Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
When The Boss Is Your Biggest Security Risk
Newest First  |  Oldest First  |  Threaded View
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/27/2016 | 10:41:37 AM
Re: CISO / board
 I guess that is true. If there is intention harming the business, anybody can find a way to do it.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
1/26/2016 | 11:18:52 AM
Re: CISO / board
If the CISO answers to the CIO and the CIO wants to leave and take company information along, can the CIO not potentially impact security reviews in some fashion (as opposed to if the CISO answers to the board)?

Simply food for thought.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/25/2016 | 9:57:50 AM
Re: Reconsidering Data Storage and Use of Traditional Files
Yes. These all make sense. It is not possible to bloke entire knowledge transfer for 100% tough.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/25/2016 | 9:56:21 AM
Re: CISO / board
Where CISO reports would not have any impact on this in my view, but I hear what you are saying.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/25/2016 | 9:54:34 AM
Re: Audit Process
There may be exit questionnaire to understand if there was any leak of sensitive information. Other than that I guess it goes with other security measure such as making sure sensitive information does not leave the secure network. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/25/2016 | 9:52:44 AM
c-level
 

Maybe I tis better to make c-level has a stake in the organization. They should own a few percentages of the organization so they do not exit for a better opportunity.
Christian Bryant
50%
50%
Christian Bryant,
User Rank: Ninja
1/25/2016 | 2:16:16 AM
Reconsidering Data Storage and Use of Traditional Files
Someone like me looks at this all-to-familiar story and sees not a process issue but a data issue.  Too many companies that have critical information are still stuck in the old model of .doc .txt .pdf .vsd - you get the idea; files.  Moving forward we are looking at an era where files will no longer exist and the manipulation and sharing of data will not be done through the saving or emailing of a file.  Programs will store and display data and the computers used to do this will not allow screenshots and will block screen scrapers.  Special monitors will prevent photographs from being taken.  The problem has always been the data and its various file formats that are easily replicated.  We need to attack the issue there; rethink and redesign how critical data is created, managed and shared.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
1/22/2016 | 11:00:18 PM
CISO / board
This is one of a number of reasons why some people believe that CISOs should answer directly to the board instead of to the CIO (or, for that matter, to another C-suite executive).

Of course, what do you do if the CISO is leaving?
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
1/22/2016 | 1:14:12 PM
Audit Process
Good article and all too true. Off boarding is not as rigorously performed like on boarding. It seems counterintuitive when realizing that you were privy to zero company data before and now you are well versed. Could DLP Discovery be helpful here to monitor employees leaving. What are some best practices here that may be helpful?


97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-11873
PUBLISHED: 2019-05-23
wolfSSL 4.0.0 has a Buffer Overflow in DoPreSharedKeys in tls13.c when a current identity size is greater than a client identity size. An attacker sends a crafted hello client packet over the network to a TLSv1.3 wolfSSL server. The length fields of the packet: record length, client hello length, to...
CVE-2019-12295
PUBLISHED: 2019-05-23
In Wireshark 3.0.0 to 3.0.1, 2.6.0 to 2.6.8, and 2.4.0 to 2.4.14, the dissection engine could crash. This was addressed in epan/packet.c by restricting the number of layers and consequently limiting recursion.
CVE-2019-12293
PUBLISHED: 2019-05-23
In Poppler through 0.76.1, there is a heap-based buffer over-read in JPXStream::init in JPEG2000Stream.cc via data with inconsistent heights or widths.
CVE-2018-7201
PUBLISHED: 2019-05-22
CSV Injection was discovered in ProjectSend before r1053, affecting victims who import the data into Microsoft Excel.
CVE-2018-7803
PUBLISHED: 2019-05-22
A CWE-754 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Triconex TriStation Emulator V1.2.0, which could cause the emulator to crash when sending a specially crafted packet. The emulator is used infrequently for application logic testing. It is susceptible to an attack...