Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

China-based threat actors are using sophisticated malware installed on handheld scanners to target shipping and logistics organizations from all over the world.
A Senate committee approved the Cybersecurity Information Sharing Act, which aims to help companies and government share information about cyber-attacks and other threats. Privacy groups opposed the bill because it could potentially give the government access to huge trove of personal data about Americans.
Rogue digital certificates issued in India for several Google domains were identified and blocked last week, Google representatives said.
Suits and Spooks London is happening on Friday Sep 12th with speakers from BAE Systems, EUROPOL, CERT-EU, Kaspersky Lab, CrySyS Lab, Goldman Sachs, PwC and other organizations.
With what may have been a subtle reference to former Target Stores CEO Greg Steinhafel, who lost his job from his handling of cyber attacks, speaker and panelist Rebecca Scorzato set the stage for her opening comments at July’s exceptional Suits & Spooks cybersecurity forum in New York.
Microsoft has launched a limited preview of new security and threat information exchange platform that enables users to set up their own independent threat sharing communities to exchange information.
TIBCO's LogLogic 5.5 provides IT businesses control with a centralized source for enterprise log and machine data, improving business agility and achieving cost savings.
Representatives of New Zealand’s National Institute of Water and Atmospheric Research (NIWA) confirmed that the organization’s FitzRoy supercomputer was targeted in a cyberattack.
Security experts and eBay have confirmed that a recent user database being advertised on Pastebin was not obtained as a result of the data breach suffered by the online marketplace earlier this year.
eBay said Wednesday cyberattackers broke into its database with customer passwords and other personal data in what could be one of the biggest breaches of its kind.

FEATURES, INSIGHTS // Incident Management

rss icon

Joshua Goldfarb's picture
An organization that keeps records of its security incidents should be able to study that data to understand the top ways in which it is generally becoming compromised.
Mark Hatton's picture
Having a CISO not only solves the diffusion of responsibility problem by putting one person in charge, it also helps to transform the security culture in your organization.
Marcus Ranum's picture
There are two ways to start establishing security metrics. One is what I think of as the “bottom up” approach and the other being “top down”. For best results you might want to try a bit of both.
Torsten George's picture
In order to find the needle in the haystack, it is imperative to have all necessary data available to diagnose the patterns that point to an advanced persistent threat or sophisticated cyber-attack.
Mark Hatton's picture
The fall of a high-profile CEO due to security concerns makes me envision a scenario where security is now given a more prominent role on the executive team, with more emphasis placed on avoiding the breach in the first place.
Marcus Ranum's picture
Don't ask your boss, “what metrics should I collect?” Metrics are 'produced' not 'collected' and you need to spend time figuring out what metrics are appropriate for your organization.
Mike Tierney's picture
Implementing an employee monitoring program and putting the three Ds process into place can act as a strong means of deterring inappropriate behavior or malicious intent by insiders.
Joshua Goldfarb's picture
When performing incident response, an organization should proceed through various stages by following its incident response process. While all stages are important, when an enterprise is attacked, the highest priority quickly becomes moving rapidly from detection to containment.
Dr. Mike Lloyd's picture
The fact that insurance companies – well respected by every business-centric executive – look at cyber risk and say “no, thanks” is a pretty clear indicator that something is rotten...
Marcus Ranum's picture
When you start your metrics program, you'll find that a great deal of information can be gleaned from existing data that gets stored in various places – most likely in your system logs.