The Four Cybersecurity Terms Businesses Need to Know: The Four Cybersecurity Terms Businesses Need to Know.
Technological evolution yields a constantly changing threat landscape. Those who learn survive, and those who don’t evolve and grow their knowledge, are left behind. Just a few weeks ago at Black Hat, we heard a number of different conversations on the four key areas below, cementing their role as the cybersecurity hot topics of the near future. [...]
Friday, September 9, 2016
Tuesday, September 6, 2016
Building a Security Culture
Building a Security Culture: Security professionals should understand the importance of group dynamics and use it to build an effective security culture.
Building on the connection between breaking security policies and cheating, let’s look at a study[1] that asked participants to solve 20 simple maths problems and promised 50 cents for each correct answer.[...]
Building on the connection between breaking security policies and cheating, let’s look at a study[1] that asked participants to solve 20 simple maths problems and promised 50 cents for each correct answer.[...]
How a Massive 540 Gb/sec DDoS Attack Failed to Spoil the Rio Olympics
How a Massive 540 Gb/sec DDoS Attack Failed to Spoil the Rio Olympics: Before the 2016 Games began, public-facing web properties and organizations affiliated with the Olympics suffered a DDoS that lasted for several months.
On 21 August, 2016, the International Olympic Committee (IOC) held the closing ceremony for the 2016 Summer Olympics at the MaracanĂ£ Stadium in Rio de Janeiro, Brazil.[...]
On 21 August, 2016, the International Olympic Committee (IOC) held the closing ceremony for the 2016 Summer Olympics at the MaracanĂ£ Stadium in Rio de Janeiro, Brazil.[...]
Collaboration Is Key to Information Security
Collaboration Is Key to Information Security: Collaboration and information sharing within security can help alleviate the burden of infosec professionals who face shared threats and risks.
The challenges facing security professionals certainly aren’t getting any easier – nor are they likely to do so anytime soon. Not only are the skills and knowledge that we need to operate evolving at an ever-relentless pace but also rapidly diversifying far beyond the familiar technical and governance areas we have been used to.[...]
The challenges facing security professionals certainly aren’t getting any easier – nor are they likely to do so anytime soon. Not only are the skills and knowledge that we need to operate evolving at an ever-relentless pace but also rapidly diversifying far beyond the familiar technical and governance areas we have been used to.[...]
Thursday, September 1, 2016
US CIO: Federal Funding Process Played Key Role in OPM Hac
US CIO: Federal Funding Process Played Key Role in OPM Hack
The way the U.S. federal government funds information technology served as a major contributor to last year's breach of computers at the Office of Personnel Management that exposed 21.5 million records, many of which included personally identifiable information of employees and contractors with security clearances, says Federal Chief Information Officer Tony Scott. [...]
http://www.bankinfosecurity.com/interviews/us-cio-federal-funding-process-played-key-role-in-opm-hack-i-3316#
The way the U.S. federal government funds information technology served as a major contributor to last year's breach of computers at the Office of Personnel Management that exposed 21.5 million records, many of which included personally identifiable information of employees and contractors with security clearances, says Federal Chief Information Officer Tony Scott. [...]
http://www.bankinfosecurity.com/interviews/us-cio-federal-funding-process-played-key-role-in-opm-hack-i-3316#
Preventing Data Breaches without Constraining Business
Behavior Analytics is The New Authentication
Over the last ten years, organizations around the world have spent billions on security technology designed to protect users and data from cybercrime. Technologies like Anti-spam/anti-virus, firewalls and DLP systems have been deployed to create a perimeter to try to keep the criminals out. In fact, some of the world’s largest organizations have as many as 200 different security solutions in place, and yet … major breaches are on the increase.
The majority of these breaches come from privileged account abuse – in other words, your most trusted users are the weakest link in your defense. Why? Because they have legitimate, unconstrained access to your mission-critical applications. All it takes is one Privileged User to act maliciously … or one Privileged User account to be hi-jacked by an external attacker … and you are powerless to detect and prevent a major breach.
The fact is, it doesn’t matter where the perimeter is, it will be breached. Even the latest Privileged Identity Management systems can’t stop an insider or APT attack, because all they are really doing is moving the perimeter to a different point of authentication.
To prevent a data breach, you need to stop thinking about perimeters, and ‘one-off’ authentication methods as a means of defence, and accept that the attacker is already inside your organization.
At Balabit, we consider the continuous monitoring of Privileged User behaviour as a new form of authentication. We record individual user sessions as movie-like audit trails and, over time, we build up a detailed ‘digital footprint’ of each individual. Using machine learning, we create a matrix of baseline typical behaviours …. When does the user typically log-on to which systems … what commands do they normally use? What is the screen resolution of their laptop? What are their unique typing characteristics? What do their mouse movements look like?
By monitoring Privileged User behaviour in real time, we can then quickly determine if something out of the ordinary is happening, whether it’s an insider acting differently, or an attack from the outside where we need to be sure the user is who he or she is supposed to be.
Once the Balabit solution has flagged something suspicious, an alert is sent to the Security Operations Centre, where a rapid decision can be made to act, terminating the connection if necessary.
Balabit’s Contextual Security Intelligence platform is the only fully integrated Privileged User Monitoring and Analytics solution of its kind, preventing data breaches by treating behaviour as a form of real time continuous authentication. We’re also helping organizations meet their compliance obligations by securely gathering evidence and making it possible to show a bullet-proof audit trail. Also, with our laser focus on the context of Privileged User Behaviour, we help cut through the white noise of multiple alerts and false positives, resulting in significant efficiency gains in the Security Operations Centre.
Balabit – preventing data breaches without constraining business.
syslog-ng Store Box - Turnkey solution to manage your log data
https://www.youtube.com/watch?v=zpSyxasw-3Q
The syslog-ng Store Box™ (SSB) is a high-reliability log management appliance that builds on the strengths of syslog-ng Premium Edition.
This video will introduce you to the syslog-ng Store Box, a turn-key solution to manage your log data.
The syslog-ng Store Box™ (SSB) is a high-reliability log management appliance that builds on the strengths of syslog-ng Premium Edition.
This video will introduce you to the syslog-ng Store Box, a turn-key solution to manage your log data.
Subscribe to:
Posts (Atom)
LinkedIn users targeted by hacking group
LinkedIn users targeted by hacking group with fake job offers https://t.co/mPKKLqzF5k via @SiliconANGLE
-
Python skills are incredibly useful for all kinds of information security personnel, from pen testers to cyber defenders to forensics pros...
-
The non-profit organization behind TOR – the largest online anonymity network that allows people to ...
-
Flaw Puts a Billion Wireless Mice at Risk . Wireless mice and keyboards are the perfect accessories for a world in which devices increasing...