Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Tidying Expert Marie Kondo: Cybersecurity Guru?
Newest First  |  Oldest First  |  Threaded View
michaelmaloney
50%
50%
michaelmaloney,
User Rank: Apprentice
4/9/2019 | 3:54:54 AM
Get up and get at it
What one really needs in order to sit down and actually get your stuff in order, is to actually sit down and get your stuff in order. I don't deny that Marie Kondo has got a good system for getting things started though. It's nice to have a little bit of instruction and direction so that you know how to start with the big pile of mess. But at the end of the day, there's no easy fix or cure to the situation if you don't do something about it all!
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/30/2019 | 2:39:38 PM
Re: The Intrinsic Battle with Data Hygiene
THEN those lovely huge notes files had real valiue!!!!! That makes sense. Sometime we could not really re-generate data we need.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/30/2019 | 2:38:18 PM
Re: The Intrinsic Battle with Data Hygiene
I would call it STORAGE worthy. Data per se may get old but it should be retained offsite and on good media. That makes sense. It should also be protected. Sometimes offsite may pose additional risks.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/30/2019 | 2:36:40 PM
Re: The Intrinsic Battle with Data Hygiene
What companies need to do is get a true understanding of their data - what they have, where it lives, who has access, how it is being interacted with (data hygiene). Good strategy as long as you keep the data secured.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/30/2019 | 2:35:30 PM
Re: The Intrinsic Battle with Data Hygiene
However, many of them talk about keeping data for "what-if" scenarios or say that "nothing ever really happens with that useless data.This is the dilemma. We need data for analytics, but keeping the data in our environment carries a risk to us.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
3/30/2019 | 2:33:10 PM
Data
"Holding on to data too long can be a liability, and getting rid of it too quickly can be a liability, This really makes sense. If you do not have the data nobody would ask for it.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
3/29/2019 | 2:17:33 PM
Re: The Intrinsic Battle with Data Hygiene
Delete worthy sounds like an actionable item right now --- I would call it STORAGE worthy.  Data per se may get old but it should be retained offsite and on good media.  This costs next to nothing really and is a good hedge.  YES you may never need it but if you keep it free of open office space per se, it is not visible clutter-  Inventory and note the lot of it and stuff it away secure.  I used to counsel against Lotus Notes email file having too much data clutter and too large.  That was a battle UNTIL A certain day in September 2001 when my datacenter crashed 103 floors to the ground along with the south tower.  THEN those lovely huge notes files had real valiue!!!!!  I never wanted to restrict any file size ever again.  Clutter can be good. 
The Governance Guru
100%
0%
The Governance Guru,
User Rank: Strategist
3/28/2019 | 4:11:43 PM
The Intrinsic Battle with Data Hygiene
There are many great responses to Curtis' reference of Marie Kondo's method being applied to tidying up data. However, many of them talk about keeping data for "what-if" scenarios or say that "nothing ever really happens with that useless data." This is where I have a fundamentally different view. I never really look at any data as "useless", no matter what it is. Marketing material from a campaign 10 years ago may seem delete-worthy, but what if your team decided to run a marketing campaign around the 10 year challenge and you needed to compare those materials with a present-day campaign. What companies need to do is get a true understanding of their data - what they have, where it lives, who has access, how it is being interacted with (data hygiene). From there they can make much more educated/strategic decisions about where data needs to go - archive, backup, active, etc. Modern day governance solutions are a great way to get this ball rolling. Thanks to the proliferation of the cloud, governance solutions can be deployed quickly, are efficient, and cost-effective. IMO this is a much better course of action than to ever simply purge old, "inactive" data.


News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: "Thank goodness that he's only asking about a LOGIC probe..."
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31607
PUBLISHED: 2021-04-23
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function...
CVE-2021-31597
PUBLISHED: 2021-04-23
The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected.
CVE-2021-2296
PUBLISHED: 2021-04-22
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromi...
CVE-2021-2297
PUBLISHED: 2021-04-22
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.20. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromi...
CVE-2021-2298
PUBLISHED: 2021-04-22
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.23 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attac...