News

5/13/2016
10:55 AM
Sean Martin
Sean Martin
Slideshows
Connect Directly
LinkedIn
RSS
E-Mail

Happy Blame Someone Else Day

In cybersecurity, each day a company experiences a data breach, it appears to be #BlameSomeoneElseDay
2 of 14

Blame Poor or Missing Risk Assessments
Rick Howard, CSO, Palo Alto Networks

'One of the reasons the blame game exists in information security is that as a community, network defenders are horrible at assessing risk. The tendency is for network defenders to assess risk as either high, medium or low based on experience. But, if we are asked to defend our assessments by C-Level executives or board members, there usually is not a lot of precision underneath the first layer of spreadsheets.'

This is beginning to change though. At this year's Cybersecurity Canon Awards Ceremony, Jack Freund and Jack Jones were inducted into the Hall of Fame for their book: 'Measuring and Managing Information Risk: A FAIR Approach.' I believe this book is the future for the network defender community. It provides a methodology to assess risk with enough rigor that if a C-Level executive or board member asked for details about the assessment, the math behind the assessment is non-refutable.'

Image Source: imsmartin / Palo Alto Networks

Blame Poor or Missing Risk Assessments

Rick Howard, CSO, Palo Alto Networks

"One of the reasons the blame game exists in information security is that as a community, network defenders are horrible at assessing risk. The tendency is for network defenders to assess risk as either high, medium or low based on experience. But, if we are asked to defend our assessments by C-Level executives or board members, there usually is not a lot of precision underneath the first layer of spreadsheets."

This is beginning to change though. At this years Cybersecurity Canon Awards Ceremony, Jack Freund and Jack Jones were inducted into the Hall of Fame for their book: "Measuring and Managing Information Risk: A FAIR Approach. I believe this book is the future for the network defender community. It provides a methodology to assess risk with enough rigor that if a C-Level executive or board member asked for details about the assessment, the math behind the assessment is non-refutable."

Image Source: imsmartin / Palo Alto Networks

2 of 14
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Tips for the Aftermath of a Cyberattack
Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11378
PUBLISHED: 2019-04-20
An issue was discovered in ProjectSend r1053. upload-process-form.php allows finished_files[]=../ directory traversal. It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code.
CVE-2019-11372
PUBLISHED: 2019-04-20
An out-of-bounds read in MediaInfoLib::File__Tags_Helper::Synched_Test in Tag/File__Tags.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to a crash.
CVE-2019-11373
PUBLISHED: 2019-04-20
An out-of-bounds read in File__Analyze::Get_L8 in File__Analyze_Buffer.cpp in MediaInfoLib in MediaArea MediaInfo 18.12 leads to a crash.
CVE-2019-11374
PUBLISHED: 2019-04-20
74CMS v5.0.1 has a CSRF vulnerability to add a new admin user via the index.php?m=Admin&c=admin&a=add URI.
CVE-2019-11375
PUBLISHED: 2019-04-20
Msvod v10 has a CSRF vulnerability to change user information via the admin/member/edit.html URI.