Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Equifax CIO, CSO Step Down
Threaded  |  Newest First  |  Oldest First
Joe Stanganelli
0%
100%
Joe Stanganelli,
User Rank: Ninja
9/18/2017 | 1:15:40 PM
Appeasing the politicians
This is par for the course with even semi-major breaches -- let alone one with the gross magnitude of this one. C-suiters generally must be offered up as sacrificial lambs -- even if they didn't particularly do anything wrong (which, to be fair, does not seem to be the case here) -- to appease and keep regulators and other government officials at bay.
gwilson001
50%
50%
gwilson001,
User Rank: Strategist
9/18/2017 | 2:55:28 PM
Equifax should not be allowed to continue
Equifax has shown that they are not capable of protecting our most valuable persoanl data.  Data which we cannot opt-out of having collected by these aggreagators.  There is no way that Equifax should have another chance to lose our persoanl data.  They need to be shut down and those responsible should face charges for gross negligence. Firing a few people is not enough.  Equifax has handled this in the worst possible way.  They bshould fire their PR firm.

The 3 executives that sold stock before the loss was announced absolutly knew about the breach.  A breach this size is not kept from the top executives in the company - they knew and they illegally sold their stocks.  The sale was not a scheduled transaction according to reports.  Jail time for these guys is a must.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/22/2017 | 11:29:01 PM
Re: Equifax should not be allowed to continue
@gw: To be fair, unless I'm simply underinformed, we've been told nothing about the position of the executives or even if they're senior executives. "Executive" is such a generic term these days that it is commonly used to refer to any corporate-office worker who is not a secretary. Moreover, we have no idea if the executives have any position involving security, data privacy, data governance, or anything else such that they would have known.

Equifax is a HUGE company. It's entirely possible (and possibly even likely) that 3 "executives" may have innocently sold their stock in that interim period.

Of course, if these are executives who were well placed to know and act on this information, then those factors shift. But until and unless we know the exact positions of those executives, the court of public opinion is likely to be wrong.

(None of this is to excuse Equifax's apparently horrendous security practices, in any case. What a disaster.)
gwilson001
50%
50%
gwilson001,
User Rank: Strategist
9/25/2017 | 6:55:23 PM
Re: Equifax should not be allowed to continue
I believe they were 'C' level executives and you know they were among the first to know about something this severe.  I realize the term Executive is loosely defined but in this case these were not mid-level executives or any other flavor of management - they were the top guys and had to have known about this - if they didn't then the company is mismanaged to an even greater level.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/25/2017 | 8:28:01 PM
Re: Equifax should not be allowed to continue
@gwilson: Well, if they were C-suiters, then that certainly does say something.

Of course, which C-suiters is a big question -- especially given how loosely the C-level titles are being handed out. Chief Data Officer. Chief Digital Officer. Chief Procurement Officer. Chief Customer Success Officer. Chief Making Sure the Bathrooms Don't Run Out of Paper Towels Officer.

Not that I know what Equifax's precise structure is. But just saying.

Big difference between the CIO or the CISO selling their stock and any of these nascent C titles -- or even the CMO, say.
mjohnson681
100%
0%
mjohnson681,
User Rank: Apprentice
9/18/2017 | 8:23:15 PM
Make the Data Worthless for the Bad Guys!
It is apparent we cannot protect data effectively.  Why not make it worthless to those who steal it?

https://www.linkedin.com/pulse/give-up-cybersecurity-programs-matthew-r-johnson-cpa-cisa 
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/25/2017 | 8:31:06 PM
Re: Make the Data Worthless for the Bad Guys!
I'm not sure "Just give everyone a PIN" is the ultimate solution for everything -- especially considering how easily those PINs can become compromised. You're just exchanging one set of private information for another.
mjohnson681
100%
0%
mjohnson681,
User Rank: Apprentice
9/25/2017 | 9:35:41 PM
Re: Make the Data Worthless for the Bad Guys!
Joe- You are missing the point. If we make data they want to steal worthless by implementing proper controls, isnt that the solution? Or do you have better ideas on how to leverages the billions spent every year for imperfect information security?
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/26/2017 | 12:46:38 PM
Re: Make the Data Worthless for the Bad Guys!
If I understand it correctly, all this proposal does is implement controls such that it changes the information that attackers will want to steal (while, at the same time, implementing an additional accessibility barrier to legitimate users).

Also, how long should the PIN be? And what happens when an expected 17% of the population chooses one of the same two easy-to-remember PINs?
cybersavior
50%
50%
cybersavior,
User Rank: Strategist
9/19/2017 | 11:39:29 AM
Physician, heal thyself
Equifax should bring in the pros.  http://www.equifax.com/help/data-breach-solutions/
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/25/2017 | 8:29:21 PM
Re: Physician, heal thyself
I think in this case, the "pros" are Mandiant.


COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
Are You One COVID-19 Test Away From a Cybersecurity Disaster?
Alan Brill, Senior Managing Director, Cyber Risk Practice, Kroll,  10/21/2020
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
David Pearson, Principal Threat Researcher,  10/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15238
PUBLISHED: 2020-10-27
Blueman is a GTK+ Bluetooth Manager. In Blueman before 2.1.4, the DhcpClient method of the D-Bus interface to blueman-mechanism is prone to an argument injection vulnerability. The impact highly depends on the system configuration. If Polkit-1 is disabled and for versions lower than 2.0.6, any lo...
CVE-2020-26156
PUBLISHED: 2020-10-27
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2020-27853
PUBLISHED: 2020-10-27
Wire before 2020-10-16 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a format string. This affects Wire AVS (Audio, Video, and Signaling) 5.3 through 6.x before 6.4, the Wire Secure Messenger application before 3.49.918 for Android, a...
CVE-2020-7755
PUBLISHED: 2020-10-27
All versions of package dat.gui are vulnerable to Regular Expression Denial of Service (ReDoS) via specifically crafted rgb and rgba values.
CVE-2020-11854
PUBLISHED: 2020-10-27
Arbitrary code execution vlnerability in Operation bridge Manager, Application Performance Management and Operations Bridge (containerized) vulnerability in Micro Focus products products Operation Bridge Manager, Operation Bridge (containerized) and Application Performance Management. The vulneravil...