{"id":1245,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail167-atl171-mcdlv-net\/"},"modified":"2021-12-30T11:39:01","modified_gmt":"2021-12-30T11:39:01","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail167-atl171-mcdlv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail167-atl171-mcdlv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail167.atl171.mcdlv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<\/p>\n<p>* Commission boosts cybersecurity industry and steps up efforts to tackle cyber-threats<br \/>\n* Endpoint and Network Security: The rise of \u201cDefense in Depth\u201d<br \/>\n* EU to invest \u20ac450 million in cybersecurity partnership fund<br \/>\n* The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges<br \/>\n* Password Sharing Is a Federal Crime, Appeals Court Rules<br \/>\n* French internet security report urges use of best practice<br \/>\n* Meeting the cyberchallenge<br \/>\n* BT : Industrialisation Of Cybercrime Is Disrupting Digital Enterprises<br \/>\n* Brian Krebs at TMG Executive Summit: Financial institutions have to empower security leaders<br \/>\n* Microsoft Cybersecurity Advocates for Coordinated Norms<\/p>\n<p>Commission boosts cybersecurity industry and steps up efforts to tackle cyber-threats<br \/>\nSince the adoption of the EU Cybersecurity Strategyin 2013, the European Commission has stepped up its efforts to better protect Europeans online.<br \/>\nIt has adopted a set of legislative proposals, in particular on network and information security, earmarked more than \u20ac600 million of EU investment for research and innovation in cybersecurity projects during the 2014-2020 period, and fostered cybersecurity cooperation within the EU and with partners on the global stage.<br \/>\nBut more work is needed to address the increasing number and complexity of cyber-threats.<br \/>\nThis is why the Commission proposes today a series of measures to reinforce cooperation to secure Europe&#8217;s digital economy and society, and to help develop innovative and secure technologies, products and services throughout the EU.<br \/>\nThe Commission has proposed an action plan to further strengthen Europe\u2019s cyber resilience and its cybersecurity industry.<br \/>\nThis includes measures to:<br \/>\n&#8211; Step up cooperationacross Europe<br \/>\n&#8211; Support the emerging single market for cybersecurity products and services in the EU<br \/>\n&#8211; Establish a contractual public-private partnership (PPP) with industry<br \/>\nThe EU Cybersecurity Strategy and the forthcoming NIS Directive already lay the groundwork for improved EU-level cooperation and cyber resilience.<br \/>\nThe forthcoming NIS Directive establishes two coordination mechanisms:<br \/>\n&#8211; the Cooperation Group which supports strategic cooperation and exchange of relevant information related to cyber incidents among Member States, and<br \/>\n&#8211; the Network of Computer Security Incident Response Teams (so-called CSIRT network) which promotes swift and effective operational cooperation on specific cybersecurity incidents and sharing information about risks.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=9823d928fe&#038;e=20056c7556<\/p>\n<p>Endpoint and Network Security: The rise of \u201cDefense in Depth\u201d<br \/>\nWhile there is an important place for network security \u2013 the simple fact that no system will ever be 100% secure shines light on the need for additional layers of security.<br \/>\nOften network security solutions are trying to filter dangerous content from reaching vulnerable endpoints, but isn\u2019t it better if we can make the endpoints less vulnerable.<br \/>\nWith this in mind, the best strategy is to build security from the endpoint out &#8211; reducing the attack surface and building defendable infrastructure.<br \/>\nWhile network-based security solutions can attempt to block threats before they hit the endpoint, the major problem with this approach is that companies that rely heavily on network security end up with an \u201ceggshell\u201d security stance \u2013 whereby a system is reliant on a single outer shell to protect all of the organization\u2019s data.<br \/>\nThe main difficulty faced by detection solutions is the impossible trade-off between security and usability.<br \/>\nNamely, all threats need to be deeply analyzed, but security teams simply cannot make employees wait while they address these issues, which would reduce productivity and staff morale.<br \/>\nIntel Security found that more than 30% of organizations disable network-based security features for this exact reason.<br \/>\nMalware authors know this, and therefore will create attacks that simply lay dormant for a period of time to bypass the network sandbox.<br \/>\nThis has caused malware to evolve new methods of avoiding networks security products, including:<br \/>\n\u2022 Delayed onset<br \/>\n\u2022 Detecting virtualized environment<br \/>\n\u2022 Checking the number of CPU cores (network sandbox usually only presents one)<br \/>\n\u2022 Checking if user is real (monitor mouse movement, etc.)<br \/>\n\u2022 Exploiting the virtual environment to escape<br \/>\nThe most effective way to complement a strong network defense is by reducing the attack surface of the endpoint.<br \/>\n1- Removing administrator privileges<br \/>\n2- Application whitelisting<br \/>\n3- Sandboxing<br \/>\nA bank doesn\u2019t leave the vault door open just because they have a security guard on the door \u2013 they start from the vault and layer security outward.<br \/>\nIf the endpoint isn\u2019t secure, and security admins do not ensure that both systems work in tandem, companies simply risk losing data, intellectual property, resources, money and invaluably, trust \u2013 in other words, everything.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=519219ad99&#038;e=20056c7556<\/p>\n<p>EU to invest \u20ac450 million in cybersecurity partnership fund<br \/>\nThe Commission said that it will invest an initial \u20ac450 million in the partnership and expects organisations including national, regional and local government bodies, research centres and academia to invest three times as much.<br \/>\nThe partnership will bring companies together for research into cybersecurity solutions for different sectors including energy, health, transport and finance, the Commission said.<br \/>\nThe Commission will encourage EU countries to make use of cooperation mechanisms which will be established under the new Network and Information Security (NIS) Directive, which is expected to be adopted by the European Parliament this week.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=4d3404a93b&#038;e=20056c7556<\/p>\n<p>The Information Security Leader, Part 1: Two Distinct Roles, Four Fundamental Questions and Three Persistent Challenges<br \/>\nThis kernel of wisdom comes from a certain high-tech headhunter in the late 1980s, who passed it on as she was helping her candidates prepare for their next job.<br \/>\nTwenty years later, it showed up again in \u201cWhat Got You Here Won\u2019t Get You There,\u201d a best-selling business book by Marshall Goldsmith.<br \/>\nTwo Distinct Roles<br \/>\nAs recommended in a strategy map for security leaders, successful next-generation CISOs should strive for their information security teams to be perceived by key stakeholders as being strong in both of two distinct roles:<br \/>\n&#8211; Subject matter experts<br \/>\n&#8211; Trusted advisers<br \/>\nFour Fundamental Questions<br \/>\n1) What\u2019s the risk?<br \/>\n2) What\u2019s the annualized risk in the specific context<br \/>\n3) How does an incremental investment quantifiably reduce risk?<br \/>\n4) How does one investment compare to another<br \/>\nThree Persistent Challenges<br \/>\n1) A language challenge<br \/>\n2) A measurement challenge<br \/>\n3) A communications challenge<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d1434f054a&#038;e=20056c7556<\/p>\n<p>Password Sharing Is a Federal Crime, Appeals Court Rules<br \/>\nOne of the nation\u2019s most powerful appeals courts ruled Wednesday that sharing passwords can be a violation of the Computer Fraud and Abuse Act, a catch-all \u201chacking\u201d law that has been widely used to prosecute behavior that bears no resemblance to hacking.<br \/>\nIn this particular instance, the conviction of David Nosal, a former employee of Korn\/Ferry International research firm, was upheld by the Ninth Circuit Court of Appeals, who said that Nosal\u2019s use of a former coworker\u2019s password to access one of the firm\u2019s databases was an \u201cunauthorized\u201d use of a computer system under the CFAA.<br \/>\nAt issue is language in the CFAA that makes it illegal to access a computer system \u201cwithout authorization.\u201d McKeown said that \u201cwithout authorization\u201d is \u201can unambiguous, non-technical term that, given its plain and ordinary meaning, means accessing a protected computer without permission.\u201d The question that legal scholars, groups such as the Electronic Frontier Foundation, and dissenting judge Stephen Reinhardt ask is an important one: Authorization from who?<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ffdc867375&#038;e=20056c7556<\/p>\n<p>French internet security report urges use of best practice<br \/>\nAn official report on internet security in France has urged all players in the sector to follow best practice recommendations for the BGP, DNS and TLS security protocols.<br \/>\nThe Resiliance of the French Internet report also encouraged all those in the sector to prepare themselves against the distributed denial-of-service (DDoS) attacks that have been behind some of the higher-profile failures of internet services.<br \/>\nThe 2015 report, the fifth of its kind, made the following principle recommendations: monitor prefix advertisements, and be prepared to react in case of hijacking; use protocols that support forward secrecy and discontinue the increasingly vulnerable SSLv2 and SHA-1 algorithms; diversify the number of SMTP and DNS servers in order to improve the robustness of the infrastructure; apply best practices to limit the effects of failures and operational errors and pursue the deployment of IPv6, DNSSEC, and RPKI to help develop skills and to anticipate possible operational problems.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=275d75f75f&#038;e=20056c7556<\/p>\n<p>Meeting the cyberchallenge<br \/>\nEach year, the United States falls farther behind in educating K-12 students in science, technology, engineering and math (STEM).<br \/>\nIt falls behind in teaching the next generation of technology workers for American companies.<br \/>\nAnd it falls behind in instructing cybersecurity professionals who will help protect our country.<br \/>\nThis deficiency puts our national security at greater risk.<br \/>\nAfter years of analyzing this challenge, it\u2019s now time for the federal government to act and help address this vulnerability.<br \/>\nCongress should invest in the future by providing adequate resources for K-12 computer science education for the next fiscal year, especially in this transition period between presidential administrations.<br \/>\nIn addition, at a time of increasing cyberthreats and greater complexity in cyberwarfare, the nation also needs skilled cybersecurity.<br \/>\nWe now require individuals who can design weapons to support U.S. warfighters and provide cyberdefense for our country\u2019s assets.<br \/>\nOur cyberstrength relative to that of our nation\u2019s adversaries is too vital to ignore.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1350a4e35d&#038;e=20056c7556<\/p>\n<p>BT : Industrialisation Of Cybercrime Is Disrupting Digital Enterprises<br \/>\nDALLAS, July 5, 2016 \/PRNewswire\/ &#8212; Only a fifth of IT decision makers in large multinational corporations are confident that their organisation is fully prepared against the threat of cyber-criminals.<br \/>\nThe vast majority of companies feel constrained by regulation, available resources and a dependence on third parties when responding to attacks, according to new research from BT and KPMG.<br \/>\nThe report, Taking the Offensive &#8211; Working together to disrupt digital crime finds that, while 94 per cent of IT decision makers are aware that criminal entrepreneurs are blackmailing and bribing employees to gain access to organisations, roughly half (47 per cent) admit that they don&#8217;t have a strategy in place to prevent it.<br \/>\nThe report also finds that 97 per cent of respondents experienced a cyber-attack, with half of them reporting an increase in the last two years.<br \/>\nAt the same time, 91 per cent of respondents believe they face obstacles in defending against digital attack, with many citing regulatory obstacles, and 44 per cent being concerned about the dependence on third parties for aspects of their response.<br \/>\nMark Hughes, CEO Security, BT, said: &#8220;The industry is now in an arms race with professional criminal gangs and state entities with sophisticated tradecraft.<br \/>\nThe twenty-first century cyber criminal is a ruthless and efficient entrepreneur, supported by a highly developed and rapidly evolving black market.&#8221;<br \/>\nThe BT-KPMG report shows that Chief Digital Risk Officers (CDROs) are now being appointed to hold strategic roles which combine digital expertise with high-level management skills.<br \/>\nWith 26 per cent of respondents confirming that a CDRO has already been appointed, the report&#8217;s data suggests that the security role and accountability for it is being re-examined.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8827529093&#038;e=20056c7556<\/p>\n<p>Brian Krebs at TMG Executive Summit: Financial institutions have to empower security leaders<br \/>\nDES MOINES, IA (July 7, 2016) \u2014 TMG Executive Summit keynote speaker Brian Krebs told a room full of credit union and community bank leaders that layers of technology are not enough to stop a data breach.<br \/>\nInstead, the investigative reporter insisted, security is only as effective as the people managing it for you.<br \/>\n\u201cOrganizations buy into the idea that doing security right is layering on the right mix of technology software and services, and that this magic combination will block 99 percent of attacks,\u201d said Krebs, mastermind behind the popular Krebs on Security blog. \u201cIt\u2019s just not true.<br \/>\nIt\u2019s very expensive to do security right, and that\u2019s partly because the actual security of your organization comes from security specialists.\u201d<br \/>\nIt\u2019s not uncommon, Krebs said, for an organization to look at its event logs for the first time after someone like him gives them a call.<br \/>\nHe devotes a lot of energy to breach notification.<br \/>\nComparing the experience of being notified of a breach to the five stages of grief, Krebs says the people he notifies are almost always in denial. \u201cThose with a high degree of security maturity skip through the first stages and go straight to depression,\u201d Krebs said to a roomful of nervous laughter.<br \/>\nPhishing, he said, is becoming increasingly sophisticated, even though some cybersecurity experts talk about it as a solved problem.<br \/>\nOver a span of three weeks, Krebs notified several different companies of phishing threats facing their C-suites.<br \/>\nHe had seen actual communications spoofing CEO email addresses on the dark web.<br \/>\nNo one from any of these vulnerable organizations returned his calls.<br \/>\nKrebs concluded his hour-long talk by coming back to his point about the importance of human security leadership.<br \/>\nThe head of security, Krebs advised, should always report to the COO, CEO or the board of directors.<br \/>\nOrganizations with what he calls a high degree of security maturity have created separation between IT and security: \u201cThe surest way to deny your security people any say is to have them report to the head of IT.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d1029393bc&#038;e=20056c7556<\/p>\n<p>Microsoft Cybersecurity Advocates for Coordinated Norms<br \/>\nMicrosoft wants new standards for the cybersecurity world, a vision proposed in its recently published paper \u201cFrom Articulation to Implementation: Enabling Progress on Cybersecurity Norms.\u201d<br \/>\nOverall, the Microsoft cybersecurity viewpoint emphasizes the need for a consensus across the industry.<br \/>\nSpecifically, the company wants to establish norms regarding the effective disclosure of security issues as well as methods to deal with the attribution of hostile acts directed at software.<br \/>\nWhat Microsoft wants is a \u201ccoordinated disclosure\u201d approach.<br \/>\nThis is a variant of responsible disclosure that also allows disclosure to computer emergency response teams (CERTs) along with the vendor.<br \/>\nThe company believes that public disclosure should only happen after a patch has been issued and believes this should be the new cybersecurity norm.<br \/>\nBut Juan Andres Guerrero-Saade, a senior security researcher at Kaspersky Lab, may have identified a problem with trying to establish any norms.<br \/>\nHe told SecurityWeek that \u201cthe whole concept of norms assumes that they relate to some homogeneous body guided by the same basic principles.<br \/>\nThat clearly isn\u2019t so in cyberspace.\u201d<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=accd74d5c5&#038;e=20056c7556<\/p>\n<p>============================================================<br \/>\nFeedback, questions? Our mailing address is:  dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)<\/p>\n<p>If you know someone else who would be interested in this Newsalert, please forwarded this email.<br \/>\nIf you want to be added to the distribution list, please click this:    Subscribe to this list (http:\/\/paulgdavis.us3.list-manage.com\/subscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a)<\/p>\n<p> Unsubscribe from this list (http:\/\/paulgdavis.us3.list-manage.com\/unsubscribe?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556&#038;c=f9e771096e)<\/p>\n<p> Update subscription preferences (http:\/\/paulgdavis.us3.list-manage.com\/profile?u=45bf3caf699abf9904ddc00e3&#038;id=e09452545a&#038;e=20056c7556)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] * Commission boosts cybersecurity industry and steps up efforts to tackle cyber-threats * Endpoint and Network Security: The rise of \u201cDefense in Depth\u201d * EU to invest \u20ac450 million in cybersecurity partnership&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1245","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1245"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1245\/revisions"}],"predecessor-version":[{"id":3732,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1245\/revisions\/3732"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}