asked more than 600 individuals at companies that currently have a data protection and privacy training program to weigh in on the topic of negligent and malicious employee behaviors, as well as the consequences of poor security conduct and the effectiveness of training.<br \/>\nThe study found that more than half (55 percent) of companies surveyed have already experienced a security incident due to a malicious or negligent employee.<br \/>\nHowever, despite investment in employee training and other efforts to reduce careless behavior in the handling of sensitive and confidential information, the majority of companies do not believe that their employees are knowledgeable about the company&#8217;s security risks.<br \/>\nAlarmingly, concern around the issue of employee security risks is not necessarily making companies any more effective at addressing it.<br \/>\nSixty percent of companies surveyed believe that their employees are not knowledgeable or have no knowledge of the company&#8217;s security risks.<br \/>\nAdditionally, the study showed a lack of concern by C-suite executives.<br \/>\nOnly 35 percent of respondents say senior management believes it is a priority that employees are knowledgeable about how data security risks affect their organization.<br \/>\nThis illustrates a clear gap between companies&#8217; awareness of the issues caused by employee negligence and their actions.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6930c74b2a&#038;e=20056c7556<\/p>\n<p>What is the right DDoS protection cloud service for your organization?<br \/>\nA list of top DDoS protection cloud services given in random order can include F5 Silverline, Arbor Networks\u2019 Arbor Cloud, CloudFlare\u2019s advanced DDoS protection, VeriSign DDoS Protection Service, Imperva Incapsula, Akamai Kona Site Defender, Cisco Guard, and Level3 DDoS Mitigation.<br \/>\nThere are many more such services; this list includes the best, depending on who you talk to.<br \/>\nHere are four tips to know when preparing to select a DDoS protection cloud service.<br \/>\nTip No.1: Know Your Risk Profile.<br \/>\nDetermining what DDoS protection cloud service is best for your business starts with knowing the risk profile of your organization, since you will have to marry a suitable service to that profile.<br \/>\nISACA offers information about what to include in a risk profile.<br \/>\nTip No.2: Know the protections\/coverage you need.<br \/>\nOnce you have established what the weight of these pain points would be on your organization in and after an active attack, you need to establish what kinds of protections are necessary.<br \/>\nTip No.3: Know providers\u2019 research methods.<br \/>\nThe methods the DDoS protection cloud service uses to gather data about attack vectors is also important to your selection.<br \/>\nTip No.4: Deployment options.<br \/>\nBe sure to ask whether the service can be deployed in different ways so that you can select the deployment approach that leaves you feeling confident and comfortable.<br \/>\nCullen offers eight tips for ranking DDoS protection cloud services based on the quality of critical service capabilities.<br \/>\nQuality No.1: Low latency.<br \/>\nQuality No.2: Security track record.<br \/>\nQuality No.3: Remote ticketing service.<br \/>\nQuality No.4: Strong UI\/dashboards for self-management.<br \/>\nQuality No.5: A Forensics Team.<br \/>\nQuality No.6: Logging.<br \/>\nQuality No.7. Licensing.<br \/>\nQuality No.8. Minimal impact to the local environment.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c2476d8c87&#038;e=20056c7556<\/p>\n<p>Swift CEO to Say More Banks May Have Been Breached by Hackers<br \/>\n(Bloomberg) &#8212; Hackers may have targeted more banks than have been previously reported, according to prepared remarks by the chief executive officer of Swift, the global interbank messaging system is set to give on Tuesday.<br \/>\nThe Society for Worldwide Interbank Financial Telecommunication will increase security requirements for the software clients use and help clients conduct security audits, the network\u2019s chief executive officer, Gottfried Leibbrandt, will tell an audience at the European Financial Services Conference in Brussels, according to prepared remarks of the speech, which is slated to be delivered Tuesday.<br \/>\nThe network will introduce certification requirements for vendors that help some banks connect to the network and may help banks use pattern recognition to identify suspicious behavior, he will say.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=c4a6322d84&#038;e=20056c7556<\/p>\n<p>Encryption is the foundation of the new data center<br \/>\nA software-based encryption solution will be the foundation of the new data center architecture.<br \/>\nThe role and importance of such an encryption layer is only just beginning to be realized.<\/p>\n<p>More and more infrastructure platforms will offer built-in, always-on encryption that works without getting in the user\u2019s way.<br \/>\nInterestingly, as the encrypt\/decrypt functions become highly efficient, the more challenging part of encryption is managing the keys.<br \/>\nInfrastructure providers &#8212; cloud providers or software vendors such as VMware &#8212; will need to offer fully automated key management services to keep track of thousands of keys and have everything work together seamlessly.<br \/>\nThe second and less obvious transformational aspect of ubiquitous infrastructure encryption is the role it can play in enforcing micro-segmentation and access control.<br \/>\nIn this always-encrypted data center that we imagine, a cryptographic key must be released in order to boot a new server, attach a data volume to a server or allow one server to communicate with another.<br \/>\nIf an access control policy were integrated with the key management system, complex access control policies could be implemented quite simply.<br \/>\nThe data center of the future will be defined entirely in software.<br \/>\nIt will be dynamic and portable, spanning premise-based private clouds and hyperscale public clouds.<br \/>\nIt will provide businesses with the agility they need to respond to rapidly changing market conditions, as well as to innovate rapidly.<br \/>\nA software-based encryption solution will be the foundation of this new data center architecture.<br \/>\nThe role and importance of such an encryption layer is only just beginning to be realized.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ea14a90a35&#038;e=20056c7556<\/p>\n<p>46% of German companies get external IT security services<br \/>\nAlmost 1 in 2 German industrial companies (46%) use external IT service providers for the implementation of security measures, according to a recent Bitkom survey conducted among 504 companies of the manufacturing industries with more than 10 employees.<br \/>\nAlmost a quarter (24%) give the entire responsibility for security measures to an external company, while 20 percent share these between their own IT department and an outside service provider.<br \/>\nAlmost half (46%) of smaller companies with up to 99 employees, 49 percent of medium-sized and 42 percent of large companies (500+ employees) instruct external partners.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e701b285a9&#038;e=20056c7556<\/p>\n<p>SWIFT Promises Security Overhaul, Fraud Detection<br \/>\nAfter blaming a recent spate of bank robberies on banks&#8217; poor information security practices, SWIFT has somewhat changed its tune, saying that it wants to help financial firms spot related fraud and better share information about unfolding threats.<br \/>\nLeibbrandt promised that later SWIFT will debut a &#8220;five-part customer security program&#8221; that features:<br \/>\nInternational information sharing &#8220;in a confidential way that uses the data while protecting the identity of the institution and customers.&#8221;<br \/>\nRequiring customers to use strong security tools and practices &#8220;to better protect their local environments.&#8221;<br \/>\nBetter security guidance for customers, including related frameworks for auditing SWIFT-related security.<br \/>\nA promise to try and help banks better analyze &#8220;payment pattern controls to identify suspicious behavior.&#8221;<br \/>\nCertification requirements for third-party providers.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=65fc0c2187&#038;e=20056c7556<\/p>\n<p>Anonymised database will make UK number one for cyber insurance: ABI<br \/>\nThe Association of British Insurers is calling for a national, anonymised database recording details of cyber incidents at businesses to be established in order to help the UK become a world leader in cyber insurance.<br \/>\nThe not-for-profit database would contain details of cyber incidents including business interruption losses, ransom demands, loss of confidential data, and damage to IT systems.<br \/>\nBuilding on the requirement in the European Network Information Security Directive for certain firms to provide notification of cyber incidents from 2018, this data could be anonymised and made accessible to insurers who could then use it to improve pricing and potentially put the UK at the forefront of the global market.<br \/>\nWhile several states in the USA require firms to report any cyber breaches to the authorities, a national database accessible to insurers would be a world first.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d69d0c3cfc&#038;e=20056c7556<\/p>\n<p>Liability of Cloud-Based Service Provider For Data Breach<br \/>\nThe court was careful to review both the limit of liability clause (which provided an overall cap on liability to 12 months fees), and the exclusion clause (which barred recovery for indirect or consequential damages).<br \/>\nThe overall limit of liability had an exception: the cap did not apply to a breach of the confidentiality obligation.<br \/>\nHowever, this exception did not impact the scope of the limit on indirect or consequential damages.<br \/>\nSince the court decided that the claimed breach did not result from a failure of performance, and the consequential damages clause applied to LMT\u2019s alleged loss.<br \/>\nAs a result, LMT\u2019s claims were dismissed.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a58c7977d9&#038;e=20056c7556<\/p>\n<p>House Lawmakers Turn Up Heat on FDIC Over Cybersecurity<br \/>\nWASHINGTON\u2014An investigation by House lawmakers turned up \u201csignificant shortfalls\u201d in a U.S. bank regulator\u2019s cybersecurity policies, leaving it susceptible to stolen private information and regulatory data, House Republicans said Tuesday.<br \/>\nFollowing a subcommittee hearing earlier this month on seven cybersecurity breaches at the Federal Deposit Insurance Corp., new information obtained by the House Committee on Science, Space, and Technology indicates the agency may have misrepresented cybersecurity policies, hid information from lawmakers, and has a culture of obstructing whistleblowers.<br \/>\nThe committee also asked the agency to notify former employees who may have access to such electronic records to halt any practice to destroy or alter such electronic records.<br \/>\nThe committee also requested interviews with nine employees at the agency who had been tapped to procure materials tied to the security breach.<br \/>\nThey include Roberta McInerney, deputy general counsel for consumer and legislation, Andy Jiminez, director of legislative affairs, and Roderick Toms, acting chief information security officer, information security and privacy staff.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=07c78df900&#038;e=20056c7556<\/p>\n<p>OWASP set to address API security risks<br \/>\nOWASP has started a new project and is set to publish a new guide on security risks.<br \/>\nThe issue they aim to tackle this time is API security.<br \/>\nThe new OWASP API Security Project has been introduced at the recently concluded NolaCon, by project leader David Shaw and colleague Leif Dreizler (presentation recorded by Adrian Crenshaw):<br \/>\nThe tentative API Security Top Ten Risks lists has been compiled based on aggregate data from Bugcrowd (Dreizler is a Senior Security Engineer at the company), feedback from industry surveys, as well as high-profile breaches in the media, and currently looks like this:<\/p>\n<p>1) Improper Data Sanitization<br \/>\n2) Insufficient Access Control<br \/>\n3) Insecure Direct Object Reference<br \/>\n4) Insufficient Transport Layer Security<br \/>\n5) Sensitive Data Exposure<br \/>\n6) Weak Server-Side Security<br \/>\n7) Improper Key Handling<br \/>\n8) Inconsistent API Functionality<br \/>\n9) Security Misconfiguration<\/p>\n<p>Yes you might have noticed, there is no number 10.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=461047b0cb&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is:  dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:    Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p> Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=e33861ca72)<\/p>\n<p> Update subscription preferences (http:\/\/paulgdavis.us3.list-manage1.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] * Cisco Systems : Software products or application platforms, do I have to choose? * Russia\u2019s Swift Alternative Looks Tempting After Hackers Steal Millions * Experian : Data Breach Resolution and Ponemon&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1230","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1230"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1230\/revisions"}],"predecessor-version":[{"id":3717,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1230\/revisions\/3717"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}