Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Tidying Expert Marie Kondo: Cybersecurity Guru?
Newest First  |  Oldest First  |  Threaded View
michaelmaloney
50%
50%
michaelmaloney,
User Rank: Apprentice
4/9/2019 | 3:54:54 AM
Get up and get at it
What one really needs in order to sit down and actually get your stuff in order, is to actually sit down and get your stuff in order. I don't deny that Marie Kondo has got a good system for getting things started though. It's nice to have a little bit of instruction and direction so that you know how to start with the big pile of mess. But at the end of the day, there's no easy fix or cure to the situation if you don't do something about it all!
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/30/2019 | 2:39:38 PM
Re: The Intrinsic Battle with Data Hygiene
THEN those lovely huge notes files had real valiue!!!!! That makes sense. Sometime we could not really re-generate data we need.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/30/2019 | 2:38:18 PM
Re: The Intrinsic Battle with Data Hygiene
I would call it STORAGE worthy. Data per se may get old but it should be retained offsite and on good media. That makes sense. It should also be protected. Sometimes offsite may pose additional risks.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/30/2019 | 2:36:40 PM
Re: The Intrinsic Battle with Data Hygiene
What companies need to do is get a true understanding of their data - what they have, where it lives, who has access, how it is being interacted with (data hygiene). Good strategy as long as you keep the data secured.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/30/2019 | 2:35:30 PM
Re: The Intrinsic Battle with Data Hygiene
However, many of them talk about keeping data for "what-if" scenarios or say that "nothing ever really happens with that useless data.This is the dilemma. We need data for analytics, but keeping the data in our environment carries a risk to us.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/30/2019 | 2:33:10 PM
Data
"Holding on to data too long can be a liability, and getting rid of it too quickly can be a liability, This really makes sense. If you do not have the data nobody would ask for it.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
3/29/2019 | 2:17:33 PM
Re: The Intrinsic Battle with Data Hygiene
Delete worthy sounds like an actionable item right now --- I would call it STORAGE worthy.  Data per se may get old but it should be retained offsite and on good media.  This costs next to nothing really and is a good hedge.  YES you may never need it but if you keep it free of open office space per se, it is not visible clutter-  Inventory and note the lot of it and stuff it away secure.  I used to counsel against Lotus Notes email file having too much data clutter and too large.  That was a battle UNTIL A certain day in September 2001 when my datacenter crashed 103 floors to the ground along with the south tower.  THEN those lovely huge notes files had real valiue!!!!!  I never wanted to restrict any file size ever again.  Clutter can be good. 
The Governance Guru
100%
0%
The Governance Guru,
User Rank: Strategist
3/28/2019 | 4:11:43 PM
The Intrinsic Battle with Data Hygiene
There are many great responses to Curtis' reference of Marie Kondo's method being applied to tidying up data. However, many of them talk about keeping data for "what-if" scenarios or say that "nothing ever really happens with that useless data." This is where I have a fundamentally different view. I never really look at any data as "useless", no matter what it is. Marketing material from a campaign 10 years ago may seem delete-worthy, but what if your team decided to run a marketing campaign around the 10 year challenge and you needed to compare those materials with a present-day campaign. What companies need to do is get a true understanding of their data - what they have, where it lives, who has access, how it is being interacted with (data hygiene). From there they can make much more educated/strategic decisions about where data needs to go - archive, backup, active, etc. Modern day governance solutions are a great way to get this ball rolling. Thanks to the proliferation of the cloud, governance solutions can be deployed quickly, are efficient, and cost-effective. IMO this is a much better course of action than to ever simply purge old, "inactive" data.


When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3113
PUBLISHED: 2021-01-17
Netsia SEBA+ through 0.16.1 build 70-e669dcd7 allows remote attackers to discover session cookies via a direct /session/list/allActiveSession request. For example, the attacker can discover the admin's cookie if the admin account happens to be logged in when the allActiveSession request occurs, and ...
CVE-2020-25533
PUBLISHED: 2021-01-15
An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct ...
CVE-2021-3162
PUBLISHED: 2021-01-15
Docker Desktop Community before 2.5.0.0 on macOS mishandles certificate checking, leading to local privilege escalation.
CVE-2021-21242
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authentication or a...
CVE-2021-21245
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, AttachmentUploadServlet also saves user controlled data (`request.getInputStream()`) to a user specified location (`request.getHeader("File-Name")`). This issue may lead to arbitrary file upload which can be used to u...