Vulnerabilities / Threats

6/21/2017
11:39 AM
50%
50%

Consumer Businesses Have False Confidence in their Security: Deloitte

Consumer business executives are confident in their ability to respond to cyberattacks but fail to document and test response plans.

Consumer companies may be operating with false confidence in their cybersecurity posture. A new study from Deloitte polled more than 400 CIOs, CISOs, CTOs, and other security execs about cyber risk and response plans affecting customer trust, payments, executive engagement, human capital, and intellectual property.

Researchers discovered 76% of executives are highly confident in their ability to respond to a cyber incident; however, 82% have not documented or tested cyber response plans with business stakeholders within the past year. Less than half (46%) report their business has performed threat simulation on a semiannual basis.

Results indicate companies aren't prepared for the future of cybercrime. Only 30 to 40% percent of companies investing in platforms like analytics, cloud, connected products, and mobile payments have implemented mature programs to address the related risks.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Frank_Downs
50%
50%
Frank_Downs,
User Rank: Author
6/21/2017 | 11:58:04 AM
Surprising Statistics
Those statistics are very surprising.  Having such a high confidence level, but with few plans to prepare for an incident is a dangerous combination.
6 Ways Greed Has a Negative Effect on Cybersecurity
Joshua Goldfarb, Co-founder & Chief Product Officer, IDRRA ,  6/11/2018
Weaponizing IPv6 to Bypass IPv4 Security
John Anderson, Principal Security Consultant, Trustwave Spiderlabs,  6/12/2018
'Shift Left' & the Connected Car
Rohit Sethi, COO of Security Compass,  6/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12026
PUBLISHED: 2018-06-17
During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace key files or directories in the spawning communication directory with symlinks. This then could result in arbitrary reads and writes, which in tur...
CVE-2018-12027
PUBLISHED: 2018-06-17
An Insecure Permissions vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 causes information disclosure in the following situation: given a Passenger-spawned application process that reports that it listens on a certain Unix domain socket, if any of the parent directories of said ...
CVE-2018-12028
PUBLISHED: 2018-06-17
An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager. If the malicious application then generates an e...
CVE-2018-12029
PUBLISHED: 2018-06-17
A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but befor...
CVE-2018-12071
PUBLISHED: 2018-06-17
A Session Fixation issue exists in CodeIgniter before 3.1.9 because session.use_strict_mode in the Session Library was mishandled.