Perimeter

Richard Bejtlich Talks Business Security Strategy, US Security Policy

100%
0%

Richard Bejtlich, chief security strategist of FireEye, talks to senior editor Sara Peters at the Dark Reading News Desk at Black Hat about what should really be driving your security department's strategy. Plus he discusses law enforcement agencies' efforts to put backdoors in encryption solutions and how the government is responding to technology's improved abilities to provide attribution for cybercrime.

Comment  | 
Print  | 
Comments
Oldest First  |  Newest First  |  Threaded View
RogerB679
50%
50%
RogerB679,
User Rank: Apprentice
8/26/2015 | 12:32:32 PM
Security Strategy
I agree with Richard Bejtlich on the shifting views of collecting, storing and protecting data.  The traditional way of handling information is changing, but the policies/laws/and practices are lagging behind. On a side note, I remember talks with Richard as far back as 1999.  We where both in the AFCERT at the time developing tactics, techniques, and procedures for the myriad of emerging threats. I do remember a conversation in which we would see a time where business and security would merge to create an economic strategy that essentially would dictate the success or failure of a company.  I guess we have reached and passed that point on the cyber highway!
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
Why Enterprises Can't Ignore Third-Party IoT-Related Risks
Charlie Miller, Senior Vice President, The Santa Fe Group,  5/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11311
PUBLISHED: 2018-05-20
A hardcoded FTP username of myscada and password of Vikuk63 in 'myscadagate.exe' in mySCADA myPRO 7 allows remote attackers to access the FTP server on port 2121, and upload files or list directories, by entering these credentials.
CVE-2018-11319
PUBLISHED: 2018-05-20
Syntastic (aka vim-syntastic) through 3.9.0 does not properly handle searches for configuration files (it searches the current directory up to potentially the root). This improper handling might be exploited for arbitrary code execution via a malicious gcc plugin, if an attacker has write access to ...
CVE-2018-11242
PUBLISHED: 2018-05-20
An issue was discovered in the MakeMyTrip application 7.2.4 for Android. The databases (locally stored) are not encrypted and have cleartext that might lead to sensitive information disclosure, as demonstrated by data/com.makemytrip/databases and data/com.makemytrip/Cache SQLite database files.
CVE-2018-11315
PUBLISHED: 2018-05-20
The Local HTTP API in Radio Thermostat CT50 and CT80 1.04.84 and below products allows unauthorized access via a DNS rebinding attack. This can result in remote device temperature control, as demonstrated by a tstat t_heat request that accesses a device purchased in the Spring of 2018, and sets a ho...
CVE-2018-11239
PUBLISHED: 2018-05-19
An integer overflow in the _transfer function of a smart contract implementation for Hexagon (HXG), an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital assets by providing a _to argument in conjunction with a large _value argument, as exploited in the wild in ...