{"id":1239,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail188-suw16-rsgsv-net\/"},"modified":"2021-12-30T11:39:01","modified_gmt":"2021-12-30T11:39:01","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail188-suw16-rsgsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail188-suw16-rsgsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail188.suw16.rsgsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<br \/>\nI had a request to change the format of the date in the Subject line to make it easier to sort.  So I made the change.<\/p>\n<p>* Big data is changing the game for backup and recovery<br \/>\n* A Hybrid Approach Is the Future of MSSPs<br \/>\n* State Names New \u2018Cyberczar\u2019 to Help Protect Its Networks Against Hackers<br \/>\n* [Australian] Government&#8217;s $230 million bid to fight cyber crime will fail without specialists, industry warns<br \/>\n* Corporate Email Phishing Scams Result in $3.1B Loss, Near 1300% Increase in 18 Months<br \/>\n* Malware infections by Locky, Dridex, and Angler drop &#8212; but why?<br \/>\n* What government\u2019s CISOs think about security in Digital India &#8211; See more at: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=305c2479f8&#038;e=20056c7556<br \/>\n* Is the CEO really to blame for cyber attacks &#038; data breaches?<br \/>\n* How to assess your stakeholder matrix as part of a cloud security strategy<br \/>\n* Why a global threat sharing program is vital to protect global infrastructure<br \/>\n* USB devices still represent a major security threat for enterprises<br \/>\n* The Poisoned Archives<br \/>\n* Cyber threats leap to top of manufacturers&#8217; list of risks<br \/>\n* Majority of American Business Owners Unlikely to Pay Off Cybercriminals in Ransomware Attack, Yet Lack Resources to Overcome Attack<\/p>\n<p>Big data is changing the game for backup and recovery<br \/>\nIt&#8217;s well-known in IT that when you change one part of the software stack, there&#8217;s a good chance you&#8217;ll have to change another.<br \/>\nFor a shining example, look no further than big data.<br \/>\n&#8220;Traditional backup products have challenges with very large amounts of data,&#8221; said Dave Russell, a vice president with Gartner. &#8220;The scale-out nature of the architecture can also be difficult for traditional backup applications to handle.&#8221;<br \/>\nToday&#8217;s horizontally scalable databases do include some capabilities for availability and recovery, but typically they&#8217;re not as robust as those IT users have become accustomed to, Russell added.<br \/>\n&#8220;If you need scalability, you need to give up consistency &#8212; you have to give up one or the other,&#8221; Thakur said.<br \/>\nThat makes it tough to get a reliable snapshot of the big picture for point-in-time recovery.<br \/>\nNot only is it more difficult to track which data might have moved where in a distributed database at any given moment, but the resiliency features that often come &#8220;baked&#8221; into newer distributed databases &#8212; replication, for example &#8212; won&#8217;t protect you if data gets corrupted, said Simon Robinson, a research vice president with 451 Research.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a130243b0d&#038;e=20056c7556<\/p>\n<p>A Hybrid Approach Is the Future of MSSPs<br \/>\nWhy a Hybrid Approach Is the Future of MSSPsBeyond the troubling data breach statistics, businesses of all sizes face a serious cyber security issue\u2014a cyber skills shortage and the cost of hiring rare security network experts.<br \/>\nThe level of difficulty to build an expert in-house security operations center is leading companies across all industries to consider other means of improving cyber security.<br \/>\nOne approach is to hire a third-party managed security service provider (MSSP).<br \/>\nAccording to IBM\u2019s Senior Manager of Security Services, Michael Sanders, the functions shared between your internal security operations team and an external MSSP include:<br \/>\n&#8211; Rule and device administration<br \/>\n&#8211; Real-time collection and analysis of activities that impact IT security<br \/>\n&#8211; Sweeping for incidents<br \/>\n&#8211; Threat monitoring<br \/>\n&#8211; Threat analysis<br \/>\n&#8211; Incident response management<br \/>\n&#8211; Emergency incident response planning<br \/>\nHowever, even the greatest communication between your in-house security team and your MSSP can be hindered by improper network architecture.<br \/>\nAlways ensure that your in-line security appliances and out-of-band monitoring devices are connected via proper networks TAPs.<br \/>\nWith network TAPs in place, you know that you have guaranteed visibility into every bit, byte and packet\u00ae of network traffic allowing the security tools to do their job while maintaining 100% network uptime, even when the appliance requires updates or trouble-shooting.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2e5ff7d007&#038;e=20056c7556<\/p>\n<p>State Names New \u2018Cyberczar\u2019 to Help Protect Its Networks Against Hackers<br \/>\nAs NJ becomes increasingly reliant on computer networks, it grows correspondingly more vulnerable to expensive, intrusive cyber attacks<br \/>\nTo that end, Gov.<br \/>\nChris Christie announced yesterday that he\u2019s stepping up the state\u2019s cybersecurity efforts by creating a cabinet-level technology officer and naming David Weinstein, the top cybersecurity expert from the state Office of Homeland Security, to fill the new job.<br \/>\nA top state lawmaker also called yesterday for the creation of a new legislative committee to advance laws combatting cyberattacks.<br \/>\nChristie said yesterday that Weinstein\u2019s elevation to a $141,000-a-year cabinet-level position will help better protect New Jersey\u2019s government servers against threats posed by aggressive hackers.<br \/>\nWeinstein will be in charge of the state\u2019s day-to-day cybersecurity operations and intelligence analysis.<br \/>\nHe will also work closely with the state Office of Homeland Security, Christie said.<br \/>\nChristie said the new $10 million allocation for cybersecurity will come out of funds in the state\u2019s current, $34 billion fiscal year budget, which is in place until June 30.<br \/>\nThe money will be used to harden state government computer systems against sophisticated cyberattacks and to allow for audits of the state\u2019s computer networks and other infrastructure for potential weaknesses.<br \/>\nAll state departments will also undergo a cyberthreat evaluation, the governor\u2019s office said.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e8a7e79511&#038;e=20056c7556<\/p>\n<p>[Australian] Government&#8217;s $230 million bid to fight cyber crime will fail without specialists, industry warns<br \/>\nThe professional association for Australia&#8217;s ICT industry has warned there are not enough specialists to deliver the federal government&#8217;s $230 million cyber security strategy.<br \/>\nAustralian Computer Society president Anthony Wong said the government faced a shortfall of up to 100,000 ICT professionals by 2020 and urgent action was needed to expand the workforce.<br \/>\nEarlier this year, the government announced it was prepared to strike back against foreign cyber attacks with funds to be spent recruiting hundreds of police and cyber security specialists.<br \/>\nThe funding boost comes after another $400 million was allocated to pay for staff with hacking experience to work for the Australian Signals Directorate, a key intelligence agency.<br \/>\nBut consultants have warned a recruitment drive for close to 900 positions will cause headaches for the government in coming years.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4d4cb16db6&#038;e=20056c7556<\/p>\n<p>Corporate Email Phishing Scams Result in $3.1B Loss, Near 1300% Increase in 18 Months<br \/>\nTotal number of Business Email Compromise (BEC) related crimes have reached epidemic levels, at nearly $3.1 billion in losses and involving 22,143 victims worldwide since January 2015, according to a new FBI report.<br \/>\nMost victims, according to reports to FBI, &#8220;use wire transfers as a common method of transferring funds for business purposes; however, some victims report using checks as a common method of payment.<br \/>\nThe fraudsters will use the method most commonly associated with their victim&#8217;s normal business practices.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3708d6d99d&#038;e=20056c7556<\/p>\n<p>Malware infections by Locky, Dridex, and Angler drop &#8212; but why?<br \/>\nMalware infections by Locky, Dridex, and Angler drop &#8212; but why?Malware infections by Locky, Dridex, and Angler drop &#8212; but why?Why have these infamous and prolific malware infections suddenly dropped off the radar so quickly.<br \/>\nResearchers point out the decline follows the arrest of 50 people in Russia who are accused of using malware to steal over $25m, reportedly by the malicious Lurk Trojan infecting victims&#8217; PCs and stealing bank account details.<br \/>\nGiven that the threats from Locky and Dridex haven&#8217;t disappeared completely, it&#8217;s thought that these malware campaigns aren&#8217;t directly linked to those responsible for using Lurk.<br \/>\nHowever, Symantec researchers suggest that the arrests may have resulted in the shutdown of networks used to host campaigns by other hacking and cybercriminal groups.<br \/>\nWhile that&#8217;s slowed activity for now, it&#8217;s probably only a matter of time before Locky, Dridex, and other forms of malware are on the rise again &#8212; because cybercriminals know this form of malicious activity is an easy way to exploit victims for ransom money.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=cf7e631ee6&#038;e=20056c7556<\/p>\n<p>What government\u2019s CISOs think about security in Digital India &#8211; See more at: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=39679a4cc0&#038;e=20056c7556<br \/>\nWith the focus on the Digital India programme, the number of e-governance projects have increased across all the government departments.<br \/>\nMost of these projects are executed either through tender or public private partnership (PPP) mode.<br \/>\nTherefore, it is essential to have proper information security strategy in place to secure the data.<br \/>\nAnd, this is what government\u2019s technology heads are gearing up to safeguard by creating an integrated framework to address the challenge of heterogeneity and complexity in managing cyber security for government projects.<br \/>\nWith the success of some of the e-governance projects like passport seva, Aadhar, government has realised that technology can help them in improving governance.<br \/>\nAnd, now the Digital India project is taking these things to the next level by not only focusing on its nine-pillars, but also strengthening the back-end platform and process.<br \/>\nMost of the government services are getting digitised.<br \/>\nBut having achieved these objectives, the government now has to ensure that the information collected remains secure.<br \/>\nTo fight the challenge, the government has taken number of steps.<br \/>\nThe MHA has recently issued a National Information Security Policy &#038; Guidelines that could be taken as reference by all the central ministries, state governments and public sector units (PSUs) for developing their own information security and control mechanism.<br \/>\nBut beyond the guidelines, it is essential that for framing a policy which really serve the purpose, government organisations must understand their requirements, their processes and functions.<br \/>\nAlong with the policy guidelines, they can refer to standards like ISO 27001, COBIT framework etc.<br \/>\nAn ideal cyber security framework is also constrained by the fact that across the world the concept of security is changing.<br \/>\nSecurity is moving beyond firewalls.<br \/>\nThe old rule of anything inside firewall is good and outside is bad, and network as a perimeter are now diminishing.<br \/>\nOrganisations are now focusing on continuous monitoring of the cyber infrastructure for predicting things in advance.<br \/>\nIn addition to a technology partners for e-governance projects, most of the government departments involve a consultant for the project management.<br \/>\nThis increases the number of stakeholders and the risk for the data breach.<br \/>\nThat is why Rudramurthy of MHA, says that the security measures should be part of the contract itself.<br \/>\nService provider must be completely checked prior to onboarding and they must also be monitored on a continuous basis during the execution. \u201cIn addition, government departments need to have complete clarity around intellectual property rights, data protection rights and technology retention rights,\u201d says Rudramurthy, adding that the controls generally does not need to be only liquidated damage, one should consider proactive, corrective and reactive mechanism.<br \/>\nHowever, the right flow and the direction will come when there is right talent.<br \/>\nTherefore, the time has come for the top of the government to scale up, in terms of the human resource talent and its technical expertise to understand the nitty\u2013gritty of the scope of the work given to service provider.<br \/>\nThis will help them to understand \u2013 what is expected during the implementation and how to get the work done within time.<br \/>\nRight now, most of these controls are in administrative hands but ideally it should be taken care by a technical person.<br \/>\nBut very few talented person are interested in working under the programme management unit (PMU) set-up due to unpredictable future and weak appraisal system.<br \/>\nAbove all the challenges, the good news is that in recent past, the awareness about cyber security has increased.<br \/>\nEverybody, be it political leaders, bureaucrats, RBI, SEBI or corporate, are talking about it.<br \/>\nThanks to some of the notable data breaches and Edward Joseph Snowden, whose disclosure on numerous global surveillance programs run by different governments has led to an intense debate on data security and privacy, which has finally catalysed the concept of data localisation, leading to different government departments taking steps to beef-up their cyber security mechanism. \u201cThe awareness level has increased but on the technical front, lot of maturity is needed,\u201d says Rajiv Prakash Saxena, ex-deputy director general, National Informatics Centre (NIC).<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e89a5a570a&#038;e=20056c7556<\/p>\n<p>Is the CEO really to blame for cyber attacks &#038; data breaches?<br \/>\nMPs have this week set out a series of recommendations for companies who fail to guard against cyber attacks and data breaches.<br \/>\nOne of the most talked about recommendations from the Culture, Media and Sport Committee concerned the salary of CEOs, specifically that salaries of the top brass should be linked to effective cyber security.<br \/>\nThis move by the government to enforce a firmer hand in cyber security has been generally welcomed by the security industry, with all but some agreeing that the buck stops at the CEO.<br \/>\nThey are the leader, the one at the top, after all.<br \/>\nHowever, the issue of penalties and salaries linked to cyber security has divided the security industry.<br \/>\nWhile others, like Javvad Malik, Security Advocate at AlienVault, believe it is wrong to blame one individual for security failings, saying:<br \/>\n&#8220;I feel it&#8217;s wrong to simply attribute a single security incident to a CEO and impose financial penalties upon the individual.&#8221;<br \/>\nUltimately, are CEO&#8217;s to blame for cyber security failings.<br \/>\nYes and no.<br \/>\nA CEO cannot be blamed for a cyber attack hitting a company, but they can be blamed for not having the right personnel, expertise, technology, strategy and company-wide education in place to deter and minimise the impact of an attack or data breach.<br \/>\nFor Mark James, Security Specialist at ESET, the question of who to blame should not even be asked at all.<br \/>\n&#8220;However, the question should be &#8220;have they taken enough preventative measures?&#8221; not &#8220;who&#8217;s to blame?&#8221; Finding out what went wrong, how it can be stopped in future and finding ways to better protect us, the users, are the key points that need addressing.&#8221;<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=fcac37cd73&#038;e=20056c7556<\/p>\n<p>How to assess your stakeholder matrix as part of a cloud security strategy<br \/>\nIT teams have a difficult or impossible time cobbling together a full picture of what their cloud security looks like at any point in time, and other stakeholders in the organization are effectively blind to what is happening in their cloud environment.<br \/>\nThis can result in gaping holes in cloud security and compliance postures, frustration, and perhaps even more serious consequences, should an attacker see an opportunity to take advantage.<br \/>\nThis is why cloud security needs to take a strategy-first approach, where every tool purchased and solution leveraged fits into a bigger strategy that meets the needs of each stakeholder within the organization.<br \/>\nUnderstanding the needs of everyone within the cloud security stakeholder matrix will not only lead to a strong security strategy, where the objectives outlined, tactics taken, and technologies employed meet the security needs of the business, but will also bring together leaders at every level, creating champions for its execution across an entire organization.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=77caa16628&#038;e=20056c7556<\/p>\n<p>Why a global threat sharing program is vital to protect global infrastructure<br \/>\nWe live in a time where the global sharing of threat intelligence is not only possible; it\u2019s vital to the security of our global infrastructure, and the public and private sectors have been working tirelessly to create these programs.<br \/>\nToday, thanks to the Cybersecurity Information Sharing Act of 2015 (CISA), enterprises now have the ability to share threat data with the Department of Homeland Security in a legal framework that protects good samaritans.<br \/>\nTo address the high-level technological needs of this endeavor, the DHS recently partnered with OASIS to revamp, standardize, lower the cost, and expand the reach of STIX and TAXII \u2014 data-sharing frameworks that now allow both humans and machines to exchange threat intelligence across borders in an automated fashion.<br \/>\nFurther, the U.S. government is also calling for more Information Sharing and Analysis Organizations (ISAOs) to be developed \u2014 diverse communities of private-sector companies that collaborate to share intelligence and help thwart cyber attacks.<br \/>\nOnce a global sharing program hits its stride, companies can rest assured that hackers will face more resistance than ever.<br \/>\nFor example, if Nike experiences an attempted breach, it can use STIX and TAXII to immediately report all the relevant details to the rest of the sharing ecosystem, and businesses across the globe will instantaneously have the ability to strengthen their defenses.<br \/>\nIf these same hackers try again at another location later on, they\u2019ll have no such luck.<br \/>\nThe industrial internet has the potential to create better, stronger, more innovative companies across all industries \u2014 which would undeniably improve the world as a whole.<br \/>\nBut, Industry 4.0 will only reach this lofty potential if businesses feel confident that their data is secure \u2014 and a crucial part of making that happen is encouraging widespread participation in a global threat sharing program.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e0b2561bce&#038;e=20056c7556<\/p>\n<p>USB devices still represent a major security threat for enterprises<br \/>\nThe survey of 2016 Infosecurity Europe visitors looks at the use of USB storage devices in the enterprise and the policies governing them.<br \/>\nThe research found that 74 percent of respondents&#8217; organizations allow employees to use USB devices in their networks, yet only 35 percent of companies force employees to use encrypted USB devices.<br \/>\nWhat&#8217;s surprising in the age of cloud is that 65 percent of employees still use USB devices to transfer company data. &#8220;This is a significant percentage and, in correlation to the 74 percent that are allowed to connect USB devices to their computers, and with the fact that USB thumb drives are constantly improved with bigger storage capacity and higher transfer speeds, makes them vulnerability for data security and exposes organizations to potential data leakage and data loss,&#8221; says Roman Foeckl, CoSoSys CEO and founder.<br \/>\nYou can find out more about the survey findings on the CoSoSys blog.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=28dcc11cf6&#038;e=20056c7556<\/p>\n<p>The Poisoned Archives<br \/>\nlibarchive is an open-source library that provides access to a variety of different file archive formats, and it\u2019s used just about everywhere.<br \/>\nCisco Talos has recently worked with the maintainers of libarchive to patch three rather severe bugs in the library.<br \/>\nBecause of the number of products that include libarchive in their handling of compressed files, Talos urges all users to patch\/upgrade related, vulnerable software.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a17df3a9c0&#038;e=20056c7556<\/p>\n<p>Cyber threats leap to top of manufacturers&#8217; list of risks<br \/>\nCyber security is the top concern for more than nine out of 10 manufacturers surveyed, BDO USA L.L.P. said Tuesday, up 44% from 2013 and marking the first time cyber risk cracked the list of top 10 risk factors.<br \/>\nMore than 92% of manufacturers in BDO&#8217;s 2016 Manufacturing RiskFactor Report cited cyber security concerns in their disclosures to the U.S.<br \/>\nSecurities and Exchange Commission this year.<br \/>\nThe report, which analyzes the latest 10-K filings from the largest 100 publicly traded U.S. manufacturers across five subsectors, found that 91% also named operational infrastructure risk, including information systems and implementation of new systems and maintenance.<br \/>\nOther top concerns include federal, state and or local regulations; labor concerns or underfunded pensions; competition and consolidation in manufacturing; and commodity or raw material prices.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=3c0a3c6496&#038;e=20056c7556<\/p>\n<p>Majority of American Business Owners Unlikely to Pay Off Cybercriminals in Ransomware Attack, Yet Lack Resources to Overcome Attack<br \/>\nSCOTTSDALE, Ariz., June 21, 2016 \/PRNewswire\/ &#8212; Business owners in the U.S. recognize the severity of ransomware and the potential disruption to business operations, yet 84 percent say they would not pay in the event of an attack, according to a new survey by IDT911\u2122, a leading data security and identity theft protection firm.<br \/>\nOf these business owners, some routinely back-up their business files and could therefore restore processes, whereas others simply wouldn&#8217;t pay cybercriminals\u2014even if it meant not recovering information.<br \/>\nWhile such interference is detrimental to organizations of all sizes, every minute a business is forced to spend offline, is particularly damaging to revenue streams.<br \/>\nMore than half (60 percent) of business owners acknowledge this vulnerability and agree that they would immediately report the attack to law enforcement authorities, as one out of three respondents (33 percent) say they could not go without access to critical business systems for any length of time.<br \/>\nAdditional key findings include:<\/p>\n<p>Only three percent say they would pay $10,000 or more in a ransomware attack, whereas 10 percent would pay between $1 and $100.<br \/>\nNearly a quarter of business owners (22 percent) say they are unsure how to, or were not aware of the need to, back up their system and files.<br \/>\nA mere five percent of business owners currently set aside funds in case of ransomware attacks.<br \/>\nFemale business owners are more likely than men to report ransomware attacks to authorities right away.<br \/>\nMillennials (ages 18 to 34) are more likely to have cyber insurance protecting their business than those respondents aged 35 to 44.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4e39b642d8&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is:  dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:    Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p> Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=f46b76716d)<\/p>\n<p> Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] I had a request to change the format of the date in the Subject line to make it easier to sort. So I made the change. * Big data is changing the&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1239","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1239"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1239\/revisions"}],"predecessor-version":[{"id":3726,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1239\/revisions\/3726"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}