Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

How to Avoid Becoming the Next Riviera Beach
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
6/29/2019 | 9:16:56 PM
Great points, I do agree
Quote - An easy first step is to become part your industry threat sharing community, which in the case of local governments is the Multi-State Information Sharing & Analysis Center (MS-ISAC) and the Elections Infrastructure ISAC
  • I did not know this existed, very good. I will be reviewing this information found on the site, good to know.
It's important to note that moving to the cloud does not shift all of the security burden to the cloud providers. Security in the cloud is a shared model, so while infrastructure security is handled by the provider, it's still your responsibility to secure your applications and data.
  •  That's not entirely true, it depends on the model you are using and the contract agreement. If you are using a SaaS model (i.e. O365), then it is up to the vendor to secure the infrastructure and the data. If it is a IaaS, then yes you are correct, it is your responsibility to secure apps/data.
 There is no excuse for not backing up your data, and it's the only 100% effective mitigator against ransomware risk.
  •  Also, one that maybe missing is implementing a DR strategy and design methodology when it comes to data recovery, this can be set to 2hr RPO from the time of the incident to bring the data back to its normal state

But for the most part, this write-up covered a number of challenges most organizations will have to implement in order to have an effective recovery strategy.

Todd S
Enterprise Architect
ITOTS Networks, LLC

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-07-04
Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.19.
PUBLISHED: 2022-07-04
Buffer Over-read in GitHub repository hpjansson/chafa prior to 1.10.3.
PUBLISHED: 2022-07-04
Operation restriction bypass vulnerability in Link of Cybozu Garoon 4.0.0 to 5.5.1 allows a remote authenticated attacker to alter the data of Link.
PUBLISHED: 2022-07-04
Browse restriction bypass and operation restriction bypass vulnerability in Cabinet of Cybozu Garoon 4.0.0 to 5.5.1 allows a remote authenticated attacker to alter and/or obtain the data of Cabinet.
PUBLISHED: 2022-07-04
Cross-site scripting vulnerability in Organization's Information of Cybozu Garoon 4.10.2 to 5.5.1 allows a remote attacker to execute an arbitrary script on the logged-in user's web browser.