Attacks/Breaches
11/25/2013
11:06 AM
John Klossner
John Klossner
Commentary
Connect Directly
RSS
E-Mail

Cartoon: You Might Be A Security Expert If...

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
12/2/2013 | 8:09:14 AM
Re: Not crazy but....
J_Brandt.That's a great point about injecting a healthy dose of paranoia as part of a corporate security awareness program. What have you found to be the right amont of scare tactics in user security training. When does too much paranoia seem crazy and counter productive?
J_Brandt
50%
50%
J_Brandt,
User Rank: Apprentice
11/27/2013 | 5:04:09 PM
Re: Not crazy but....
Paranoia isn't just for security professionals.  A healthy security awareness program for users looks to promote a little bit of paranoia in everyone doesn't it?
Susan Fogarty
50%
50%
Susan Fogarty,
User Rank: Apprentice
11/26/2013 | 10:39:49 AM
Re: Not crazy but....
Unfortunately I think it is true, especially when you're talking about corporations that are potential targets because they have data that could be valuable in many different ways. I know several mobile security consultants who advise IT managers to start with the assumption that any device has been breached, and go from there in protecting enterprise data and apps. It's a jungle out there!
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
11/26/2013 | 7:57:07 AM
Not crazy but....
Funny cartoon but is it true? Is paranoia now a part of the job description for IT security professionals? Or maybe I am  just being paraonoid.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0560
Published: 2014-09-17
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors.

CVE-2014-0561
Published: 2014-09-17
Heap-based buffer overflow in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0567.

CVE-2014-0562
Published: 2014-09-17
Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on OS X allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)."

CVE-2014-0563
Published: 2014-09-17
Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to cause a denial of service (memory corruption) via unspecified vectors.

CVE-2014-0565
Published: 2014-09-17
Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0566.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant