Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
7 Reasons Consumers Dont Take Action on Cybersecurity
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Lily652
50%
50%
Lily652,
User Rank: Moderator
11/12/2016 | 5:13:05 AM
prayer times

It was a very good post indeed. I thoroughly enjoyed reading it in my lunch time. Will surely come and visit this blog more often. Thanks for sharing

kasstri
50%
50%
kasstri,
User Rank: Strategist
11/11/2016 | 8:17:45 AM
Re: keydown
I'm not that much of a online reader to be honest but your blogs really nice, keep it up! I'll go ahead and bookmark your website to come back down the road.
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
11/9/2016 | 9:13:38 AM
Identity theft
Great and nice informative article on the importance of cyber security and how it can be maintained. However, one important thing is missing, and that is the deployment of vpn server to protect our IP. It is important to anonymize your IP with a genuine vpn server like PureVPN and that is reliable because it offers encrypted online connection so that's a big plus. 
kasstri
100%
0%
kasstri,
User Rank: Strategist
11/8/2016 | 6:51:01 AM
Re: keydown
I'm not that much of a online reader to be honest but your blogs really nice, keep it up! I'll go ahead and bookmark your website to come back down the road.
securityartist
50%
50%
securityartist,
User Rank: Apprentice
11/6/2016 | 5:33:56 PM
cyber resilience is possible with awareness, appreciation, and action
There are a few fundamental problems with expeting action from awareness.

 

Awareness is simply knowledge. I know that the moon has one sixth the gravity of the Earth, but I do not appreciate what that feels like because I have not experienced it.

Appeciation or understanding requires some experience. 

Action can not occur until we have an aprpeciation or understanidng, but to make matters worse, a large percentage of the cybersecurity industry isn;t able to articulate what actiosn should be taken. They are great at talking about the problem - whining about it even, but ask for a solution and they bolt leavinga  cloud of dust.

 

The solution here is to make awareness interactive and engaging.Let people know exaclty what a breach looks like rather than just talk about it. Let them look at the problem through their own lens. All of us have either family or funds (or both) that we want to protect from the wrath of cybercrime; so start with engaging and interactive dialog aroudn these.

 

Once understanding ahs been achieved, then practical solutiosn are key around not just threat prevention but all aspects of the cybercrie lifecycle:

(1) asset management: discovery and classification fo assets

(2) vulnerbaility management: discovery and remediation of vulnerbailities in those assets

(3) threat mangement: prediction and preveniton of threats that those vulnerbailties are exposed to

(4) incident management: detectiona dn response to attacks that were not able to be predicted and prevented when threats

(5) continuity management: confirmation and recovery of breaches that were not able to be detected and responded to when attacks

(6) crisis management: acceptance, avoidance, transfer, or mitigiation of impacts that have manifested because breaches were not confirmed and recovered from quickly enough

 

Awareess, appreciation and action can achieve cyber resilience.
kasstri
50%
50%
kasstri,
User Rank: Strategist
11/5/2016 | 8:09:01 AM
Re: key
He received great pleasure from this article. The guys did a good job. I want to continue to read the news of this resource!
Shantaram
50%
50%
Shantaram,
User Rank: Ninja
11/5/2016 | 7:21:36 AM
Re: 192.168.0.1
Nice article, thanks a lot for your kind sharing!
lorraine89
50%
50%
lorraine89,
User Rank: Ninja
11/3/2016 | 9:55:31 AM
Cyber security
Nice informatve article. The main reason why the generl everyday using public does not care much about their cyber security is because they do not think that they'd also can become the victim of online hacks. Privacy to everyone is very important and it is important also to take that freedom and privacy seriously. Therefore it is essential to secure our connections with vpn services. I use PureVPN US servers to mask my IP from snoopers and hackers. 
<<   <   Page 2 / 2


COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15564
PUBLISHED: 2020-07-07
An issue was discovered in Xen through 4.13.x, allowing Arm guest OS users to cause a hypervisor crash because of a missing alignment check in VCPUOP_register_vcpu_info. The hypercall VCPUOP_register_vcpu_info is used by a guest to register a shared region with the hypervisor. The region will be map...
CVE-2020-15565
PUBLISHED: 2020-07-07
An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require flushing of both TLBs....
CVE-2020-15566
PUBLISHED: 2020-07-07
An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory allocation failed, o...
CVE-2020-15567
PUBLISHED: 2020-07-07
An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-atomic bitfield writes...
CVE-2020-15563
PUBLISHED: 2020-07-07
An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A malicious or buggy HVM g...