Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Why InfoSec Pros Should Keep A Close Eye On Cyber Efficiency
Newest First  |  Oldest First  |  Threaded View
HusseinB453
50%
50%
HusseinB453,
User Rank: Apprentice
1/28/2016 | 3:46:25 PM
A refreshing and insightful perspective
I was delighted to find this article and the sentiment is conveys resonates with me. As an advocate of KnowIT aka 3IT (NoDev, NoOps and NoIT) Scott's assertion:

"Any decision regarding methodology, vendor, product, or service that doesn't demonstrably increase efficiency and efficacy is a bad decision"

Rings true and echoes the assertions of the NoIT and NoDev principles:

"Eliminate IT systems that demand the attention of humans" and "Only engage in development projects that unambiguously and unequivocally generate revenue for the business or enhance customer experience"

Decisions pertaining to Cyber Security must be held to the same principles. While it may be a stretch to say that poor Cyber Security spending can kill a business; burdensome administration, proliferation of manual processes and the introduction of disjointed IT systems can have a greater negative effect on the bottom line than the secrutiy threats they purport to mitigate.

There are emerging technologies that can make a great impact on increasing the ROI of Cyber Security and CISOs should seize the opportunity to leverage innovation to reduce costs and streamline the administrative processes they own.

I look forward to your future article on this subject. 

 


Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
CVE-2021-32553
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
CVE-2021-32554
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.
CVE-2021-32555
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg-hwe-18.04 package apport hooks, it could expose private data to other local users.
CVE-2021-32556
PUBLISHED: 2021-06-12
It was discovered that the get_modified_conffiles() function in backends/packaging-apt-dpkg.py allowed injecting modified package names in a manner that would confuse the dpkg(1) call.