Comments
Security Starts with the User Experience
Newest First  |  Oldest First  |  Threaded View
BrianN060
50%
50%
BrianN060,
User Rank: Ninja
2/28/2018 | 11:36:01 AM
Security Starts with the User Experience
@Michael: "...companies think that users with legitimate access to sensitive data are the biggest risk..." The problem is that any data might become "sensitive data" when combined with other data; and that other data might not be considered "sensitive" either, and doesn't have to be from the same data source. 

@Peter: You raise some good points, including the need to emphasize prevention over remediation.  Changing attitudes and practices in application development won't be easy; and there are limitations to the effectiveness of safeguards at the application-user experience level (they really belong closer to the data).  Partly that's the inherent problem of anticipating all of the ways user interaction might compromise security - when you think you've thought of everything, someone will surprise you (usually by doing something very clever or unimaginably dumb).  Also, the user experience part of it nearly always trumps security concerns; so anything that encumbers or makes that experience less enticing will likely be vetoed.  There's another concern that pushes security to the back of the bus: revenue.  From a developer's perspective: compromise the user experience or the revenue stream, and you get immediate, and invariably negative, feedback.  Compromise security, and it might never get back to you - so how would you set your priorities? 
Michael Fimin Netwrix
50%
50%
Michael Fimin Netwrix,
User Rank: Author
2/28/2018 | 4:59:50 AM
Insiders are the weakest link in your security
This is so true! No matter how much effort and investments you have put in your security, your business users can derail all your work in a couple of minutes. Most companies think that users with legitimate access to sensitive data are the biggest risk, and the only way to try to fix that is to educate them and raise cyber security awareness. In addition, you always should have visibility into your IT infrastructure to check if your employees follow security policies established in your company. 


Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Cisco Talos Summit: Network Defenders Not Serious Enough About Attacks
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2018
Meet 'Bro': The Best-Kept Secret of Network Security
Greg Bell, CEO, Corelight,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12294
PUBLISHED: 2018-06-19
WebCore/platform/graphics/texmap/TextureMapperLayer.cpp in WebKit, as used in WebKitGTK+ prior to version 2.20.2, is vulnerable to a use after free for a WebCore::TextureMapperLayer object.
CVE-2018-12519
PUBLISHED: 2018-06-19
An issue was discovered in ShopNx through 2017-11-17. The vulnerability allows a remote attacker to upload any malicious file to a Node.js application. An attacker can upload a malicious HTML file that contains a JavaScript payload to steal a user's credentials.
CVE-2018-12588
PUBLISHED: 2018-06-19
Cross-site scripting (XSS) vulnerability in templates/frontend/pages/searchResults.tpl in Public Knowledge Project (PKP) Open Monograph Press (OMP) v1.2.0 through 3.1.1-1 before 3.1.1-2 allows remote attackers to inject arbitrary web script or HTML via the catalog.noTitlesSearch parameter (aka the S...
CVE-2018-10811
PUBLISHED: 2018-06-19
strongSwan 5.6.0 and older allows Remote Denial of Service because of Missing Initialization of a Variable.
CVE-2018-10945
PUBLISHED: 2018-06-19
The mg_handle_cgi function in mongoose.c in Mongoose 6.11 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash, or NULL pointer dereference) via an HTTP request, related to the mbuf_insert function.