Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Cyber Security Needs Its Ralph Nader
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Keith Graham
50%
50%
Keith Graham,
User Rank: Author
12/2/2014 | 1:42:35 PM
Re: This is not just a consumer problem > Vs time of war r
@Marilyn Cohodas, I would hope so too! I guess we're beyond the realms there of what is known in the public domain.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
12/2/2014 | 1:20:42 PM
Re: This is not just a consumer problem > Vs time of war r
@Keith Graham, I would assume that our military has a strategy in place against the kinetic attacks that you mention. At least I hope so. Am I being naive? 

Keith Graham
50%
50%
Keith Graham,
User Rank: Author
12/2/2014 | 11:48:28 AM
Re: This is not just a consumer problem
Further to tjgkg's point, it really does go beyond the consumer arena. One concern we should have IS the loss of life as a result of a breach, and I don't just mean in terms of damage to public infrastructure (like nuclear power facilities, or natural gas processing plants), which I think is much less likely, but at time of war. As a basic example, some nation state actor with the capability of compromising military and government systems could prevent the use of kinetic weapons in response to a kinetic attack, and entirely undermine our defenses. We shouldnt kid ourselves that these capabilities do not exist, or are not being developed. 
TsionG898
50%
50%
TsionG898,
User Rank: Apprentice
11/25/2014 | 5:54:31 PM
Re: Who will be the Cyber Ralph for data security?
I agree! I think the question has always been 'how big should the goverment role be?'. I personally think the goverment should get more involved. And put down regulations that really push companies to do more than what they'd like to. Just like the goverment did other things to save lives...I remember when I was forced to put on a seat belt... I didn't like that first also. 
TsionG898
50%
50%
TsionG898,
User Rank: Apprentice
11/25/2014 | 5:50:11 PM
Re: Who will be the Cyber Ralph for data security?
Yeah, but wouldn't you agree Nader had the best sounding name of them all? :)
Marilyn Cohodas
100%
0%
Marilyn Cohodas,
User Rank: Strategist
11/25/2014 | 4:32:27 PM
Re: Who will be the Cyber Ralph for data security?
It's a great thought @ODA155. So far we have suggestion for Cyber Ralph, CyberWyattEarp and Cyber Eisenhower. Al good role models. (And Happy Thanksgving to you too!)
ODA155
50%
50%
ODA155,
User Rank: Ninja
11/25/2014 | 4:13:41 PM
Re: Who will be the Cyber Ralph for data security?
@Marilyn Cohodas,... "a cyber Ralph Nader"... yes, I like that , but you know what would really be cool... a Cyber Wyatt Earp! Someone to clean it up! An agency charged AND empowered to wear two hats... one to get after the bad guys (by any means available) who make a living breaking into anything they consider to be worthy of targeting. And also to take whatever action necessary to "influence" business in this country to start taking this matter as serious as they take the bottom line at the end of the year. Give this person what she\he needs to make an impression on large corporate CEO's and without a doubt small business will fall in line. Make this person\position reportable to Congress and revisable by law so that it doesn't get too powerful or go stagnant. I would be nice if if this could be done at the private level, but as little faith that I have in our government with such things I have even less when it comes to letting business monitor itself, especially with something this serious, just look at PCI-DSS, when VISA & MasterCard themselves are fined, then there will be something there to build on, until then it's just a good start of "what can be".

I know htis is all "pie in the sky"... but a security guy can wish (no time to dream)... can't I?

 

Happy Holiday's Everyone!
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
11/25/2014 | 1:47:42 PM
Re: Who will be the Cyber Ralph for data security?
You would think that the general public would be outraged (and frightened) about how insecure our public infrastructure actually is. But I think that is an area where people show the least concern of all...
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
11/25/2014 | 9:56:05 AM
Re: This is not just a consumer problem
I agree, it requires different skill sets tough to protect us from cyber-security breaches. We always think security as a defensive approaches, we ned to get out of that mindset and become more proactive and maybe offensive at the same time.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
11/25/2014 | 9:53:44 AM
Re: Who will be the Cyber Ralph for data security?
I hope there is not death because of data breaches. If it goes beyond what it is now that is not unimaginable. If they are able to attack electricity grids, or nuclear reactors that may result into more unexpected damages.
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 4/7/2020
The Coronavirus & Cybersecurity: 3 Areas of Exploitation
Robert R. Ackerman Jr., Founder & Managing Director, Allegis Capital,  4/7/2020
'Unkillable' Android Malware App Continues to Infect Devices Worldwide
Jai Vijayan, Contributing Writer,  4/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-1633
PUBLISHED: 2020-04-09
Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packets could transit a Junos device configured as a Broadband Network Gateway (BNG) and reach the EVPN leaf node, causing a stale MAC address entry. This could cause legitimate traffic to be discarded, le...
CVE-2020-8834
PUBLISHED: 2020-04-09
KVM in the Linux kernel on Power8 processors has a conflicting use of HSTATE_HOST_R1 to store r1 state in kvmppc_hv_entry plus in kvmppc__tm, leading to a stack corruption. Because of this, an attacker with the ability run code in kernel space of a guest VM can cause the host kernel to...
CVE-2020-11668
PUBLISHED: 2020-04-09
In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.
CVE-2020-8961
PUBLISHED: 2020-04-09
An issue was discovered in Avira Free-Antivirus before 15.0.2004.1825. The Self-Protection feature does not prohibit a write operation from an external process. Thus, code injection can be used to turn off this feature. After that, one can construct an event that will modify a file at a specific loc...
CVE-2020-7922
PUBLISHED: 2020-04-09
X.509 certificates generated by the MongoDB Enterprise Kubernetes Operator may allow an attacker with access to the Kubernetes cluster improper access to MongoDB instances. Customers who do not use X.509 authentication, and those who do not use the Operator to generate their X.509 certificates are u...