Attacks/Breaches
8/28/2013
12:31 PM
W. Hord Tipton
W. Hord Tipton
Commentary
Connect Directly
LinkedIn
RSS
E-Mail
50%
50%

New Security Trend: Bring Your Own Attorney

BYOA is not a security joke anymore. There is clearly a need for a cybersecurity community that is well-versed in legal and ethical principles.

10 Top Password Managers
10 Top Password Managers
(click image for slideshow)
Acronyms have an amusing way of characterizing moments in time. For some of us, BYOB (bring your own beverage) became a familiar and festive part of college. Now, later in life, those of us in the government professional environment have learned to use a similar acronym -- BYOD.

BYOD sums up the ability to use our own mobile device -- laptop, tablet, smart phone -- to access agency or company information and applications. It also suggests an approach that makes our job easier, makes us more productive and creates an overall more satisfying work-life balance.

I see a similar acronym being tossed around that could likely define the next decade in government IT, however. This one gives off a not-so-festive and certainly not-so-productive vibe -- BYOA or bring your own attorney.

While BYOA is mostly used tongue-in-cheek in government security circles, the era of BYOA is quickly evolving from jest to reality, given the nature of today's cyber conflicts and murky data privacy policies.

[ Beginning of a new hacking wave? Read NY Times Caught In Syrian Hacker Attack. ]

Reuters, based on interviews with U.S. intelligence officials, recently reported the U.S. government is now believed to be the "biggest buyer" of malware, as part of an offensive strategy that experts believe leaves business and consumer systems/data vulnerable.

This and countless other complex security considerations only reinforce the fact that whether a breach is caused by a questionable offensive measure or a faulty defensive measure, cyber represents the next biggest legal battlefield for government organizations.

In the area of cyber, legal issues almost always result in a need for the specialty of digital forensics in an effort to find out what happened, who did it and how to prove it. On a global scale, digital forensics is considered among the fastest growing fields in technology because there are simply not enough resources to adequately investigate the number and complexity of crimes occurring. Consider that 20% of nearly 12,400 respondents in an (ISC)² 2013 Global Information Security Study said there were not enough forensic analysts within their organization.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
benjimurphy
50%
50%
benjimurphy,
User Rank: Apprentice
9/12/2013 | 12:12:21 PM
re: New Security Trend: Bring Your Own Attorney
BYOA - LOL! Possible legal issues or not, BYOD is being used and BYOD policies are being signed by employees. Yes, you have to be careful, but the best secureity is not to have the data on the device. We use Tigertext messaging to send text, images and attachments, since they auto-delete after a set period of time and therefore don't remain on the phone/device which is more secure for everyone. Here is a link to a good BYOD policy that deals with this: http://www.hipaatext.com/wp-co...
WKash
50%
50%
WKash,
User Rank: Apprentice
8/29/2013 | 8:14:42 PM
re: New Security Trend: Bring Your Own Attorney
Given that we probably don't need any more lawyers, let's hope more folks pursue an education in digital forensics to meet the growing demand.
Lorna Garey
50%
50%
Lorna Garey,
User Rank: Ninja
8/29/2013 | 6:24:27 PM
re: New Security Trend: Bring Your Own Attorney
The jokes almost write themselves. Q: How many lawyers does it take to hunt down attribution for a breach? A: How many can you afford? Q: What do they call the new virus written by a lawyer? A: Sosumi
RobPreston
50%
50%
RobPreston,
User Rank: Apprentice
8/29/2013 | 1:58:13 PM
re: New Security Trend: Bring Your Own Attorney
We hear that the hottest IT-related professions are data scientists and security technologists, but anecdotally I'm hearing a lot lately about another one: lawyers. One top CIO recently told me that most of his hires in the past year were lawyers and other compliance experts. And he wasn't happy about it.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3341
Published: 2014-08-19
The SNMP module in Cisco NX-OS 7.0(3)N1(1) and earlier on Nexus 5000 and 6000 devices provides different error messages for invalid requests depending on whether the VLAN ID exists, which allows remote attackers to enumerate VLANs via a series of requests, aka Bug ID CSCup85616.

CVE-2014-3464
Published: 2014-08-19
The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) 6.2.0 and 6.3.0, does not properly enforce the method level restrictions for outbound messages, which allows remote authenticated users to access otherwise restricted JAX-WS handlers ...

CVE-2014-3472
Published: 2014-08-19
The isCallerInRole function in SimpleSecurityManager in JBoss Application Server (AS) 7, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.3.0, does not properly check caller roles, which allows remote authenticated users to bypass access restrictions via unspecified vectors.

CVE-2014-3490
Published: 2014-08-19
RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have...

CVE-2014-3504
Published: 2014-08-19
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Dark Reading continuing coverage of the Black Hat 2014 conference brings interviews and commentary to Dark Reading listeners.