Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Equifax CIO, CSO Step Down
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/26/2017 | 12:46:38 PM
Re: Make the Data Worthless for the Bad Guys!
If I understand it correctly, all this proposal does is implement controls such that it changes the information that attackers will want to steal (while, at the same time, implementing an additional accessibility barrier to legitimate users).

Also, how long should the PIN be? And what happens when an expected 17% of the population chooses one of the same two easy-to-remember PINs?
mjohnson681
100%
0%
mjohnson681,
User Rank: Apprentice
9/25/2017 | 9:35:41 PM
Re: Make the Data Worthless for the Bad Guys!
Joe- You are missing the point. If we make data they want to steal worthless by implementing proper controls, isnt that the solution? Or do you have better ideas on how to leverages the billions spent every year for imperfect information security?
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/25/2017 | 8:31:06 PM
Re: Make the Data Worthless for the Bad Guys!
I'm not sure "Just give everyone a PIN" is the ultimate solution for everything -- especially considering how easily those PINs can become compromised. You're just exchanging one set of private information for another.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/25/2017 | 8:29:21 PM
Re: Physician, heal thyself
I think in this case, the "pros" are Mandiant.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/25/2017 | 8:28:01 PM
Re: Equifax should not be allowed to continue
@gwilson: Well, if they were C-suiters, then that certainly does say something.

Of course, which C-suiters is a big question -- especially given how loosely the C-level titles are being handed out. Chief Data Officer. Chief Digital Officer. Chief Procurement Officer. Chief Customer Success Officer. Chief Making Sure the Bathrooms Don't Run Out of Paper Towels Officer.

Not that I know what Equifax's precise structure is. But just saying.

Big difference between the CIO or the CISO selling their stock and any of these nascent C titles -- or even the CMO, say.
gwilson001
50%
50%
gwilson001,
User Rank: Strategist
9/25/2017 | 6:55:23 PM
Re: Equifax should not be allowed to continue
I believe they were 'C' level executives and you know they were among the first to know about something this severe.  I realize the term Executive is loosely defined but in this case these were not mid-level executives or any other flavor of management - they were the top guys and had to have known about this - if they didn't then the company is mismanaged to an even greater level.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/22/2017 | 11:29:01 PM
Re: Equifax should not be allowed to continue
@gw: To be fair, unless I'm simply underinformed, we've been told nothing about the position of the executives or even if they're senior executives. "Executive" is such a generic term these days that it is commonly used to refer to any corporate-office worker who is not a secretary. Moreover, we have no idea if the executives have any position involving security, data privacy, data governance, or anything else such that they would have known.

Equifax is a HUGE company. It's entirely possible (and possibly even likely) that 3 "executives" may have innocently sold their stock in that interim period.

Of course, if these are executives who were well placed to know and act on this information, then those factors shift. But until and unless we know the exact positions of those executives, the court of public opinion is likely to be wrong.

(None of this is to excuse Equifax's apparently horrendous security practices, in any case. What a disaster.)
cybersavior
50%
50%
cybersavior,
User Rank: Strategist
9/19/2017 | 11:39:29 AM
Physician, heal thyself
Equifax should bring in the pros.  http://www.equifax.com/help/data-breach-solutions/
mjohnson681
100%
0%
mjohnson681,
User Rank: Apprentice
9/18/2017 | 8:23:15 PM
Make the Data Worthless for the Bad Guys!
It is apparent we cannot protect data effectively.  Why not make it worthless to those who steal it?

https://www.linkedin.com/pulse/give-up-cybersecurity-programs-matthew-r-johnson-cpa-cisa 
gwilson001
50%
50%
gwilson001,
User Rank: Strategist
9/18/2017 | 2:55:28 PM
Equifax should not be allowed to continue
Equifax has shown that they are not capable of protecting our most valuable persoanl data.  Data which we cannot opt-out of having collected by these aggreagators.  There is no way that Equifax should have another chance to lose our persoanl data.  They need to be shut down and those responsible should face charges for gross negligence. Firing a few people is not enough.  Equifax has handled this in the worst possible way.  They bshould fire their PR firm.

The 3 executives that sold stock before the loss was announced absolutly knew about the breach.  A breach this size is not kept from the top executives in the company - they knew and they illegally sold their stocks.  The sale was not a scheduled transaction according to reports.  Jail time for these guys is a must.
Page 1 / 2   >   >>


COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
Google Cloud Debuts Threat-Detection Service
Robert Lemos, Contributing Writer,  9/23/2020
Shopify's Employee Data Theft Underscores Risk of Rogue Insiders
Kelly Sheridan, Staff Editor, Dark Reading,  9/23/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24565
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25770
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25771
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25772
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
CVE-2020-25773
PUBLISHED: 2020-09-29
A vulnerability in the Trend Micro Apex One ServerMigrationTool component could allow an attacker to execute arbitrary code on affected products. User interaction is required to exploit this vulnerability in that the target must import a corrupted configuration file.