Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Former Equifax CIO Sentenced to Prison for Insider Trading
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
User Rank: Ninja
6/29/2019 | 4:17:25 PM
Re: Acting in ones own self-interest vs. ethically being hit by the bus
Acting in ones own self-interest vs. ethically being hit by the bus I think they are different things. One you are trying to gain at the expense of other expenses, the other you are testing to save yourself without hurting others.
User Rank: Ninja
6/29/2019 | 4:14:47 PM
Re: Closing statement
So the real issue again is that Equifax blew the game totally from top to bottom. That makes sense, however insider trading is not about hacking.
User Rank: Ninja
6/29/2019 | 4:12:58 PM
Insider trading
So he is going to prison for insider trading, nothing to do with hacking. Who is responsible on that?
User Rank: Ninja
6/28/2019 | 11:50:15 PM
Re: Closing statement
Yep, it is already shot, anyone remember the "Mortgage Crisis" or "Enron" where people lost millions of dollars and no one from these finaincial institutions got arrested. I mean the list the goes on. At this point I think we need to look into "Bitcoin", wait, with the data mining and thefts from this practice, it is hard to trust anything or anyone.

I have to refer to the words from Gary Coleman and "Different Strokes", when individuals are trying to sell you something, he says:Gary Coleman from Different Strokes

User Rank: Apprentice
6/28/2019 | 2:14:52 PM
Re: Acting in ones own self-interest vs. ethically being hit by the bus
This may be a cliché, but how much is your integrity worth?

Our actions when no one is watching speaks volumes to our actions when under pressure.  In this case, the value of his stocks would have gone from $900k ish to $700k ish...  yes, he'd have lost half of his profit gained from the sale;  


If he had lost that ~$200k, then later, he'd still be able to work in his profession making his current salary or more.  I doubt very much that he will ever get a C level job (or any level job) in Information Security again.  

The Air Force core Values are: Integrity First, Service Before Self, & Excellence in all we do.  Those core values have made me successful in the civilian world too.  
User Rank: Ninja
6/28/2019 | 10:28:46 AM
Acting in ones own self-interest vs. ethically being hit by the bus
This is a topic that from an outside perspective seems pretty clear cut. However, playing devils advocate I always struggle to logically justify the outcome. Again put yourself in their shoes for a moment. I understand that this individual based on their standing was probably well off but lets say for a moment that similar to a Madoff (long term Ponzi operator) client they had most of their assets wrapped up in Equifax stock. 

If I came from the future and told you that if you didn't move from where you were standing you'd be hit by a bus would you move? I'd say overwhelmingly the answer would be yes. You may say this is not an apples to apples comparison but if you were a person that had their assets wrapped up in a certain stock and you knew that you would lose your life savings and was provided information that could save you, it seems pragmatically that not dumping those stock would be illogical considering it would financially cripple you. 

****Again, just trying to put myself in someone elses shoes here and to date have not been in this boat. I just think its an interesting premise.***
User Rank: Ninja
6/28/2019 | 10:12:38 AM
Closing statement
Otherwise public trust in the stock market will erode.  Oh REALLY?   That is already mostly shot to pieces based upon a ton of other horrific stock manipulation tales - anyone remember a fellow named Madoff???   So the real issue again is that Equifax blew the game totally from top to bottom.  And as my 4 year old grand-daughter often says " And THAT'S THAT."
<<   <   Page 2 / 2

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Developing and Testing an Effective Breach Response Plan
Whether or not a data breach is a disaster for the organization depends on the security team's response and that is based on how the team developed a breach response plan beforehand and if it was thoroughly tested. Inside this report, experts share how to: -understand the technical environment, -determine what types of incidents would trigger the plan, -know which stakeholders need to be notified and how to do so, -develop steps to contain the breach, collect evidence, and initiate recovery.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-12-05
Missing authorization vulnerability exists in Kyocera Document Solutions MFPs and printers, which may allow a network-adjacent attacker to alter the product settings without authentication by sending a specially crafted request. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASK...
PUBLISHED: 2022-12-05
Stored cross-site scripting vulnerability in Kyocera Document Solutions MFPs and printers allows a remote authenticated attacker with an administrative privilege to inject arbitrary script. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKa...
PUBLISHED: 2022-12-05
OS command injection vulnerability in Nako3edit, editor component of nadesiko3 (PC Version) v3.3.74 and earlier allows a remote attacker to obtain appkey of the product and execute an arbitrary OS command on the product.
PUBLISHED: 2022-12-05
Plaintext storage of a password vulnerability exists in +F FS040U software versions v2.3.4 and earlier, which may allow an attacker to obtain the login password of +F FS040U and log in to the management console.
PUBLISHED: 2022-12-05
Cross-site request forgery (CSRF) vulnerability in +F FS040U software versions v2.3.4 and earlier, +F FS020W software versions v4.0.0 and earlier, +F FS030W software versions v3.3.5 and earlier, and +F FS040W software versions v1.4.1 and earlier allows an adjacent attacker to hijack the authenticati...