Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
When The Boss Is Your Biggest Security Risk
Oldest First  |  Newest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
1/22/2016 | 1:14:12 PM
Audit Process
Good article and all too true. Off boarding is not as rigorously performed like on boarding. It seems counterintuitive when realizing that you were privy to zero company data before and now you are well versed. Could DLP Discovery be helpful here to monitor employees leaving. What are some best practices here that may be helpful?
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
1/22/2016 | 11:00:18 PM
CISO / board
This is one of a number of reasons why some people believe that CISOs should answer directly to the board instead of to the CIO (or, for that matter, to another C-suite executive).

Of course, what do you do if the CISO is leaving?
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
1/25/2016 | 2:16:16 AM
Reconsidering Data Storage and Use of Traditional Files
Someone like me looks at this all-to-familiar story and sees not a process issue but a data issue.  Too many companies that have critical information are still stuck in the old model of .doc .txt .pdf .vsd - you get the idea; files.  Moving forward we are looking at an era where files will no longer exist and the manipulation and sharing of data will not be done through the saving or emailing of a file.  Programs will store and display data and the computers used to do this will not allow screenshots and will block screen scrapers.  Special monitors will prevent photographs from being taken.  The problem has always been the data and its various file formats that are easily replicated.  We need to attack the issue there; rethink and redesign how critical data is created, managed and shared.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/25/2016 | 9:52:44 AM
c-level
 

Maybe I tis better to make c-level has a stake in the organization. They should own a few percentages of the organization so they do not exit for a better opportunity.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/25/2016 | 9:54:34 AM
Re: Audit Process
There may be exit questionnaire to understand if there was any leak of sensitive information. Other than that I guess it goes with other security measure such as making sure sensitive information does not leave the secure network. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/25/2016 | 9:56:21 AM
Re: CISO / board
Where CISO reports would not have any impact on this in my view, but I hear what you are saying.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/25/2016 | 9:57:50 AM
Re: Reconsidering Data Storage and Use of Traditional Files
Yes. These all make sense. It is not possible to bloke entire knowledge transfer for 100% tough.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
1/26/2016 | 11:18:52 AM
Re: CISO / board
If the CISO answers to the CIO and the CIO wants to leave and take company information along, can the CIO not potentially impact security reviews in some fashion (as opposed to if the CISO answers to the board)?

Simply food for thought.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
1/27/2016 | 10:41:37 AM
Re: CISO / board
 I guess that is true. If there is intention harming the business, anybody can find a way to do it.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-40865
PUBLISHED: 2021-10-25
An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x use...
CVE-2021-25977
PUBLISHED: 2021-10-25
In PiranhaCMS, versions 7.0.0 to 9.1.1 are vulnerable to stored XSS due to the page title improperly sanitized. By creating a page with a specially crafted page title, a low privileged user can trigger arbitrary JavaScript execution.
CVE-2021-35231
PUBLISHED: 2021-10-25
As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHIN...
CVE-2021-38294
PUBLISHED: 2021-10-25
A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.
CVE-2021-40526
PUBLISHED: 2021-10-25
Incorrect calculation of buffer size vulnerability in Peleton TTR01 up to and including PTV55G allows a remote attacker to trigger a Denial of Service attack through the GymKit daemon process by exploiting a heap overflow in the network server handling the Apple GymKit communication. This can lead t...