Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Compliance in the Cloud Needs To Be Continuous & Automated
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
7/2/2017 | 12:09:37 AM
Re: Secure vs. compliant
@Dr. T: Absolutely.

One of my favorite examples of this that I like to use with clients is of a local hospital that (true story) has certain large trash bins throughout that are very prominently and clearly labeled as being for the disposal of documents containing HIPAA-protected information.

The problem, however, is that if I'm a bad guy, I know exactly where to look for that information. I just have to shove my arm into the bin and grab some papers and quickly dart off.

So while that's a very "compliant" thing to do, it's not at all secure.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/28/2017 | 10:57:44 AM
Secure vs. compliant
"enterprises are scrambling not only to remain secure, but to be compliant with industry, government, and other regulatory mandates"

I tis good to point this out, secure does not mean compliant and vice a versa.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/28/2017 | 10:55:41 AM
Re: Risk and data stewardship
"a Venn diagram of data stewardship"

Glad you mentioned this, data classification and ownership where we need to start when it comes to data security and privacy.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/28/2017 | 10:53:46 AM
Re: Great post
I agree, it is well thought and written, and very important subject at the same time. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/28/2017 | 10:52:29 AM
Re: Risk and data stewardship
"compliance is just another risk factor"

Makes sense. Anything and everything is risk anymore and needs to be dealt with a proper risk management strategy which should involve automation anymore.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
6/28/2017 | 10:50:14 AM
continuous automation and assessment
This is certainly needed a specially based on the increased number of ransomware attacks we experience these days.
Angella14
50%
50%
Angella14,
User Rank: Apprentice
6/28/2017 | 8:49:39 AM
Great post
I truly delighted in perusing your article. I discovered this as a useful and fascinating post, so I think it is extremely valuable and proficient. I might want to thank you for the exertion you have made in composing this article.  I really thankful to you if you visit our site. https://www.promoocodes.com
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
6/27/2017 | 11:15:47 AM
Risk and data stewardship
At the end of the day, compliance is just another risk factor -- particularly considering that data compliance is NOT the same thing as (and, sometimes, is the opposite thing from) data security or data privacy, respectively. It all falls into a Venn diagram of data stewardship -- and all risks must be appropriately weighed and accounted for.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-40865
PUBLISHED: 2021-10-25
An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x use...
CVE-2021-25977
PUBLISHED: 2021-10-25
In PiranhaCMS, versions 7.0.0 to 9.1.1 are vulnerable to stored XSS due to the page title improperly sanitized. By creating a page with a specially crafted page title, a low privileged user can trigger arbitrary JavaScript execution.
CVE-2021-35231
PUBLISHED: 2021-10-25
As a result of an unquoted service path vulnerability present in the Kiwi Syslog Server Installation Wizard, a local attacker could gain escalated privileges by inserting an executable into the path of the affected service or uninstall entry. Example vulnerable path: "Computer\HKEY_LOCAL_MACHIN...
CVE-2021-38294
PUBLISHED: 2021-10-25
A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.
CVE-2021-40526
PUBLISHED: 2021-10-25
Incorrect calculation of buffer size vulnerability in Peleton TTR01 up to and including PTV55G allows a remote attacker to trigger a Denial of Service attack through the GymKit daemon process by exploiting a heap overflow in the network server handling the Apple GymKit communication. This can lead t...