Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
High Stress Levels Impacting CISOs Physically, Mentally
Newest First  |  Oldest First  |  Threaded View
REISEN1955
REISEN1955,
User Rank: Ninja
2/20/2019 | 7:56:49 AM
Re: When, not if
Agree - when departments and C-Suite recognize that staffing and resources are primary to proper defense, THEN the stress factor will drop.  Until then we are dealing with sophisticated attacks using Stone Knives and Bearskins (as Spock said so long ago). 
JordanS229
JordanS229,
User Rank: Author
2/19/2019 | 11:02:23 AM
When, not if
I think most CISOs are very well aware that data breaches are a matter of when, not if. Even the largest and best-resourced organizations have fallen victim to data breaches in the past. Furthermore, securing an organization against zero-days is a non-starter if you're the organization being targeted by the new exploit. CISOs have an understandably stressful management role which is reflective of the ever increasing prevalence of cyberattacks and under-resourced security teams. Reduced CISO stress will happen when organizations make information security a priority and provide security teams with the resources required to protect their information and assets. 
REISEN1955
REISEN1955,
User Rank: Ninja
2/15/2019 | 1:34:34 PM
Stress
It is a huge factor.  I dealt with it badly, for my time in cyber department, used to swing by a local pub 3 times a week for 2 drinks to take the edge off the day.  Ok, just 2 - well, one afternoon had a shot with an army veteran from the MidEast and that just enough to send me and my car into a street sign about 1/10 from home - totalled the car given age.  I decided that this stress problem was not managed the best way LOL.  10 months ago sober and joined a local A.A. group for support.  Social drinker by all accounts, but i don't drink anymore and ability to manage stress has FAR improved!!!    Attitude at work and home is better and healthier plus I save a ton of money along the way.  So WATCH OUT on stress ----- it's a killer in many ways.    (Replaced having 2 drinks with building 52" model battleship- far more pleasant and looks great on the shelf.) 

17% more are resorting to medication of alcohol --- NO KIDDING!!!!!


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1142
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
CVE-2023-1143
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
CVE-2023-1144
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
CVE-2023-1145
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
CVE-2023-1655
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.