Cybersecurity , Data Breach , Risk Management
CASBs and the Treacherous 12 Top Cloud Threats- Details
- Category: Security News
Penetration testing expert Ilia Kolochenko warns that many organizations are failing to help themselves when it comes to practicing smart web security.
Kolochenko, who's CEO of High-Tech Bridge, says his research team has been charting everything from web application exploits and HTTPS traffic encryption choices to the pervasiveness of such vulnerabilities as POODLE and Heartbleed.
"One of the biggest problems that we are facing today is that companies tend to underestimate the scope of their digital assets," he says. "This means that quite often they tend to forget about systems, about servers, about different devices they need to secure."
Indeed, based on data gathered by the company's SSL/TLS security, web server security and domain security tools, researchers noticed that many organizations are failing to avail themselves of the latest security tools and protocols. For example, 23 percent of all websites still use SSL version 3, which has been deprecated, since SSLv3 fallbacks were to blame for the likes of POODLE and BEAST. Meanwhile, 80 percent of all web servers have "incorrect, missing or insecure HTTP headers," Kolochenko says, which leaves web application users at risk of being exploited.
In this interview with Information Security Media Group conducted at the InfoSecurity Europe Conference in London (see audio player below photo), Kolochenko also details:
Why small- and medium-size enterprises are an increasing target for hackers; The challenge posed by APIs, and why they tend to be overlooked as a security risk; The risks facing organizations that fail to address common security problems, such as using outdated versions of the SSL protocol.Kolochenko is CEO of Geneva-based High-Tech Bridge, which provides vendor-independent cybersecurity consulting and penetration testing. He got his start in the information security field as an "ethical hacker" - now better known as penetration testing - and is a frequent commentator on web security, risk management and cybercrime trends for multiple news outlets.
- Details
- Category: Security News
The National Institute of Standards and Technology plans to update its 2-year-old cybersecurity framework late next year, says Matt Barrett, program manager.
In part one of a two-part interview, with Information Security Media Group, Barrett characterizes the revision as a minor update, not a major overhaul, but one that refines and clarifies provisions in the existing framework. "Just to be clear, we're not headed toward a version 2.0 right now; we're definitely not," Barrett says. "We're headed to something that's more like a 1.1."
In the interview (click player beneath image to listen), Barrett also:
Describes the type of revisions that might be incorporated in the updated framework; Addresses criticisms that NIST hasn't tested the framework to determine its value to organizations, especially small businesses; and Explains why NIST may continue to oversee the cybersecurity framework despite an initial plan that a private-sector-controlled organization take over governance.In part two of this interview, which will be available soon, Barrett discusses how the cybersecurity framework helps facilitate communication among technical and nontechnical managers and executives who must collaborate to keep their enterprises' information systems secure.
Responding to an executive order, issued by President Obama in February 2013, NIST a year later published the cybersecurity framework, based on existing standards, guidelines and practices. The tool, use of which is voluntary, is designed to help reduce cyber risks to the information systems of critical infrastructure providers.
Before returning to NIST in October 2014 as the framework's program manager, Barrett served as president of G2 Inc., a cyber and intelligence solutions firm. From January 2007 to July 2009, Barrett was NIST program manager for the security content automation protocol, commonly known as SCAP.
- Details
- Category: Security News

Yet another organization has acknowledged it opted to pay cyberattackers after its systems were infected with ransomware, the file-encrypting malware that has become one of the most dreaded menaces across the internet.
See Also: Unlocking Software Innovation with Secure Data as a Service
The University of Calgary paid CA$20,000 (US$15,700) and "is now in the process of assessing and evaluating the decryption keys," according to a statement from Linda Dalgetty, vice president for finance and services.
"The actual process of decryption is time-consuming and must be performed with care," Dalgetty writes. "A great deal of work is still required by IT to ensure all affected systems are operational again, and this process will take time."
Ransomware Explosion
Ransomware has been around for more than a decade, but attacks have exploded in the past couple of years. Consumers appeared to be more affected at first, with ransoms in the range of a few hundred dollars, usually payable in bitcoin. But attackers are diversifing their targets and demanding more expensive ransoms from large companies and organizations.
In late April, the FBI warned of potentially "catastrophic" impacts to organizations such as schools and hospitals if a ransomware infection occurred. It advised educating users about ransomware, using security software, implementing robust access controls, patching applications and ensuring data is backed up.
But it's clear that many are still being caught off guard, stuck in the unenviable position of either taking a loss of data on the chin or the ethically ambiguous path of paying attackers to obtain the decryption keys.
In February, Hollywood Presbyterian Medical Center in Los Angeles said it paid $17,000 after determining that paying the ransom was the "the quickest and most efficient way to restore our systems and administrative functions." (See: Ransomware: Healthcare Fights Back.)
After confusion over reported comments by an FBI official last year, the agency firmly says that ransoms should not be paid. Such payment "emboldens the adversary to target other organizations for profit, and provides for a lucrative environment for other criminals to become involved," according to an FBI guide on ransomware.
Active Investigation
In Calgary, the university says it started communicating about its cyberattack in late May. It restored email for faculty and staff on June 6. But it warned that obtaining the decryption keys did not mean that all systems could be restored and data recovered.
The Calgary Police Service is working with the university. "As this is an active investigation, we are not able to provide further details on the nature of the attack, specific actions taken to address it, or how or if decryption keys will be used," Dalgetty writes.
- Details
- Category: Security News
- Details
- Category: Security News
In this edition of the ISMG Security Report, DataBreachToday Executive Editor Mathew Schwartz reports from the floor of the Infosecurity Europe conference in London on the top concerns of security practitioners, including ransomware.
You'll also hear in this report (click on player beneath image to listen):
National Institute of Standards and Technology Program Manager Matt Barrett explain how NIST intends to update next year the cybersecurity framework; HealthcareInfoSecurity Executive Editor Marianne Kolbasuk McGee address the U.S. government's efforts to help ensure that patients can securely access their electronic health records; and How Belgium came up on top of the list of 50 nations with the most servers with open doors.The ISMG Security Report appears on this and other ISMG websites on Tuesdays and Fridays. Please check out our June 3 and June 7 reports, which respectively examine President Obama's cybersecurity legacy and the backstory behind SWIFT-related thefts. The next ISMG Security Report will be posted Tuesday, June 14.
Theme music for the ISMG Security Report is by Ithaca Audio under a Creative Commons license.
More Articles …
Page 3442 of 3546







