{"id":2492,"date":"2016-09-11T00:00:00","date_gmt":"2016-09-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail219-suw16-rsgsv-net\/"},"modified":"2021-12-30T11:41:26","modified_gmt":"2021-12-30T11:41:26","slug":"fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail219-suw16-rsgsv-net","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2016\/09\/11\/fromreply-totodatemessage-idlist-idlist-unsubscribesendercontent-typemime-version-imail3dpaulgdavis-commail219-suw16-rsgsv-net\/","title":{"rendered":"From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail219.suw16.rsgsv.net;"},"content":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s,  apart from the reporter&#8217;s opinions ]<\/p>\n<p>* Companies refusing to intern students studying ethical hacking<br \/>\n* Malware Top 10: Conficker Grabs Top Spot, Tinba Takes Second<br \/>\n* New Report Finds Insider Corporate Data Theft and Malware Infections among Biggest Threat to Digital Business in 2016<br \/>\n* Cyber risk management of third party suppliers and partners<br \/>\n* Google Chrome security tips for the paranoid at heart<br \/>\n* CEOs need better cyber security skills as half fall victim to phishing scams<br \/>\n* The Unfriendly Skies: Airlines Must Bolster Anti-Hacker Defenses<br \/>\n* Book Review \u2013 Dark Territory: The Secret History of Cyber War; peek into the past, present &#038; future<br \/>\n* Polytechnique launching new degree in cybersecurity<br \/>\n* 30 of 50 banks may not meet capital adequacy norms: RBI<br \/>\n* The Terrorist Watch List Explained<br \/>\n* InfoSecurity Europe: AWS Security Best Practices<br \/>\n* Adaptive Security Demands A Shift In Mindset: Part 2 In A Series<br \/>\n* Security Prevention Alone Is Not Enough<br \/>\n* Russian parliament adopts data retention, encryption law<br \/>\n* Why Every DevOps Practice Needs Next-Generation Data Security<br \/>\n* Stare Into the Dark Side of DDoS Attacks<br \/>\n* Commerce Department Teams Up with DHS to Improve Its Cybersecurity<br \/>\n* Ten Tips to teach you to do network security analysis<br \/>\n* Where Do The Major Australian Political Parties Stand On Privacy And Encryption This Election?<br \/>\n* Security first: An overview of CompTIA CASP and SMSP certification<br \/>\n* Slideshow 14 ways a cyberattack hits your bottom line<br \/>\n* Another victim of SWIFT attackers, they steal $10 million from a Ukrainian bank<\/p>\n<p>Companies refusing to intern students studying ethical hacking<br \/>\nBotho College students who studied Ethical Hacking are finding it extremely difficult \u2013 in some cases impossible, to get internships with companies.<br \/>\nThe most reluctant are said to be commercial banks who fear what might happen if the interns hack systems through which they manage hundreds of millions of pula.<br \/>\nBotho offers Ethical Hacking as a module under a degree programme in Computer Forensics.<br \/>\nWhat appears to be the problem is the second word in the name of the course and the first doesn\u2019t seem to allay fears.<br \/>\nAs part of the programme, students have to get internship positions in order to put their classroom learning to practical use.<br \/>\nTypically, tertiary education institutions don\u2019t secure such places for students but the latter have to do so on their own.<br \/>\nThe internship hunt is aided by a script listing all the courses that a student has studied.<br \/>\nIn the particular case of students who are enrolled for the Computer Forensics programme, Ethical Hacking is on the list.<br \/>\nThis debacle attests to the fact that it will be some time before the industry and tertiary education institutions establish common ground on how education should be packaged for the job market.<br \/>\nFar too many of Botswana\u2019s university graduates are unemployed because what they learnt in school was not relevant to what the job market requires.<br \/>\nWorking with Business Botswana, the Ministry of Education and Skills Development is supposed to have developed a curriculum that plugs all the gaps.<br \/>\nThe ordeal of Botho students shows that there is still a lot that the two parties need to agree on.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=7c2fb1196e&#038;e=20056c7556<\/p>\n<p>Malware Top 10: Conficker Grabs Top Spot, Tinba Takes Second<br \/>\nSecurity firm Check Point just released its list of the 10 Most Wanted Malware for May 2016.<br \/>\nThe Conficker worm grabbed the top spot, followed by banking Trojan Tinba and highly complex malware Sality.<br \/>\nWhat\u2019s more, the total number of active malware families spiked 15 percent last month with 2,300 unique global groups.<br \/>\nWhile the top 10 include old threats, new vectors and a host of sophisticated attack avenues, there are a number of up-and-coming concerns that are also worth a look.<br \/>\nConsider the Godless malware currently making the rounds on Android devices.<br \/>\nMay was a big month for malicious actors, with historic code Conficker taking top spot in the malware rankings.<br \/>\nBanking Trojans stay strong, while worms, mobile malware, exploit kits and botnets all make an appearance in the top 10.<br \/>\nUp-and-comers such as stealthy Android rootkits and phishing phone attacks round out this high-powered malware lineup.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=a9375b6481&#038;e=20056c7556<\/p>\n<p>New Report Finds Insider Corporate Data Theft and Malware Infections among Biggest Threat to Digital Business in 2016<br \/>\nNEW YORK&#8211;(BUSINESS WIRE)&#8211;Insider data theft and malware attacks top the list of the most significant concerns for enterprise security executives, a new report from Accenture and HfS Research reveals.<br \/>\nOf those surveyed, a majority (69 percent) of respondents experienced an attempted or successful theft or corruption of data by insiders during the prior 12 months, with media and technology organizations reporting the highest rate (77 percent).<br \/>\nThis insider risk will continue to be an issue, with security professionals\u2019 concerns over insider theft of corporate information alone rising by nearly two-thirds over the coming 12 to 18 months.<br \/>\nAdditionally, the research shows that a budget shortage for hiring cybersecurity talent and well-trained employees is hindering the ability of organizations to properly defend themselves against these attacks.<br \/>\nThe survey, \u201cThe State of Cybersecurity and Digital Trust 2016\u201d, was conducted by HfS Research on behalf of Accenture (NYSE:ACN).<br \/>\nMore than 200 C-level security executives and other IT professionals were polled across a range of geographies and vertical industry sectors.<br \/>\nThe survey examined the current and future state of cybersecurity within the enterprise and the recommended steps to enable digital trust throughout the extended ecosystem.<br \/>\nThe findings indicate that there are significant gaps between talent supply and demand, a disconnect between security teams and management expectations, and considerable disparity between budget needs and actual budget realities.<br \/>\nDespite having advanced technology solutions, nearly half of all respondents (48 percent) indicate they are either strongly or critically concerned about insider data theft and malware infections (42 percent) in the next 12 to 18 months.<br \/>\nWhen asked about current funding and staffing levels some 42 percent of respondents said they need more budget for hiring cybersecurity professionals and for training.<br \/>\nMore than half (54 percent) of respondents also indicated that their current employees are underprepared to prevent security breaches and the numbers are only slightly better when it comes to detecting (47 percent) and responding (45 percent) to incidents.<br \/>\nThe report identified five significant gaps disrupting the ability of enterprises to effectively prevent or mitigate well-organized and targeted cyber attacks, including:<br \/>\n&#8211; Talent<br \/>\n&#8211; Technology<br \/>\n&#8211; Parity<br \/>\n&#8211; Budget<br \/>\n&#8211; Management<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2ce538f08c&#038;e=20056c7556<\/p>\n<p>Cyber risk management of third party suppliers and partners<br \/>\nDr.<br \/>\nJim Kennedy explains why managing the cyber risks posed by suppliers and partners is the weak link in many information security plans and looks at how to improve in this area.<br \/>\nHaving been involved in information\/cyber security for over 30 years, I have been asked to review computer and network security breaches for many Global 1000 corporations in the government, financial, pharmaceutical, electric power generation and distribution, manufacturing and telecommunications sectors of our economy.<br \/>\nIn many cases the breaches I analyzed came from failures of having inadequate security policies and operational procedures in place or not adhering to those policies or procedures that were in place.<br \/>\nTrusted insiders or employees also accounted for some of the losses of information and compromises to critical networks and systems.<br \/>\nHowever, a large number of the security breaches I investigated came from inadequately managing and controlling risks posed by third party partners or suppliers.<br \/>\nMany cases of knowingly allowed, unfettered access to an organization&#8217;s most critical and valuable information, systems, and networks was given to these third party entities without any or with minimal security review.<br \/>\nWhy.<br \/>\nTo facilitate the interconnection of these third party suppliers or partners to enable them to transact business or receive or deliver services.<br \/>\nSo when it comes to third party risk, what should be done?<br \/>\nBy entering into any business or operational agreement or contract the Trust component is already in place.<br \/>\nThe next order of business for the trusting organization is for its security team to Verify that adequate security is in place to validate that Trust of any connection between the two organizations.<br \/>\nTo begin this process, the value of the data to be sent, received, and\/or stored needs to be clearly understood along with critical network, storage, and systems security needed by both the primary organization and its proposed supplier or partner.<br \/>\nThe next order of business is to clearly identify and provide access only to the minimal amount of information and\/or data to be sent, received, or stored to meet the terms of the business contract or arrangement. \u2018Less is always Best\u2019.<br \/>\nRisks should be reviewed and determination made by senior management whether the risk is acceptable or can be mitigated to satisfaction.<br \/>\nHowever, senior security management should absolutely be involved in the final decision.<br \/>\nInterconnection and sharing of information between businesses and government is necessary to keep the economy functioning and for government organizations to accomplish their important missions.<br \/>\nAlso important is the protection of intellectual property, personal and patient information, customer and shareholder finances, and the critical infrastructure and governmental operations and information.<br \/>\nTo do this properly all third party entities needed to send, receive, repose, or process information on behalf of a business or government function needs to be assessed for risk they might pose to that information and make informed decisions so as to the insure the security and availability of that information.<br \/>\nI hope that I have help in identifying elements necessary to make those decisions.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=ebab1a3a04&#038;e=20056c7556<\/p>\n<p>Google Chrome security tips for the paranoid at heart<br \/>\nMore about IT Security<br \/>\nTech Pro Research&#8217;s Cybersecurity and Cyberwarfare Survey<br \/>\nWhat kind of data breaches have your organization scared, and what are you doing to fend them off.<br \/>\nTell us in this short survey and get a free copy of the research report.<\/p>\n<p>Read more<br \/>\nWhen you&#8217;re logged in to your Google account through Chrome, your Chrome settings sync with your account and every device you use with Chrome will inherit those settings.<br \/>\nThis isn&#8217;t always an optimal configuration, because it will sync cookies, passwords, history, and more.<br \/>\nThere will be cases where you do not want that information being sent into the ether to sync with your other devices.<br \/>\nFollow these steps to prevent this from happening.<br \/>\nLet&#8217;s move onto some less obvious browser settings that can be changed to help beef up your security.<br \/>\nFrom within the Settings window, click Show Advance Settings and then click Content Settings (under Privacy).<br \/>\nThis particular section is crucial to your security; it&#8217;s where you&#8217;ll configure what to do with Cookies, JavaScript, Plugins, Popups, and more.<br \/>\nThese are the settings I recommend you use.<br \/>\nLet&#8217;s move onto some less obvious browser settings that can be changed to help beef up your security.<br \/>\nFrom within the Settings window, click Show Advance Settings and then click Content Settings (under Privacy).<br \/>\nThis particular section is crucial to your security; it&#8217;s where you&#8217;ll configure what to do with Cookies, JavaScript, Plugins, Popups, and more.<br \/>\nThese are the settings I recommend you use.<br \/>\nI recommend unchecking the box for both settings under Passwords, even though this will cause you to always have to re-enter your passwords for every secure site you use.<br \/>\nI recommend unchecking the box for both settings under Passwords, even though this will cause you to always have to re-enter your passwords for every secure site you use.<br \/>\nFor those that really don&#8217;t want to risk security, when using Google Chrome, you can always run every session through an Incognito window.<br \/>\nMany desktop environments will allow you to open Chrome in Incognito without having to first launch Chrome and then open a new Incognito window.<br \/>\nElementary OS Freya, for instance, allows you to right-click the Chrome launcher and then select New Incognito Window (Figure D).<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=dac5abd44f&#038;e=20056c7556<\/p>\n<p>CEOs need better cyber security skills as half fall victim to phishing scams<br \/>\nExecutive boards need better cyber security training, given half of chief security officers fall victim to phishing attacks, according to research conducted by security firm AlienVault.<br \/>\nThe research found that 82 per cent of IT security professionals worry that their high-ranking executives are still vulnerable to phishing scams.<br \/>\nDespite such concerns only 45 per cent provide cyber security training to all their employees including the executive board, while 20 per cent do not conduct any training and instead tackle the fallout of such cyber attacks when they occur.<br \/>\nAccording to the FBI there was a 270 per cent increase in CEOs becoming victims of fraud since the beginning of 2016.<br \/>\nSuch fraud has cost US organisation over $2.3bn over the past three years, while each attack is estimated to cost companies between $25,000 to $75,000.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=d4911417fd&#038;e=20056c7556<\/p>\n<p>The Unfriendly Skies: Airlines Must Bolster Anti-Hacker Defenses<br \/>\nThe Israeli military made (air)waves last week when it announced that it was installing cyber defenses on its F-35 jets.<br \/>\nWhile this may seem like a futuristic concept, it\u2019s actually long overdue from an online security standpoint.<br \/>\n\u201cAs technology rapidly continues to advance, we must all work to ensure that the airline industry remains vigilant in protecting its aircraft and systems from cybersecurity breaches and attacks,\u201d Markey, a member of the Commerce, Science and Transportation Committee, wrote in the letter.<br \/>\nThe answers Markey received revealed that there is no uniform standard for cybersecurity testing, so in April he introduced the Cybersecurity Standards for Aircraft to Improve Resilience Act of 2016, which would require the disclosure of information relating to cyberattacks on aircraft systems, and would establish guidelines to identify and address cybersecurity vulnerabilities in commercial aviation.<br \/>\nThe bill was referrred back to Markey\u2019s committee, but no further action has been taken.<br \/>\nMarkey\u2019s office did not respond to several requests for comment.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6b344626f5&#038;e=20056c7556<\/p>\n<p>Book Review \u2013 Dark Territory: The Secret History of Cyber War; peek into the past, present &#038; future<br \/>\nCYBER WARFARE can be tough to explain.<br \/>\nLike the thousands of lines of coding that run through a computer programme, it entails complex technicalities.<br \/>\nBut in Dark Territory, Pulitzer Prize-winning American journalist and author Fred Kaplan takes readers through tapped phone lines and top-secret cyber units and operations to illustrate how US policymakers and organisations realised that the \u2018threat\u2019 was real and prepared for it.<br \/>\nIntelligence agencies and bodies like the National Security Agency, Central Intelligence Agency and the department of defense were key players in these preparations.<br \/>\nTheir evolution over the years is also depicted in detail in the book.<br \/>\nThe book also focuses on some recent incidents of cyber attacks that prove that the looming threat is omnipresent.<br \/>\nThe attack on Sony Pictures by North Korean hackers and an assault by Iranian cyber criminals on Las Vegas Sands Corporation, a conglomerate with assets worth more than $20 billion, are prime examples of strikes that were launched \u201cnot for money, trade secrets, or traditional espionage, but to influence a private company\u2019s behavior\u201d.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=00c60cba56&#038;e=20056c7556<\/p>\n<p>Polytechnique launching new degree in cybersecurity<br \/>\nAs information and communication technology (ICT) has become integral to almost every facet of modern society, cybersecurity has become one of the hottest fields around.<br \/>\nWith a goal of boosting supply and expertise in the burgeoning field, Polytechnique Montr\u00e9al and Deloitte have teamed up to educate a new crop of cybersecurity experts.<br \/>\nThe engineering school, which is part of Universit\u00e9 de Montr\u00e9al, and the professional services firm are joining forces to fight cybercrime by expanding and upgrading Polytechnique\u2019s cybersecurity program \u2014 and creating a state-of-the-art curriculum that will meet current market needs.<br \/>\nThey aim to create the first bachelor\u2019s degree in cybersecurity \u2014 which will be offered in English next year as well \u2014 by offering three cutting-edge certificate programs in cyber investigation, online fraud and IT network computer security.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=62d529362d&#038;e=20056c7556<\/p>\n<p>30 of 50 banks may not meet capital adequacy norms: RBI<br \/>\nThe Reserve Bank of India (RBI) has raised concerns over the capital adequacy ratio of many lenders (30 of 50), saying they might not be able to meet the norms under extreme scenarios.<br \/>\nIn its Financial Stability Report, it said this ratio doesn\u2019t seem threatened for now but could slip below the required level if there\u2019s a surge in bad loans.<br \/>\nTests conducted by RBI suggest that under a baseline scenario, gross non-performing assets (NPAs) could rise to 8.5 per cent of the total by March 2017, from 7.6 per cent in 2016.<br \/>\nHowever, if banks\u2019 asset quality faces any severe stress, it could rise to 9.3 per cent.<br \/>\n30 of 50 banks may not meet capital adequacy norms: RBI<br \/>\nAlso, says RBI, while all in the banking system are focusing on improving the usage of technology, the system needs tighter security.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=6066b673f6&#038;e=20056c7556<\/p>\n<p>The Terrorist Watch List Explained<br \/>\nThe Terrorism Screening Database is the official name for the terrorist watch list and is maintained by the FBI&#8217;s Terrorist Screening Center.<br \/>\nThe Terrorism Screening Database is the country&#8217;s central repository of foreign and domestic known and suspected terrorists.<br \/>\nIt receives names of suspected international terrorists from the Terrorist Identities Datamart Environment, which is maintained by the National Counterterrorism Center in connection with the U.S. intelligence community and security agencies that have information on terrorists.<br \/>\nIt also receives data on domestic terrorists from the FBI.<br \/>\nFrom the Terrorism Screening Database, more specific lists are created for different purposes.<br \/>\nFor example, the No Fly and Selectee lists are used to prevent individuals from travelling or to subject them to greater scrutiny.<br \/>\nFor an individual to be included on the No Fly or Selectee list, additional evidence of his threat to aviation security and clear identifying information is needed above and beyond the reasonable suspicion standard.<br \/>\nTo get on the Terrorism Screening Database, U.S. officials nominate an individual whom they have &#8220;reasonable suspicion&#8221; to believe is engaged in or aiding terrorist activities.<br \/>\nThere must also be a sufficient level of identifying information to include an individual on the list.<br \/>\nThere have been, and continue to be, legal battles over whether proper avenues for redress exist to get off the No Fly list.<br \/>\nThe FBI&#8217;s decision to close its investigations will be reviewed.<br \/>\nFBI Director James Comey has said that it appears the bureau followed the correct procedures, but the steps the agents took are being examined to see if something fell through the cracks.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=2b79de091d&#038;e=20056c7556<\/p>\n<p>InfoSecurity Europe: AWS Security Best Practices<br \/>\nEvident.io Founder and CTO Justin Lundy focused on securing Amazon Web Services (AWS) access with best security practices in the industry.<br \/>\nHere\u2019s a summary of some of the top tips:<br \/>\n&#8211; Disable the Root Account API Access Key<br \/>\n&#8211; Enable Multi-Factor (MFA) Everywhere<br \/>\n&#8211; Reduce the Number of IAM Users With Admin Access<br \/>\n&#8211; Use Roles for Apps that Run on EC2 Instances<br \/>\n&#8211; Enact the Principle of Least Privilege for Programs<br \/>\n&#8211; Rotate All Keys Regularly<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=759777427b&#038;e=20056c7556<\/p>\n<p>Adaptive Security Demands A Shift In Mindset: Part 2 In A Series<br \/>\nBy adopting new ways of thinking about security, improving the capabilities of existing systems, and integrating key innovations, enterprises will be well on their way to better security.<br \/>\nIn blog 1 of our series, we examined three realities that are driving enterprises to embrace an adaptive approach to security &#8212; an idea coined by Gartner and explained in the report, Designing an Adaptive Security Architecture for Protection From Advanced Attacks.<br \/>\n\u201cBlocking and Prevention Solutions Will Keep All the Bad Guys Out.\u201d I\u2019m a big advocate of good nutrition, regular exercise, and sufficient rest.<br \/>\nBut even if you take these basic preventative measures, life can still throw you a curve ball.<br \/>\nWhile preventative controls are important against opportunistic attacks, most of today\u2019s most destructive threats are low-and-slow targeted attacks that can circumvent traditional signature-based defenses such as antivirus technology.<br \/>\nBasic prevention alone is not enough.<br \/>\n\u201cThere\u2019s Nothing We Can Do Once the Bad Guys Are In.\u201d In the security world, it\u2019s true that some malware or creative hacking will make it past enterprise defenses.<br \/>\nSo what do you do?<br \/>\n\u201cOur Security Products Don\u2019t Have to Communicate.\u201d As enterprises struggle to protect themselves against the next new attack, they are drawn to the promise of the latest shiny silver-bullet product.<br \/>\nhe premise behind an adaptive security infrastructure is much the same.<br \/>\nIf the technologies are connected and enabled to exchange insightful threat information and context, security teams and processes will be more effective both in the short term and long term.<br \/>\n\u201cIncident Response Only Needs to Happen on an As-Needed Basis.\u201d Getting back to health again, what happens if you have a car accident or suffer a severe injury?<br \/>\nMany enterprises have an \u201cemergency response\u201d consciousness.<br \/>\nThey look at incident response as something that happens only when a security event is discovered.<br \/>\nToday, this ad hoc approach is not an option.<br \/>\nThe new normal is the continual risk of compromise, which demands continuous response.<br \/>\nFinding the bad guys and stopping them from doing further damage must become an ongoing endeavor with formal plans and optimized processes that feed learnings back in to improve policies, processes, and technologies.<br \/>\nStay tuned for blog 3 of this series, which will address the specifics of what it takes to create an intelligence-driven security operations center (SOC).<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8a8cb09d86&#038;e=20056c7556<\/p>\n<p>Security Prevention Alone Is Not Enough<br \/>\nThe combination of zero-day-threats and attacks from within the internal network are now driving new types of solutions referred to as \u201cAdvanced Threat Detection.\u201d<br \/>\nThese are not a replacement for security prevention, but a complement.<br \/>\nBoth preventive and detective solutions are needed to counteract attacks, but the information gathered by both can also be used in retrospective analysis to determine if any further measures need to be taken and to learn from experiences.<br \/>\nThe alert of potential malicious behavior can be compared against information from security prevention solutions to assess if an attack is underway.<br \/>\nConversely, it can be used to validate a threat alert from a security prevention solution that could be a \u201cfalse positive.\u201d<br \/>\nhe average cost of time wasted responding to inaccurate and erroneous intelligence was estimated by Ponemon Institute to be up to $1.27 million annually for a typical organization.<br \/>\nBecause of this, only four percent of all malware alerts are investigated.<br \/>\nThe Ponemon Institute also found that prevention tools miss 40 percent of malware infections in a typical week.<br \/>\nAt the heart of advanced threat detection solutions is the concept of continuous monitoring and analysis, not just of logs and NetFlow data but of packets themselves.<br \/>\nThe Maginot Line was once considered a work of genius, but after the Second World War became the butt of many jokes, such as: The Maginot Line is French for \u201cspeed bump ahead.\u201d If you don\u2019t want your network security to become a joke, then invest in security detection, continuous monitoring and automated tools for correlation of data alerts.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=bb523fe725&#038;e=20056c7556<\/p>\n<p>Russian parliament adopts data retention, encryption law<br \/>\nThe lower chamber of the Russian parliament has adopted an amendment to the Law on Telecommunications requiring communications providers to retain certain customer data, reports Tdaily.ru.<br \/>\nThey would need to store records of both incoming and outgoing calls of all subscribers for six moths as well as sent SMS for three years.<br \/>\nThe requirements are related to anti-terrorism measures by the government.<br \/>\nThe amendment also includes the requirement to provide state services with tools enabling them to decrypt protected services, including sites using the https protocol.<br \/>\nOperators would need to create a special data processing and storage system for this purpose.<br \/>\nAnalysts estimate that Russian operators would need to spend RUB 5,000 billion in order to comply with the new law.<br \/>\nRussian President Vladimir Putin must still sign the legislation before it can take effect.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage2.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=e2364c1e92&#038;e=20056c7556<\/p>\n<p>Why Every DevOps Practice Needs Next-Generation Data Security<br \/>\nA DevOps shop is an unusually tempting target for cybercrime.<br \/>\nAs an organization improves its DevOps practice, it grows increasingly vulnerable because more people have access to privileged data.<br \/>\nWith all the downside, why aren\u2019t DevOps projects increasing the priority of data security.<br \/>\nThe answer is probably a simple question of incentives.<br \/>\nSurveys show that DevOps transformations are driven by the need to ship higher quality code faster, not by cost or security concerns.<br \/>\nIf a DevOps leader has a mandate to deliver speed and quality, security solutions get treated like roadblocks.<br \/>\nAdditionally, security experts are not always integrated with DevOps teams, so responsibility for avoiding breaches &#8211; and the consequences for experiencing one &#8211; fall elsewhere.<br \/>\nA successful next-generation solution will have three components:<br \/>\n&#8211; It will use data masking.<br \/>\n&#8211; The solution will deliver data on demand, in minutes, and in a way that team members may spin up themselves.<br \/>\n&#8211; The solution must readily integrate with the rest of the DevOps toolchain.<br \/>\nA next-generation data security solution can actually accelerate your DevOps projects.<br \/>\nDriving ahead without one simply paints a target on your back.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=679dbc77d6&#038;e=20056c7556<\/p>\n<p>Stare Into the Dark Side of DDoS Attacks<br \/>\nandwidth- or resource-saturating DDoS attacks are effective, but today they are not the most common type of DDoS attack.<br \/>\nResearchers are beginning to see a new motivation for the attacks they observe.<br \/>\nn order to effectively hide their tracks, attackers attempt to overwhelm security and logging tiers with smaller, repetitive DDoS attacks.<br \/>\nThe smaller attacks consume considerable time, attention, resources and log storage without filling the pipes.<br \/>\nWhile everyone is focused on the DDoS incident, attackers are performing more insidious actions to breach and remain persistent in a network.<br \/>\nWhat many fail to realize is that attackers understand security.<br \/>\nMost of them are experts at firewalls, IPS, sandboxes, anti-virus software and other attack detection technologies.<br \/>\nThey also understand how to use these systems to their advantage.<br \/>\nAnother dark side of DDoS that is growing in popularity is called DDoS for Ransom.<br \/>\nThis should not be confused with ransomware that encrypts hard drives and file systems, then prompts the victim to pay for a key to decrypt the data.<br \/>\nInstead, DDoS for Ransom always begins with a threat of a pending DDoS attack, most often delivered via email.<br \/>\nMost DDoS subject matter experts recommend a hybrid approach to defeating DDoS.<br \/>\nThis approach includes on premise DDoS defenses working in unison with cloud-based defenses.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=1b0cbd0ba8&#038;e=20056c7556<\/p>\n<p>Commerce Department Teams Up with DHS to Improve Its Cybersecurity<br \/>\nFor the U.S.<br \/>\nDepartment of Commerce, when it comes to cybersecurity it\u2019s better to be proactive than reactive.<br \/>\nCommerce has been partnering with the Department of Homeland Security to use new tools from a key DHS program to enhance its security posture.<br \/>\nOver the last few years, Commerce has been testing tools from DHS\u2019s Continuous Diagnostics and Mitigation (CDM) program, a five-year, $6 billion effort to give civilian agencies the tools and services required to monitor their IT systems and then respond almost instantaneously to vulnerabilities.<br \/>\nCommerce Department CIO Rod Turk tells Federal News Radio that the agency has been testing the CDM tools ahead of time to make sure it can quickly implement them when they are ready.<br \/>\nThat is forcing Commerce to upgrade its IT infrastructure to handle the tools.<br \/>\nCommerce has focused on using the software tools that DHS has provided to agencies under the CDM program, and Commerce is now moving from planning to implementation with many of those tools. \u201cWe\u2019re working very well with the DHS folks and we meet with them on a continuous basis and we are moving forward,\u201d Turk says.<br \/>\nCommerce\u2019s new system will support hardware management, software asset management and vulnerability management \u2014 the key elements of CDM.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8f1b81038a&#038;e=20056c7556<\/p>\n<p>Ten Tips to teach you to do network security analysis<br \/>\nConfiguring security analysis to identify the best way for your company and having meaningful output feasibility insights.<br \/>\nTo avoid falling into the trap of analysis, it provides security professionals to find the best way to configure security analysis, to yield meaningful insights possessed the feasibility of the recommendations.<br \/>\n1. shaping the environment, increase the real alarm detection rate<br \/>\n2.Adjust the Security Event Management (SIEM) features<br \/>\n3. capture threats at an early stage<br \/>\n4.The data is not better<br \/>\n5.Reduce Network Security Alert inflows<br \/>\n6. a threat hunter<br \/>\n7.Use the context of reducing incident response time<br \/>\n8.First, narrow the scope of the attack, and then finish up analysis<br \/>\n9. wary of false positives<br \/>\n10.Use analytical support overhead<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=22d8805a1f&#038;e=20056c7556<\/p>\n<p>Where Do The Major Australian Political Parties Stand On Privacy And Encryption This Election?<br \/>\nQuestions asked of the political parties in the survey covered open government partnership, encryption, telecommunications data retention, intelligence oversight, NBN, preferential trade agreements, copyright reform and enforcement, censorship, the Office of the Australian Information Commissioner, mandatory data breach notification, the privacy right of action, census data and health records.<br \/>\nLink: http:\/\/paulgdavis.us3.list-manage1.com\/track\/click?u=45bf3caf699abf9904ddc00e3&#038;id=8a4120bdad&#038;e=20056c7556<\/p>\n<p>Security first: An overview of CompTIA CASP and SMSP certification<br \/>\nThe CompTIA Ad<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[From the desk of Paul Davis &#8211; his opinions and no-one else&#8217;s, apart from the reporter&#8217;s opinions ] * Companies refusing to intern students studying ethical hacking * Malware Top 10: Conficker Grabs Top Spot, Tinba Takes Second * New Report Finds Insider Corporate Data Theft and Malware Infections among&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-2492","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2492"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2492\/revisions"}],"predecessor-version":[{"id":4979,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2492\/revisions\/4979"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}