Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Equifax CIO, CSO Step Down
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/26/2017 | 12:46:38 PM
Re: Make the Data Worthless for the Bad Guys!
If I understand it correctly, all this proposal does is implement controls such that it changes the information that attackers will want to steal (while, at the same time, implementing an additional accessibility barrier to legitimate users).

Also, how long should the PIN be? And what happens when an expected 17% of the population chooses one of the same two easy-to-remember PINs?
mjohnson681
100%
0%
mjohnson681,
User Rank: Apprentice
9/25/2017 | 9:35:41 PM
Re: Make the Data Worthless for the Bad Guys!
Joe- You are missing the point. If we make data they want to steal worthless by implementing proper controls, isnt that the solution? Or do you have better ideas on how to leverages the billions spent every year for imperfect information security?
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/25/2017 | 8:31:06 PM
Re: Make the Data Worthless for the Bad Guys!
I'm not sure "Just give everyone a PIN" is the ultimate solution for everything -- especially considering how easily those PINs can become compromised. You're just exchanging one set of private information for another.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/25/2017 | 8:29:21 PM
Re: Physician, heal thyself
I think in this case, the "pros" are Mandiant.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/25/2017 | 8:28:01 PM
Re: Equifax should not be allowed to continue
@gwilson: Well, if they were C-suiters, then that certainly does say something.

Of course, which C-suiters is a big question -- especially given how loosely the C-level titles are being handed out. Chief Data Officer. Chief Digital Officer. Chief Procurement Officer. Chief Customer Success Officer. Chief Making Sure the Bathrooms Don't Run Out of Paper Towels Officer.

Not that I know what Equifax's precise structure is. But just saying.

Big difference between the CIO or the CISO selling their stock and any of these nascent C titles -- or even the CMO, say.
gwilson001
50%
50%
gwilson001,
User Rank: Strategist
9/25/2017 | 6:55:23 PM
Re: Equifax should not be allowed to continue
I believe they were 'C' level executives and you know they were among the first to know about something this severe.  I realize the term Executive is loosely defined but in this case these were not mid-level executives or any other flavor of management - they were the top guys and had to have known about this - if they didn't then the company is mismanaged to an even greater level.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
9/22/2017 | 11:29:01 PM
Re: Equifax should not be allowed to continue
@gw: To be fair, unless I'm simply underinformed, we've been told nothing about the position of the executives or even if they're senior executives. "Executive" is such a generic term these days that it is commonly used to refer to any corporate-office worker who is not a secretary. Moreover, we have no idea if the executives have any position involving security, data privacy, data governance, or anything else such that they would have known.

Equifax is a HUGE company. It's entirely possible (and possibly even likely) that 3 "executives" may have innocently sold their stock in that interim period.

Of course, if these are executives who were well placed to know and act on this information, then those factors shift. But until and unless we know the exact positions of those executives, the court of public opinion is likely to be wrong.

(None of this is to excuse Equifax's apparently horrendous security practices, in any case. What a disaster.)
cybersavior
50%
50%
cybersavior,
User Rank: Strategist
9/19/2017 | 11:39:29 AM
Physician, heal thyself
Equifax should bring in the pros.  http://www.equifax.com/help/data-breach-solutions/
mjohnson681
100%
0%
mjohnson681,
User Rank: Apprentice
9/18/2017 | 8:23:15 PM
Make the Data Worthless for the Bad Guys!
It is apparent we cannot protect data effectively.  Why not make it worthless to those who steal it?

https://www.linkedin.com/pulse/give-up-cybersecurity-programs-matthew-r-johnson-cpa-cisa 
gwilson001
50%
50%
gwilson001,
User Rank: Strategist
9/18/2017 | 2:55:28 PM
Equifax should not be allowed to continue
Equifax has shown that they are not capable of protecting our most valuable persoanl data.  Data which we cannot opt-out of having collected by these aggreagators.  There is no way that Equifax should have another chance to lose our persoanl data.  They need to be shut down and those responsible should face charges for gross negligence. Firing a few people is not enough.  Equifax has handled this in the worst possible way.  They bshould fire their PR firm.

The 3 executives that sold stock before the loss was announced absolutly knew about the breach.  A breach this size is not kept from the top executives in the company - they knew and they illegally sold their stocks.  The sale was not a scheduled transaction according to reports.  Jail time for these guys is a must.
Page 1 / 2   >   >>


Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27605
PUBLISHED: 2020-10-21
BigBlueButton through 2.2.8 uses Ghostscript for processing of uploaded EPS documents, and consequently may be subject to attacks related to a "schwache Sandbox."
CVE-2020-27606
PUBLISHED: 2020-10-21
BigBlueButton before 2.2.8 (or earlier) does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.
CVE-2020-27607
PUBLISHED: 2020-10-21
In BigBlueButton before 2.2.8 (or earlier), the client-side Mute button only signifies that the server should stop accepting audio data from the client. It does not directly configure the client to stop sending audio data to the server, and thus a modified server could store the audio data and/or tr...
CVE-2020-27608
PUBLISHED: 2020-10-21
In BigBlueButton before 2.2.8 (or earlier), uploaded presentations are sent to clients without a Content-Type header, which allows XSS, as demonstrated by a .png file extension for an HTML document.
CVE-2020-27609
PUBLISHED: 2020-10-21
BigBlueButton through 2.2.8 records a video meeting despite the deactivation of video recording in the user interface. This may result in data storage beyond what is authorized for a specific meeting topic or participant.