Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The New Security Architecture
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
Kim Davis
Kim Davis,
User Rank: Apprentice
11/20/2013 | 12:12:47 PM
Re: Compliance vs. security
I've been hearing healthcare IT professionals recently describing how they're torn between the need to release patient data to patients, security concerns, and compliance issues.  It's a minefield.
Susan Fogarty
Susan Fogarty,
User Rank: Apprentice
11/20/2013 | 11:51:42 AM
Re: Compliance vs. security
David, my interpretation was that the strict focus on compliance is taking away from organizations' ability to protect their most critical/sensitive resources, which Ed notes should be the goal. 

Another point I found really interesting was the statement that "cloud-based protections are minimal defenses against all of these threats because of the network visibility required to detect and mitigate them." I was surprised to hear that coming from AT&T. Is there no hope for network-operator-based security improvements to help screen out more of the threats?
David F. Carr
David F. Carr,
User Rank: Strategist
11/20/2013 | 10:08:05 AM
Compliance vs. security
I was left wondering by the statement about audit requirements focusing too much on compliance issues. Is that in conflict with the security imprerative for some reason? Or you just saying that security needs to be given an even higher priority?
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
11/20/2013 | 10:03:18 AM
Investment priorites
Ed, You paint a pretty sobering picture for IT security executives & the new paradigm you describe will clearly require a major shift in thinking. What are some suggestions on  how IT senior management and audit teams  should start to refocus protection their efforts?  Your point noting that "the most basic tenet of today's corporate audit involves testing controls to ensure 100 percent compliance with corporate policy" sounds to me like it wil l be to be a heavy lift.

 
<<   <   Page 2 / 2


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Improving Enterprise Cybersecurity With XDR
Enterprises are looking at eXtended Detection and Response technologies to improve their abilities to detect, and respond to, threats. While endpoint detection and response is not new to enterprise security, organizations have to improve network visibility, expand data collection and expand threat hunting capabilites if they want their XDR deployments to succeed. This issue of Tech Insights also includes: a market overview for XDR from Omdia, questions to ask before deploying XDR, and an XDR primer.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-32033
PUBLISHED: 2022-07-01
Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow via the function formSetVirtualSer.
CVE-2022-32034
PUBLISHED: 2022-07-01
Tenda M3 V1.0.0.12 was discovered to contain a stack overflow via the items parameter in the function formdelMasteraclist.
CVE-2022-32035
PUBLISHED: 2022-07-01
Tenda M3 V1.0.0.12 was discovered to contain a stack overflow via the function formMasterMng.
CVE-2022-32036
PUBLISHED: 2022-07-01
Tenda M3 V1.0.0.12 was discovered to contain multiple stack overflow vulnerabilities via the ssidList, storeName, and trademark parameters in the function formSetStoreWeb.
CVE-2022-32037
PUBLISHED: 2022-07-01
Tenda M3 V1.0.0.12 was discovered to contain a stack overflow via the function formSetAPCfg.