Thursday, November 30, 2017

Hiding in Plain Sight — Discovering Hidden Active Directory Objects

At our recent Hybrid Identity Protection Conference, several of us spoke about the increasing use of Active Directory as a subject of interest in malware attacks. Whether it’s mining AD for information about privileged access, compromising user accounts that lead to increasing levels of privilege in AD, or purposefully targeting AD domain controllers with ransomware, … Continue reading Hiding in Plain Sight — Discovering Hidden Active Directory Objects

The post Hiding in Plain Sight — Discovering Hidden Active Directory Objects appeared first on Semperis.

The post Hiding in Plain Sight — Discovering Hidden Active Directory Objects appeared first on Security Boulevard.



from Hiding in Plain Sight — Discovering Hidden Active Directory Objects

Watch the live recording of the SECTF results.

The post Watch the live recording of the SECTF results. appeared first on Security Through Education.

The post Watch the live recording of the SECTF results. appeared first on Security Boulevard.



from Watch the live recording of the SECTF results.

The History and Reinvention of NAC

Network access control (NAC) has come a long way since 2006, when it was all the rage. Back then, there were competing standards from Microsoft, Cisco and the Trusted Computing Group vying for IT managers’ attention. There were dozens of different products, claims and counterclaims that were hard to parse, let alone believe. Products were … Continue reading "The History and Reinvention of NAC"

The post The History and Reinvention of NAC appeared first on Trusted Computing Group.

The post The History and Reinvention of NAC appeared first on Security Boulevard.



from The History and Reinvention of NAC

Google sued over iPhone ‘Safari Workaround’ data snooping

Did you use an iPhone in the UK between 1 June 2011 and 15 February 2012? If so, you’re one of an estimated 5.4 million who may be in line for compensation.

The post Google sued over iPhone ‘Safari Workaround’ data snooping appeared first on Security Boulevard.



from Google sued over iPhone ‘Safari Workaround’ data snooping

Steve Hanna of TCG and Infineon to Talk IoT Security at January IoT Evolution Expo, Orlando

Steve Hanna, Infineon and co-chair or chair of TCG’s embedded systems, IoT and Industrial Work Groups, will speak at the IoT Evolution Expo (http://www.iotevolutionexpo.com/east/) on Wednesday, January 24, 2018, at 3:00 p.m. – 3:55 p.m. ET in a session Avoiding the IoT Zombie Apocalypse.  Hanna’s session will examine the business and technical implications of new attacks like the … Continue reading "Steve Hanna of TCG and Infineon to Talk IoT Security at January IoT Evolution Expo, Orlando"

The post Steve Hanna of TCG and Infineon to Talk IoT Security at January IoT Evolution Expo, Orlando appeared first on Trusted Computing Group.

The post Steve Hanna of TCG and Infineon to Talk IoT Security at January IoT Evolution Expo, Orlando appeared first on Security Boulevard.



from Steve Hanna of TCG and Infineon to Talk IoT Security at January IoT Evolution Expo, Orlando

Ben’s Book of the Month: Review of “How Healthcare Data Privacy Is Almost Dead … and What Can Be Done to Revive It!”

This month’s theme is security strategy & operations. Some questions include: what makes a good cybersecurity strategy? What policies and procedures should you have in place to ensure your employees, customers and sensitive data remain safe? If you believe John Trinckes in How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It! (Auerbach Publications 978-1498783958), the healthcare industry is running on the information security equivalent of life support. Perhaps no other industry has so much highly personal data than the healthcare sector. And it’s likely that no…

The post Ben’s Book of the Month: Review of “How Healthcare Data Privacy Is Almost Dead … and What Can Be Done to Revive It!” appeared first on Security Boulevard.



from Ben’s Book of the Month: Review of “How Healthcare Data Privacy Is Almost Dead … and What Can Be Done to Revive It!”

Snapchat takes a swipe at fake news

Snapchat is curating items based on what YOU like, not your echo chamber, fake-news spreading friends.

The post Snapchat takes a swipe at fake news appeared first on Security Boulevard.



from Snapchat takes a swipe at fake news

Digitalization and Security Regulation

This month the Swiss Federal government organized a Swiss Digital Day to help to drive the discussion within Switzerland on the impact of digitalization on the different aspects of our life.Cybersecurity is all over the place, which is very good – something which would not have been the case a few years ago. Everybody knows…

The post Digitalization and Security Regulation appeared first on Security Boulevard.



from Digitalization and Security Regulation

Apple’s “blank root password” fix needs a fix of its own – here it is

Bug, fix, bug, fix - but we're still saying "Well done" to Apple for a superquick response to the "blank root password" vulnerability.

The post Apple’s “blank root password” fix needs a fix of its own – here it is appeared first on Security Boulevard.



from Apple’s “blank root password” fix needs a fix of its own – here it is

Virtual WiFi Authentication

As IT admins look to lock down their WiFi infrastructure, many have wondered if it is possible to have virtual WiFi authentication or WiFi authentication from the cloud that is...

The post Virtual WiFi Authentication appeared first on JumpCloud.

The post Virtual WiFi Authentication appeared first on Security Boulevard.



from Virtual WiFi Authentication

NSA "Red Disk" Data Leak

ZDNet is reporting about another data leak, this one from US Army's Intelligence and Security Command (INSCOM), which is also within to the NSA.

The disk image, when unpacked and loaded, is a snapshot of a hard drive dating back to May 2013 from a Linux-based server that forms part of a cloud-based intelligence sharing system, known as Red Disk. The project, developed by INSCOM's Futures Directorate, was slated to complement the Army's so-called distributed common ground system (DCGS), a legacy platform for processing and sharing intelligence, surveillance, and reconnaissance information.

[...]

Red Disk was envisioned as a highly customizable cloud system that could meet the demands of large, complex military operations. The hope was that Red Disk could provide a consistent picture from the Pentagon to deployed soldiers in the Afghan battlefield, including satellite images and video feeds from drones trained on terrorists and enemy fighters, according to a Foreign Policy report.

[...]

Red Disk was a modular, customizable, and scalable system for sharing intelligence across the battlefield, like electronic intercepts, drone footage and satellite imagery, and classified reports, for troops to access with laptops and tablets on the battlefield. Marking files found in several directories imply the disk is "top secret," and restricted from being shared to foreign intelligence partners.

A couple of points. One, this isn't particularly sensitive. It's an intelligence distribution system under development. It's not raw intelligence. Two, this doesn't seem to be classified data. Even the article hedges, using the unofficial term of "highly sensitive." Three, it doesn't seem that Chris Vickery, the researcher that discovered the data, has published it.

Chris Vickery, director of cyber risk research at security firm UpGuard, found the data and informed the government of the breach in October. The storage server was subsequently secured, though its owner remains unknown.

This doesn't feel like a big deal to me.

Slashdot thread.



from NSA "Red Disk" Data Leak

Putting VMware’s Cloud Certification Platform to the Test with Thales’s Vormetric Data Security Manager

Certifying the full compatibility of the Thales Vormetric Data Security Manager (DSM) with the VMware platform was a critical element...

The post Putting VMware’s Cloud Certification Platform to the Test with Thales’s Vormetric Data Security Manager appeared first on Data Security Blog | Thales e-Security.

The post Putting VMware’s Cloud Certification Platform to the Test with Thales’s Vormetric Data Security Manager appeared first on Security Boulevard.



from Putting VMware’s Cloud Certification Platform to the Test with Thales’s Vormetric Data Security Manager

What Are the Questions to Ask When Looking for a Scalable Solution?

Looking for a scalable solution and not sure what to ask? The best way to start off is to get an understanding of what scalability means because it can vary depending on the problem(s) that are trying to be solved, the company, and who you are talking to. Scalability, according to Merriam-Webster: “capable of being […]… Read More

The post What Are the Questions to Ask When Looking for a Scalable Solution? appeared first on The State of Security.

The post What Are the Questions to Ask When Looking for a Scalable Solution? appeared first on Security Boulevard.



from What Are the Questions to Ask When Looking for a Scalable Solution?

Relay Attack against Keyless Vehicle Entry Systems Caught on Film

On 24 September, two men pulled up alongside a home in Elmdon in the county of West Midlands, England. One of the men walked up to the house while the other approached a Mercedes parked outside. The former waved a box in front of the victim’s house. Seconds later, the latter opened the driver’s door […]… Read More

The post Relay Attack against Keyless Vehicle Entry Systems Caught on Film appeared first on The State of Security.

The post Relay Attack against Keyless Vehicle Entry Systems Caught on Film appeared first on Security Boulevard.



from Relay Attack against Keyless Vehicle Entry Systems Caught on Film

A Recipe for Baking Security into Every Piece of Your Infrastructure as Threats Rise

As data breaches continue to escalate, the importance of a mature security program becomes more and more apparent to both system administrators and executives. Keeping up with the latest attacker TTPs (Tactics, Techniques & Procedures) can be daunting for even seasoned information security professionals as new research, tools and exploits get disclosed every day if [...]

The post A Recipe for Baking Security into Every Piece of Your Infrastructure as Threats Rise appeared first on TechSpective.

The post A Recipe for Baking Security into Every Piece of Your Infrastructure as Threats Rise appeared first on Security Boulevard.



from A Recipe for Baking Security into Every Piece of Your Infrastructure as Threats Rise

Computer Forensics: Overview of Malware Forensics

Introduction Investigating the competence of malicious software enables the IT team to enhance the assessment of a security incident, and may help prevent more infections. A considerable quantity of...

Go on to the site to read the full article

The post Computer Forensics: Overview of Malware Forensics appeared first on Security Boulevard.



from Computer Forensics: Overview of Malware Forensics

Computer Forensics Body of Knowledge: Application Forensics

Introduction This article provides a quick comprehensive survey of digital forensics and covers its various aspects from the technical side, varied analysis approaches, and common tools. It can be...

Go on to the site to read the full article

The post Computer Forensics Body of Knowledge: Application Forensics appeared first on Security Boulevard.



from Computer Forensics Body of Knowledge: Application Forensics

Comparison of Popular Computer Forensics Tools

Introduction This article will be highlighting the pros and cons for forensic tools. The tools that are covered in the article are Encase, FTK, XWays, and Oxygen forensic Suite. This article has...

Go on to the site to read the full article

The post Comparison of Popular Computer Forensics Tools appeared first on Security Boulevard.



from Comparison of Popular Computer Forensics Tools

Sentiment Analysis of “A Christmas Carol”

Our family has been reading, listening to and watching “A Christmas Carol” for just abt 30 years now. I got it into my crazy noggin to perform a sentiment analysis on it the other day and tweeted out the results, but a large chunk of the R community is not on Twitter and it would... Continue reading

The post Sentiment Analysis of “A Christmas Carol” appeared first on Security Boulevard.



from Sentiment Analysis of “A Christmas Carol”

RADIUS Authentication with Google Identity-as-a-Service

Organizations the world over are shifting away from on-prem infrastructure in favor of the cloud. Many of those organizations are leveraging G Suite as their productivity platform, and some go...

The post RADIUS Authentication with Google Identity-as-a-Service appeared first on JumpCloud.

The post RADIUS Authentication with Google Identity-as-a-Service appeared first on Security Boulevard.



from RADIUS Authentication with Google Identity-as-a-Service

XKCD, Interstellar Asteroid

interstellar_asteroid.png

Via the stellarly comic mind of Randall Munroe at XKCD.

Permalink

The post XKCD, Interstellar Asteroid appeared first on Security Boulevard.



from XKCD, Interstellar Asteroid

Wednesday, November 29, 2017

Is My Workplace Violence Program Ready for the Next Generation of Challenges?

Q. We are revisiting our workplace violence prevention program and looking at it from a much broader perspective than when we initiated it many years ago. We want to ensure that we are not only incorporating the latest strategies in...

The post Is My Workplace Violence Program Ready for the Next Generation of Challenges? appeared first on Security Boulevard.



from Is My Workplace Violence Program Ready for the Next Generation of Challenges?

DerbyCon 2017, Casey Rosini’s ‘Memory Based Library Loading – Someone Did That Already’

Permalink

The post DerbyCon 2017, Casey Rosini’s ‘Memory Based Library Loading – Someone Did That Already’ appeared first on Security Boulevard.



from DerbyCon 2017, Casey Rosini’s ‘Memory Based Library Loading – Someone Did That Already’

10 Crucial End User Security Tips

Introduction: With the beginning of the 21st century, the importance of information and technology started growing, and in today’s world, virtually no individual can stay away from the virtual...

Go on to the site to read the full article

The post 10 Crucial End User Security Tips appeared first on Security Boulevard.



from 10 Crucial End User Security Tips

Fraud Landscape Shifts as EMV Adoption Becomes More Widespread

It’s been just over two years since the liability shift around EMV pushed retailers and financial institutions towards adopting chip-enabled cards and terminals, and the fraud landscape for cybercriminals has shifted along with that adoption. In June, Visa reported that it had issued nearly 450 million chip cards and that 50% of U.S. storefronts now accept… Read More

The post Fraud Landscape Shifts as EMV Adoption Becomes More Widespread appeared first on Security Boulevard.



from Fraud Landscape Shifts as EMV Adoption Becomes More Widespread

Bad Rabbit Arrives in Time for the Holidays

It might not be seasonally appropriate — aren’t bunnies the mascots of spring? — but a new malware named Bad Rabbit has exploded across Russia and Eastern European countries. Following in the footsteps of WannaCry and NotPetya, Bad Rabbit is a particularly nasty ransomware which encrypts a user’s files and threatens to keep them hidden [...]

The post Bad Rabbit Arrives in Time for the Holidays appeared first on TechSpective.

The post Bad Rabbit Arrives in Time for the Holidays appeared first on Security Boulevard.



from Bad Rabbit Arrives in Time for the Holidays

Persistent drive-by cryptomining coming to a browser near you

If you think closing your browser window to leave a site that runs a cryptominer will stop the mining process, think again. Persistent drive-by cryptomining has arrived.

Categories:

Tags:

(Read more...)

The post Persistent drive-by cryptomining coming to a browser near you appeared first on Malwarebytes Labs.

The post Persistent drive-by cryptomining coming to a browser near you appeared first on Security Boulevard.



from Persistent drive-by cryptomining coming to a browser near you

Apple closes that big root hole – “Install this update as soon as possible”

That Apple root hole we wrote about just yesterday? Apple has pushed out a patch already - get it while it's hot!

The post Apple closes that big root hole – “Install this update as soon as possible” appeared first on Security Boulevard.



from Apple closes that big root hole – “Install this update as soon as possible”

Prediction: Automatic Updates are the Future

2017 has been a wild ride in the security world. This year we saw several high-profile breaches and cyber-attacks, the most notable being the Equifax breach and the WannaCry malware campaign. While the outcome of these events is unfortunate, they provide us with valuable lessons to learn about enhancing our security. What did WannaCry and […]

The post Prediction: Automatic Updates are the Future appeared first on WhiteHat Security.

The post Prediction: Automatic Updates are the Future appeared first on Security Boulevard.



from Prediction: Automatic Updates are the Future

Cyber Criminals Are Turning to a New Source of Valuable, Loosely Protected Data, and You Won’t Believe What Industry It’s In

It's time for today's cybersecurity awareness test: What industry has accounted for 2 percent of all data breaches during 2017, more than healthcare, social media or retail? Finance would be a good guess, but it would be skewed by the scale of the Equifax breach. Government would make sense, too, given that the IRS was breached earlier this year and the SEC in September revealed a substantial breach that occurred last year. But as surprising as it is, the answer is education. Ryan Cloutier, an edtech security specialist, offered this surprising reality check about education breaches during an…

The post Cyber Criminals Are Turning to a New Source of Valuable, Loosely Protected Data, and You Won’t Believe What Industry It’s In appeared first on Security Boulevard.



from Cyber Criminals Are Turning to a New Source of Valuable, Loosely Protected Data, and You Won’t Believe What Industry It’s In

Virtual Authentication

Authentication services are a core part of any IT environment. Enabling end users to access the IT resources they need in a secure manner is one of the bedrock responsibilities...

The post Virtual Authentication appeared first on JumpCloud.

The post Virtual Authentication appeared first on Security Boulevard.



from Virtual Authentication

Warrant Protections against Police Searches of Our Data

The cell phones we carry with us constantly are the most perfect surveillance device ever invented, and our laws haven't caught up to that reality. That might change soon.

This week, the Supreme Court will hear a case with profound implications on your security and privacy in the coming years. The Fourth Amendment's prohibition of unlawful search and seizure is a vital right that protects us all from police overreach, and the way the courts interpret it is increasingly nonsensical in our computerized and networked world. The Supreme Court can either update current law to reflect the world, or it can further solidify an unnecessary and dangerous police power.

The case centers on cell phone location data and whether the police need a warrant to get it, or if they can use a simple subpoena, which is easier to obtain. Current Fourth Amendment doctrine holds that you lose all privacy protections over any data you willingly share with a third party. Your cellular provider, under this interpretation, is a third party with whom you've willingly shared your movements, 24 hours a day, going back months -- even though you don't really have any choice about whether to share with them. So police can request records of where you've been from cell carriers without any judicial oversight. The case before the court, Carpenter v. United States, could change that.

Traditionally, information that was most precious to us was physically close to us. It was on our bodies, in our homes and offices, in our cars. Because of that, the courts gave that information extra protections. Information that we stored far away from us, or gave to other people, afforded fewer protections. Police searches have been governed by the "third-party doctrine," which explicitly says that information we share with others is not considered private.

The Internet has turned that thinking upside-down. Our cell phones know who we talk to and, if we're talking via text or e-mail, what we say. They track our location constantly, so they know where we live and work. Because they're the first and last thing we check every day, they know when we go to sleep and when we wake up. Because everyone has one, they know whom we sleep with. And because of how those phones work, all that information is naturally shared with third parties.

More generally, all our data is literally stored on computers belonging to other people. It's our e-mail, text messages, photos, Google docs, and more ­ all in the cloud. We store it there not because it's unimportant, but precisely because it is important. And as the Internet of Things computerizes the rest our lives, even more data will be collected by other people: data from our health trackers and medical devices, data from our home sensors and appliances, data from Internet-connected "listeners" like Alexa, Siri, and your voice-activated television.

All this data will be collected and saved by third parties, sometimes for years. The result is a detailed dossier of your activities more complete than any private investigator --­ or police officer --­ could possibly collect by following you around.

The issue here is not whether the police should be allowed to use that data to help solve crimes. Of course they should. The issue is whether that information should be protected by the warrant process that requires the police to have probable cause to investigate you and get approval by a court.

Warrants are a security mechanism. They prevent the police from abusing their authority to investigate someone they have no reason to suspect of a crime. They prevent the police from going on "fishing expeditions." They protect our rights and liberties, even as we willingly give up our privacy to the legitimate needs of law enforcement.

The third-party doctrine never made a lot of sense. Just because I share an intimate secret with my spouse, friend, or doctor doesn't mean that I no longer consider it private. It makes even less sense in today's hyper-connected world. It's long past time the Supreme Court recognized that a months'-long history of my movements is private, and my e-mails and other personal data deserve the same protections, whether they're on my laptop or on Google's servers.

This essay previously appeared in the Washington Post.

Details on the case. Two opinion pieces.

I signed on to two amicus briefs on the case.



from Warrant Protections against Police Searches of Our Data

PCI DSS compliance: a range of encryption approaches available to secure your data

In the month of October, I wrote about reducing scope for PCI DSS. In this blog, I take it a...

The post PCI DSS compliance: a range of encryption approaches available to secure your data appeared first on Data Security Blog | Thales e-Security.

The post PCI DSS compliance: a range of encryption approaches available to secure your data appeared first on Security Boulevard.



from PCI DSS compliance: a range of encryption approaches available to secure your data

Data Loss Prevention Needs a Little Help from Its Friends

I recently read an article on Security Boulevard discussing how to get the most out of data loss prevention (DLP) technology. While much of the byline I agree with, especially the three questions all organizations should be asking to understand their data (What’s sensitive to us? Where does sensitive information reside? Who requires access to..

The post Data Loss Prevention Needs a Little Help from Its Friends appeared first on Security Boulevard.



from Data Loss Prevention Needs a Little Help from Its Friends

Tripwire Patch Priority Index for November 2017

BULLETIN CVE Microsoft Browser – IE and Edge CVE-2017-11848, CVE-2017-11856, CVE-2017-11855, CVE-2017-11827, CVE-2017-11833, CVE-2017-11803, CVE-2017-11844, CVE-2017-11845, CVE-2017-11874, CVE-2017-11872, CVE-2017-11863 Microsoft Browser – Scripting engine CVE-2017-11834, CVE-2017-11791, CVE-2017-11839, CVE-2017-11871, CVE-2017-11870, CVE-2017-11873, CVE-2017-11838, CVE-2017-11858, CVE-2017-11836, CVE-2017-11837, CVE-2017-11866, CVE-2017-11869, CVE-2017-11840, CVE-2017-11841, CVE-2017-11843, CVE-2017-11846, CVE-2017-11861, CVE-2017-11862 APSB17-33: Adobe Flash Player CVE-2017-3112, CVE-2017-3114, CVE-2017-11213, CVE-2017-11215, CVE-2017-11225 Browsers – Chrome CVE-2017-15398, […]… Read More

The post Tripwire Patch Priority Index for November 2017 appeared first on The State of Security.

The post Tripwire Patch Priority Index for November 2017 appeared first on Security Boulevard.



from Tripwire Patch Priority Index for November 2017

Apple Macs have gaping root hole – here’s a superquick way to check and fix it

You can't login as "root" on a Mac because it never asks you to set the password, so you don't know what it is. Except that it's [blank].

The post Apple Macs have gaping root hole – here’s a superquick way to check and fix it appeared first on Security Boulevard.



from Apple Macs have gaping root hole – here’s a superquick way to check and fix it

From my Gartner Blog – Machine Learning or AI?

We may sound pedantic when pointing we should be talking about Machine Learning, and not AI, for security threat detection use cases. But there is a strong reason why: to deflate the hype around it. Let me quickly mention a real world situation where the indiscriminate use of those terms caused confusion and frustration:

One of our clients was complaining about the “real Machine Learning”  capabilities of a UEBA solution. According to them, “it was just rule based”. What do you mean by rule based? Well, for them, having to tell the tool that it needs to detect behavior deviations on the authentication events for each individual user, based on the location (source IP) and on the time of the event, is not really ML, but a rule based detection. I would say it’s both.

Yes, it is really a rule, as you have to define what type of anomaly (to the data field – or ‘feature’  – level) it should be looking for. So, you need to know enough about the malicious activity you are looking for, so you can specify the type of behavior anomaly it will present.

But on this “rule”, how do you define what “an anomaly”  is? That’s where the Machine Learning goes. The tools will have to automatically profile each individual user authentication behavior, focusing on those data fields specified from the authentication events. You just can’t do it with, let’s say, a “standard SIEM rule”. There is real Machine Learning being used there.

But what about AI – Artificial Intelligence? ML is a small subset of a field of knowledge known as AI. But the problem is that AI has much more than just ML. And that’s what that client was expecting when they complained about the “rules”. We still need people to figure out those rules and write the ML models to implement them. There’s no machine capable of doing that – yet.

There have been some attempts based on “deep learning”  (another piece of the AI domain), but nothing concrete exists. You can always point ML systems to all data collected from your environment so it can point to anomalies, but you’ll soon find out there are far more anomalies that are not related to security incidents than you are lead to believe by some pixie dust vendors. Broad network based anomaly detection has been around for years, but it hasn’t been able to deliver efficient threat detection without a lot of human work to figure out which anomalies are worth investigating.

Some UEBA vendors have decent ML capabilities, but they are not good on defining good rules/models/use cases to apply it. So, you may end up with good ML technology, but with mediocre threat detection capabilities, if you don’t have good people writing the detection content. For those going through the “build you own” path, this is even more challenging, as you need the magical combination of people who understand threats and what type of anomalies they would create and people who understand ML to write the content to find them.

Isn’t that just like SIEM? Indeed, it is. People bought SIEM in the past expecting to avoid the IDS signature development problem. Now they are repeating the same mistake buying UEBA to avoid the SIEM rules development problem. Do you think it’s going to work this time?

 

 

 

The post Machine Learning or AI? appeared first on Augusto Barros.

from Augusto Barros http://ift.tt/2BlLxpn
via IFTTT

The post From my Gartner Blog – Machine Learning or AI? appeared first on Security Boulevard.



from From my Gartner Blog – Machine Learning or AI?

Dilbert – Employee Locator Device

Dilbert - Smartphone.png

The post Dilbert – Employee Locator Device appeared first on Security Boulevard.



from Dilbert – Employee Locator Device

Whiteboard Video: Managing Systems

If you are looking to gain deeper insight into how JumpCloud is managing systems, then you’ve come to the right place. In this video, JumpCloud’s Chief Product Officer Greg Keller...

The post Whiteboard Video: Managing Systems appeared first on JumpCloud.

The post Whiteboard Video: Managing Systems appeared first on Security Boulevard.



from Whiteboard Video: Managing Systems

Security+: Physical Security and Environmental Controls

In addition to IT security, physical security and environmental controls are also essential for the revival and survival of an organization. Physical security and environmental controls fall under...

Go on to the site to read the full article

The post Security+: Physical Security and Environmental Controls appeared first on Security Boulevard.



from Security+: Physical Security and Environmental Controls

Millions of Health Records At Risk Due to Vulnerable OpenEMR Configurations

Researchers from security firm Risk Based Security have found that many installations of OpenEMR, a popular open-source electronic health records management application, contain the original setup script. This gaffe exposes the system to a complete compromise. OpenEMR is used in thousands of physician offices and small healthcare facilities in the United States and around the..

The post Millions of Health Records At Risk Due to Vulnerable OpenEMR Configurations appeared first on Security Boulevard.



from Millions of Health Records At Risk Due to Vulnerable OpenEMR Configurations

Security+: Security Training and Awareness

Introduction Workers must be aware of security to carry out their day-to-day tasks. Security training is essential and should be a part of a company’s security policies. Security training and...

Go on to the site to read the full article

The post Security+: Security Training and Awareness appeared first on Security Boulevard.



from Security+: Security Training and Awareness

Tuesday, November 28, 2017

DerbyCon 2017, Ryan Elkins’s ‘Architecture at Scale: Save Time – Reduce Spend – Increase Security’

Permalink

The post DerbyCon 2017, Ryan Elkins’s ‘Architecture at Scale: Save Time – Reduce Spend – Increase Security’ appeared first on Security Boulevard.



from DerbyCon 2017, Ryan Elkins’s ‘Architecture at Scale: Save Time – Reduce Spend – Increase Security’

Part 2: 5 reasons to add security to your MSP offerings

In today’s business climate, SMBs (small and medium-sized businesses) are relying more heavily than ever on their managed services providers (MSPs). Keeping the company’s network running in tiptop shape is still the prime directive, but the methods to maintain it have evolved. Cybersecurity services have become a necessary part of the equation. Some MSPs have already adapted to this growing trend and discovered that delivering managed security services has enhanced their own business just as much as their client’s.

The post Part 2: 5 reasons to add security to your MSP offerings appeared first on Security Boulevard.



from Part 2: 5 reasons to add security to your MSP offerings

Please don’t buy this: identity theft protection services

Identity theft protection services promise to have your back against cybercriminals looking to steal your data. But they don't actually stop them from taking your identity. Are they worth it, then? We say no.

Categories:

Tags:

(Read more...)

The post Please don’t buy this: identity theft protection services appeared first on Malwarebytes Labs.

The post Please don’t buy this: identity theft protection services appeared first on Security Boulevard.



from Please don’t buy this: identity theft protection services

Cybersecurity Strategies that Won’t Break the Bank

Throughout my career, I have seen first-hand the real world impacts that a breach in cyber security can have on customers, businesses and communities. With cyberattacks growing in number and sophistication, today security is a requirement of "doing business", however, many companies and organizations lack the knowledge and resources to secure their platforms, products and solutions. For example, Symantec's 2017 Internet Security Threat Report (ISTR) reported the number of identities exposed in 2016 was 1.1 billion and 76% of websites scanned contained malware. Additionally, 1 in 95 emails to…

The post Cybersecurity Strategies that Won’t Break the Bank appeared first on Security Boulevard.



from Cybersecurity Strategies that Won’t Break the Bank

North Korean Dingus of Mass Disruption

NORK Cyber.jpg

Erudite write-up by Adam Meyers (opining at 38North) in which, Adam details the cyberweapons of mass destruction (in this case the primary weapons discussed are WannaCry, the Wiper Attack and who-can-forget the electronic Bonnie-and-Clyde aka the 2016 SWIFT attack on the Bank of Bangladesh). Enjoy!

"North Korean offensive cyber operations have been conducted to collect sensitive political and military intelligence information, to lash out at enemies who threaten their beliefs and interests, and most interestingly, to generate revenue." - Adam Meyers writing at 38North)

Permalink

The post North Korean Dingus of Mass Disruption appeared first on Security Boulevard.



from North Korean Dingus of Mass Disruption

GDPR (General Data Protection Regulation) & JumpCloud

There has been a lot of talk about an upcoming change to European data protection law, and you might find yourself asking, what is the General Data Protection Regulation? The...

The post GDPR (General Data Protection Regulation) & JumpCloud appeared first on JumpCloud.

The post GDPR (General Data Protection Regulation) & JumpCloud appeared first on Security Boulevard.



from GDPR (General Data Protection Regulation) & JumpCloud

Load Balancers and Microservices

Many organizations, such as Netflix and Amazon, are using microservice architecture to implement business applications as a collection of loosely coupled services. Some of the reasons to move to this distributed, loosely coupled architecture is to enable hyperscale, and continuous delivery for complex applications, among other things. Teams in these organizations have adopted Agile and […]

The post Load Balancers and Microservices appeared first on Radware Blog.

The post Load Balancers and Microservices appeared first on Security Boulevard.



from Load Balancers and Microservices

Most Fancy Bear hacking targets weren’t warned by FBI

In some cases, that includes not being contacted by the FBI even after their emails had been stolen and published online.

The post Most Fancy Bear hacking targets weren’t warned by FBI appeared first on Security Boulevard.



from Most Fancy Bear hacking targets weren’t warned by FBI

Corporate Boards are Getting More Involved in Cyber Security

board-meeting.png

We’re hearing more and more about boards of directors playing a greater role in cyber security efforts as a growing number of data breaches make headlines, and now there’s data to back it up. Unfortunately the same research indicates that enterprises need to do much more work to improve their cyber security programs.

The post Corporate Boards are Getting More Involved in Cyber Security appeared first on Security Boulevard.



from Corporate Boards are Getting More Involved in Cyber Security

Analyzing a simple screen locker

A screen locker is a malware in which the primary purpose is to lock the victim’s screen by displaying a fearful message designed to invoke a high level of fear in the end user. In a way, this...

Go on to the site to read the full article

The post Analyzing a simple screen locker appeared first on Security Boulevard.



from Analyzing a simple screen locker

Man-in-the-Middle Attack against Electronic Car-Door Openers

This is an interesting tactic, and there's a video of it being used:

The theft took just one minute and the Mercedes car, stolen from the Elmdon area of Solihull on 24 September, has not been recovered.

In the footage, one of the men can be seen waving a box in front of the victim's house.

The device receives a signal from the key inside and transmits it to the second box next to the car.

The car's systems are then tricked into thinking the key is present and it unlocks, before the ignition can be started.



from Man-in-the-Middle Attack against Electronic Car-Door Openers

China Continues its Xenophobic Counterintelligence Campaigns

Some may say that China has always had an underlying current of xenophobia. Arrests and prosecutions of foreign nationals in China on unexplained or unidentified espionage charges continue. These actions continue to feed this narrative, as do the government’s efforts to enlist the eyes and ears of the populace to thwart foreign intelligence operations which..

The post China Continues its Xenophobic Counterintelligence Campaigns appeared first on Security Boulevard.



from China Continues its Xenophobic Counterintelligence Campaigns

Understanding Policies, Control Objectives, Standards, Guidelines & Procedures

As we introduced in part 1 of this “word crimes” series, cybersecurity terminology is important. Cybersecurity, IT professionals and legal professionals routinely abuse the terms “policy” and “standard” as if these words were synonymous. In reality, these terms have quite different implications, and those differences should be kept in mind since the use of improper […]… Read More

The post Understanding Policies, Control Objectives, Standards, Guidelines & Procedures appeared first on The State of Security.

The post Understanding Policies, Control Objectives, Standards, Guidelines & Procedures appeared first on Security Boulevard.



from Understanding Policies, Control Objectives, Standards, Guidelines & Procedures

Women in Information Security: Claudia Johnson

Last time, I had fun speaking with Beth Cornils. She has a pretty cool job that involves testing IoT cars. This time, I spoke with Claudia Johnson. A cyber attack got her into the industry, and now she helps answer people’s questions about cybersecurity. Kim Crawley: Please tell me about what you do. Claudia Johnson: […]… Read More

The post Women in Information Security: Claudia Johnson appeared first on The State of Security.

The post Women in Information Security: Claudia Johnson appeared first on Security Boulevard.



from Women in Information Security: Claudia Johnson

Yes, Macs are susceptible to ransomware, too

By now we’ve demystified the myth that Macs are impervious to harm. The cybercrime world has caught up to the technology, and no computer — PC nor Mac — is safe. We have recently discussed some growing Mac concerns, like the rise in adware attacks and a full system slowdown caused by too much clutter, but now we need to talk about something even more malicious: Ransomware.

The post Yes, Macs are susceptible to ransomware, too appeared first on Security Boulevard.



from Yes, Macs are susceptible to ransomware, too

Security+: Selecting Appropriate Security Controls

Introduction Appropriate use of security controls can provide a number of behind-the-scenes security measures: deterrents, prevention, detection, and so on. The three primary goals of security,...

Go on to the site to read the full article

The post Security+: Selecting Appropriate Security Controls appeared first on Security Boulevard.



from Security+: Selecting Appropriate Security Controls

Security+: Mobile Security Concepts and Technology

Introduction Unfortunately, tablets and smartphones (and several other mobile devices) can be vulnerable to a variety of cyberattacks. An attacker can compromise the mobile device through either the...

Go on to the site to read the full article

The post Security+: Mobile Security Concepts and Technology appeared first on Security Boulevard.



from Security+: Mobile Security Concepts and Technology

Now That’s Cryptographic Computing Power

It was recently discovered that more than one business were surreptitiously using computing power of visitors to their web sites to mine bitcoins. Maybe they did this as an alternative way of paying for their costs instead of using advertising. Maybe they did this for other reasons. But this should not be too surprising. The […]

The post Now That’s Cryptographic Computing Power appeared first on Voltage.

The post Now That’s Cryptographic Computing Power appeared first on Security Boulevard.



from Now That’s Cryptographic Computing Power

XKCD, NEXUS

nexus.png

Permalink

The post XKCD, NEXUS appeared first on Security Boulevard.



from XKCD, NEXUS

Securely Managing Identities Across Mac and G Suite

Macs. Users embrace them. Traditional IT admins do everything they can to avoid allowing them to be part of their environment. But resistance from IT hasn’t prevented Macs gaining a...

The post Securely Managing Identities Across Mac and G Suite appeared first on JumpCloud.

The post Securely Managing Identities Across Mac and G Suite appeared first on Security Boulevard.



from Securely Managing Identities Across Mac and G Suite

Public Remote Code Execution Exploit Affects Thousands of Email Servers

Developers of the widely used Exim message transfer agent are advising administrators to disable a feature on their email servers to protect them from a critical remote execution exploit that has been publicly disclosed. Developed at the University of Cambridge, Exim is the default email server daemon in some Linux distributions and is also commonly..

The post Public Remote Code Execution Exploit Affects Thousands of Email Servers appeared first on Security Boulevard.



from Public Remote Code Execution Exploit Affects Thousands of Email Servers

Monday, November 27, 2017

Uber Data Hack

Uber was hacked, losing data on 57 million driver and rider accounts. The company kept it quiet for over a year. The details are particularly damning:

The two hackers stole data about the company's riders and drivers ­-- including phone numbers, email addresses and names -- from a third-party server and then approached Uber and demanded $100,000 to delete their copy of the data, the employees said.

Uber acquiesced to the demands, and then went further. The company tracked down the hackers and pushed them to sign nondisclosure agreements, according to the people familiar with the matter. To further conceal the damage, Uber executives also made it appear as if the payout had been part of a "bug bounty" -- a common practice among technology companies in which they pay hackers to attack their software to test for soft spots.

And almost certainly illegal:

While it is not illegal to pay money to hackers, Uber may have violated several laws in its interaction with them.

By demanding that the hackers destroy the stolen data, Uber may have violated a Federal Trade Commission rule on breach disclosure that prohibits companies from destroying any forensic evidence in the course of their investigation.

The company may have also violated state breach disclosure laws by not disclosing the theft of Uber drivers' stolen data. If the data stolen was not encrypted, Uber would have been required by California state law to disclose that driver's license data from its drivers had been stolen in the course of the hacking.

Uber was hacked, losing data on 57 million driver and rider accounts. They kept it quiet for over a year. The details are particularly damning:

The two hackers stole data about the company's riders and drivers ­- including phone numbers, email addresses and names -­ from a third-party server and then approached Uber and demanded $100,000 to delete their copy of the data, the employees said.

Uber acquiesced to the demands, and then went further. The company tracked down the hackers and pushed them to sign nondisclosure agreements, according to the people familiar with the matter. To further conceal the damage, Uber executives also made it appear as if the payout had been part of a "bug bounty" ­- a common practice among technology companies in which they pay hackers to attack their software to test for soft spots.

And almost certainly illegal:

While it is not illegal to pay money to hackers, Uber may have violated several laws in its interaction with them.

By demanding that the hackers destroy the stolen data, Uber may have violated a Federal Trade Commission rule on breach disclosure that prohibits companies from destroying any forensic evidence in the course of their investigation.

The company may have also violated state breach disclosure laws by not disclosing the theft of Uber drivers' stolen data. If the data stolen was not encrypted, Uber would have been required by California state law to disclose that driver's license data from its drivers had been stolen in the course of the hacking.



from Uber Data Hack

The end of net neutrality draws near

Will it mean a newly vibrant and competitive internet or an internet for the rich?

The post The end of net neutrality draws near appeared first on Security Boulevard.



from The end of net neutrality draws near

DerbyCon 2017, Tyler Hudak’s ‘To Catch a Spy’

Permalink

The post DerbyCon 2017, Tyler Hudak’s ‘To Catch a Spy’ appeared first on Security Boulevard.



from DerbyCon 2017, Tyler Hudak’s ‘To Catch a Spy’

5 Ways to Boost Engagement in Your Security Awareness Program

Gamification is everywhere, and with good reason. It’s proven to increase training engagement, something many businesses struggle to capture. A report from Gartner found 70% of business...

Go on to the site to read the full article

The post 5 Ways to Boost Engagement in Your Security Awareness Program appeared first on Security Boulevard.



from 5 Ways to Boost Engagement in Your Security Awareness Program

GDPR Takes Effect May 2018: Is Your Organization Ready?

According to a new report from Forrester, 80% of companies will not comply with GDPR by May 2018. It also found 50% of these firms “will intentionally not comply — meaning they have weighed the cost...

Go on to the site to read the full article

The post GDPR Takes Effect May 2018: Is Your Organization Ready? appeared first on Security Boulevard.



from GDPR Takes Effect May 2018: Is Your Organization Ready?

How one man could have deleted any image on Facebook

Pouya Darabi found how to embed other people's images in a Facebook poll so that deleting *his* poll also deleted *their* files.

The post How one man could have deleted any image on Facebook appeared first on Security Boulevard.



from How one man could have deleted any image on Facebook

Mobile Menace Monday: Chrome declares war on unwanted redirects

Google initiates their plans to implement new changes in Chrome to defend against annoying web redirects.

Categories:

Tags:

(Read more...)

The post Mobile Menace Monday: Chrome declares war on unwanted redirects appeared first on Malwarebytes Labs.

The post Mobile Menace Monday: Chrome declares war on unwanted redirects appeared first on Security Boulevard.



from Mobile Menace Monday: Chrome declares war on unwanted redirects

The Future of SecOps: Regaining Balance

Posted under: Research and Analysis

The first post in this series, Behind the 8 Ball brought up a number of key issues regarding the challenge of practicing security in the current environment. These include the continual advancement and innovation on the part of attackers to find new ways to compromise devices and exfiltrate data, the increasing complexity of the technology infrastructure and frequency of changes to said infrastructure, as well as the systemic skills shortage limiting the resources you have to handle all of the issues that the former issues create. So basically, practitioners are behind the 8 ball in getting their job done and protecting corporate data.

As we discussed in that earlier post, thinking differently about security involves you to change things up and take a (dare we say it) more enlightened approach, basically focusing the right resources on the right functions. We know, it seems obvious that having expensive staffers focusing on rote and tedious functions is probably not the best way to deploy your resources. But most organizations do it anyway. Maybe it makes some sense to have our valuable, constrained and (in most cases) highly skilled humans doing what humans are good at, which is:

  • identifying triggers that potentially indicate malicious activity;
  • drilling into the activity to understand the depth of the attack and assess potential damage; and
  • figuring out work arounds to address the attack.

Most humans know what to look for, but aren’t very good at looking at huge amounts of data and finding those patterns. Many don’t like doing the same things over and over again since they get bored. They don’t like to work graveyard shifts and they want to be doing things that teach them new things and stretch their capabilities. Basically they want to work in an environment where they do cool stuff and can grow their skills. And they (especially in security) can choose where they work. If they don’t get the right opportunity with your organization, they will find one that better suits their capabilities and work style.

On the other hand, machines don’t really have issues working at all times and don’t complain about having to do the same tasks over and over again, at least not yet. They don’t have the ability to find another place to work, nor do they agitate for broader job responsibilities or better refreshments in the break room. We’re being a bit facetious here, and certainly aren’t advocating replacing your security team with the robots. Rather, in an asymmetric environment where you can’t keep up with the amount of stuff to do, the robots may be your only chance to regain balance and keep pace.

So if you are open to this line of thinking, let’s expand a bit on two of the concepts we brought up in the Intro to Threat Operations paper, since we believe our vision of threat operations over time becomes a subset of SecOps.

  • Enriching Alerts: The idea is to take an alert and add a bunch of the common information you know that an analyst is going to want to see in the alert prior to sending it to the analyst. Thus, the analyst doesn’t need to spend time gathering information from a number of systems and information sources, and can get right to work validating the alert and determining the potential impact.
  • Incident Response: Once an alert has been validated, there are a standard set of activities that tend to be involved in the response. A portion of these activities can automated via integration with the affected systems (networks, endpoint management, SaaS, etc.) and that time saved allows the responders to focus more on the higher level impact of determining proliferation and assessing potential data loss.

Enriching Alerts

Let’s dig into examples of how enriching alerts coming from your security monitoring systems would look and detail how this can be done without human intervention. We start by looking at a couple of different alerts, and making some educated guesses as to what would be useful for an analyst.

  • Alert: Connection to a known bad IP: Let’s say an alert fires for connectivity to a known bad IP address (thanks threat intel!). With the source and destination addresses the analyst would typically start gathering some basic information.
    1. Identity: Who uses the device? With the source IP, it’s pretty straight forward to see who the IP address is allocated to, and then what devices that person tends to use.

    1. Target: Using the destination IP, external site comes more into focus. The analyst would probably do a geo-location search to figure out where the IP is and also probably ping WHOIS to figure out who owns the IP. They could also figure out the hosting provider and also do a search within their threat intel service to see if that IP belongs to a known bot net and the tactics that specific adversary tends to use.
    2. Network traffic: The analyst may also check out the network traffic coming from the device to see if there were strange patterns (possibly C&C or recon) or uncharacteristically large volumes sent to/from that device over the past few days.
    3. Device hygiene: The analyst would also need to know the specifics about the device. Such as when was the device last patched? Does the device have a non-standard configuration?
    4. Recent changes: The analyst also would probably be interested in the software running on the device and if any programs or changed configurations have been installed within the past few days.
  • Alert: Strange registry activity: In this scenario, an alert is triggered because the device has had the registry changed unrelated to patches or authorized software installs. The analyst could use similar information as in the first example, but device hygiene and recent changes to the device would be of particular interest. The general flow of network traffic would also be of interest, given that the device may have been accepting connections from external devices issuing instructions and making those configuration changes. Standing alone, registry changes may not be a concern, but when those connections are within close proximity of a larger inbound data transfer, there may be something there. Additionally, checking out the web traffic logs from that device could also provide some clues as to what they were doing that could have resulted in some kind of compromised device.

  • Alert: Large USB file transfer: We could also look at an insider threat scenario to show the impact of enrichment. Maybe the insider uses their USB port for the first time and transfers 1GB of data within a 3 hour period. That would generate an alert from the DLP system. At that point, it would be good to know what internal data sources the device has been communicating with, and if there have been anomalous data volumes over the past few days, which could indicate information mining in preparation to take it. It would also be helpful to look at the inbound connections and recent changes on the device, since perhaps the device had been compromised by an external actor using a remote Trojan to misbehave on the device.

In these scenarios, and another 1000 that we could concoct, all of the information the analyst would probably like to have is readily available within existing systems and security data/intel sources. Whatever tool that analyst uses to manage the triage can be pre-populated with this information.

The ability to enrich the alert doesn’t end there. If there are files involved in the connection, the system could automatically poll an external file reputation service to see whether the file is known to be malicious. The file sample could be set to a sandbox that generates a report of what the file actually does, and if that file tends to be part of a known attack pattern. Additionally, if the file does turn out to be part of a malware kit, the system could then search for other files known to be related to the first file on the device, as well as possibly in other devices within the organization.

All of this can be done before the analyst ever starts processing the alert. Obviously these are pretty simplistic examples, but should illuminate the possibilities of automated enrichment to give the analyst a large portion of what they need to figure out if the alert is legit and if so, how significant the risk.

Incident Response

Once the analyst validates the alert and does an initial damage assessment, the incident would be sent along to the response team to deal with it. At this point, there are a number of activities that can be done without the responder’s direct involvement that can serve to accelerate the response. If we look at potential response activities associated with the alerts above, you can see how orchestration and automation can make the responder far more efficient, and reduce the risk of the attack.

  • Connection to known bad IP: Let’s say the analyst determined that the device connected to a known bad IP because it was compromised and added to a botnet. What would the responder then want to do?
    1. Isolate the device: First the device should be isolated from the network and put on a quarantine network to enable much deeper monitoring (the quarantine network can capture full packets) as well as preventing any further exfiltration of data.
    2. Forensic images: The responder will need to take an image of the device for further analysis and to maintain chain of custody.
    3. Load tools onto the imaged device: The standard set of forensic tools are then loaded up and the images connected for both disk and memory forensics.

All of these functions can happen automatically, once the alert is validated and the incident is escalated to the response team. Then the responder has the images from the compromised device, the forensic tools ready to go, and the case file with all of the enriched information about the attack and potential adversary at their fingertips when they start the response.

But the opportunities to work faster and better don’t end there. If the responder discovers a system file that has been changed on the compromised device, they can then further automate their process. They can search through the security analytics system to see of that file (or something like it) has been downloaded to any other devices, they can run the file through a sandbox to determine its behaviors and then search for those behaviors, and if they get a hit on other potentially compromised devices, they can add those to the response by isolating and imaging the devices — automatically.

These same constructs apply to pretty much any kind of alert/case that would come across a responder’s desk. The registry activity alert mentioned above would likely focus more on memory forensics, but the same general processes apply.

Ditto for the large USB file transfer indicative of an insider attack. Though in this case, it’s likely more prudent to not necessarily isolate the device because you don’t want the alert the insider they’ve been discovered. So that kind of alert would trigger a different automated run book, likely involving full packet capture of the device, analysis of their file usage over the past 60-90 days, and notifying Human Resources and Legal of the potential malicious insider.

What is the common thread running amongst all of these scenarios? The ability to accelerate SecOps by planning out the activities (in the form of run books), and then orchestrating and automating the execution of those run books to the greatest degree possible.

Benefits

These seem to be self-evident, but let’s be masters of the obvious and state them anyway. This potential future of security operations allows you to:

  • React Faster and Better: Your analysts have better information because the alerts they get have the information they would have to spend time gathering. Your responders are more on point because they already have the potentially compromised devices isolated and imaged, and a wealth of threat intel about what the attack could be, who is behind it, and what their likely next move is.
  • Operationalizing process: Your best folks just know what to do, your other folks typically have no idea so they stumble and meander through each incident, with a portion figuring it out and another portion looking for another gig. If you could have your best folks build the run books that define proper processes for the most common situations, you minimize the variance in performance and make everyone a lot more productive.
  • Improve employee retention: Employees that work in an environment where they can be successful and have the right tools to achieve their objectives tend to stay. It’s not about the money for most security folks, it’s about being able to do their job. If you have the right systems in place to keep the humans doing what humans are good at, and your competition (for staff) doesn’t, then it becomes increasingly hard for employees to leave. Some will choose to build a similar environment somewhere else, and that’s great and the way the industry improves. But many realize how hard it is and what a step backwards it would be to have to manually do a lot of what you’ve already automated.

So what are you waiting for? We never like to sell past the close, but we’ll do it anyway. Enriching alerts and incident response are really only the tip of the iceberg relative to the SecOps processes that can be accelerated and improved with a dose of orchestration and automation. So we’ll wrap up the series with the next post, which details a few more use cases that should provide overwhelming evidence of the need to embrace the future.

- Mike Rothman
(0) Comments
Subscribe to our daily email digest

The post The Future of SecOps: Regaining Balance appeared first on Security Boulevard.



from The Future of SecOps: Regaining Balance

Whiteboard Videos: AD Bridge

To help organizations better understand the architecture underpinning the JumpCloud Directory-as-a-Service® platform, our CPO Greg Keller has been creating whiteboard videos that give overviews of different aspects of the product....

The post Whiteboard Videos: AD Bridge appeared first on JumpCloud.

The post Whiteboard Videos: AD Bridge appeared first on Security Boulevard.



from Whiteboard Videos: AD Bridge

PaymentWeek on New Research Reveals Payment Card Data Security Vulnerabilities in Contact Centers

The post PaymentWeek on New Research Reveals Payment Card Data Security Vulnerabilities in Contact Centers appeared first on Semafone.

The post PaymentWeek on New Research Reveals Payment Card Data Security Vulnerabilities in Contact Centers appeared first on Security Boulevard.



from PaymentWeek on New Research Reveals Payment Card Data Security Vulnerabilities in Contact Centers

Uber Data Hack

Uber was hacked, losing data on 57 million driver and rider accounts. The company kept it quiet for over a year. The details are particularly damning: The two hackers stole data about the company's riders and drivers ­-- including phone numbers, email addresses and names -- from a third-party server and then approached Uber and demanded $100,000 to delete their...

The post Uber Data Hack appeared first on Security Boulevard.



from Uber Data Hack

Monday review – the hot 22 stories of the week

From the all-seeing eye watching you online and the Uber data breach to Androids secretly reporting your location, and more!

The post Monday review – the hot 22 stories of the week appeared first on Security Boulevard.



from Monday review – the hot 22 stories of the week

The Time Is Now for Sharing Medical Charts Online

The internet is a part of our everyday life, and it is time that certain industries come on board and integrate with our daily lives. The most important industry I see should fulfill this demand is healthcare. Everywhere access to healthcare is becoming more important every day. With people working across the globe, the need […]… Read More

The post The Time Is Now for Sharing Medical Charts Online appeared first on The State of Security.

The post The Time Is Now for Sharing Medical Charts Online appeared first on Security Boulevard.



from The Time Is Now for Sharing Medical Charts Online