Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Expert Commentary On 30,000 Macs Infected With New...
Response Comment: Half Of Businesses Suffered A Cyber-Attack...
Expert Reaction On Google’s Password Checkup Feature Expanding...
Expert Comments On Secondary Extortion Attacks
Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing
Experts Reacted On Retail Giant Kroger Data Breach
Security A Glaring Issue For Chatroom App Clubhouse...
Parents Alerted To Nurserycam Security Breach – Experts...
How Can Consumers Better Protect Their Finances From...
Experts Insight On ‘Silent Stealing’ New Cyber Crime...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Todd Peterson
IAM evangelistfeature_status*/ ?>
One Identity

Comments Dotted : 5
July 16, 2020

Experts Insight On Major US Twitter Accounts Hacked in Bitcoin Scam

Touching such high profile Twitter accounts should be tied to an approval process.
Providing great customer support for high profile customers means IT administrators need privileged access to their accounts - to help reset passwords and to help clear up after an account takeover. However, with this great power comes great responsibility - and it takes only one bad admin to create global chaos by abusing their privileged access. Touching such high profile Twitter accounts should be tied to an approval process, where a single person can not act alone, without a detailed.....Read More
Providing great customer support for high profile customers means IT administrators need privileged access to their accounts - to help reset passwords and to help clear up after an account takeover. However, with this great power comes great responsibility - and it takes only one bad admin to create global chaos by abusing their privileged access. Touching such high profile Twitter accounts should be tied to an approval process, where a single person can not act alone, without a detailed explanation and an approval by a superior. A modern record-and-review monitoring system would have also stopped the lone actor in their tracks by flagging the highly unusual activity and helping to retrace and undo their steps.  Read Less
Like(0)  (0)

Linkedin Message

@Todd Peterson, IAM evangelist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Touching such high profile Twitter accounts should be tied to an approval process...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-major-us-twitter-accounts-hacked-in-bitcoin-scam

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Todd Peterson, IAM evangelist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Touching such high profile Twitter accounts should be tied to an approval process...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-major-us-twitter-accounts-hacked-in-bitcoin-scam

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
October 22, 2019

COMMENT: Equifax Used Default ‘Admin’ User Name And Password To Secure Hacked Portal

Organisations should not treat database security any differently from other security.
This simply reinforces the notion that good Privileged Access Management practices are the best defense against bad actors. Had the Equifax breach been the result of an extremely smart and motivated hacker doing something amazing to get the data, that would have been one thing. But since it’s the case of the target ignoring the bare-minimum of best practices and paying a significant price for the oversight, what happened is alarming. In the case of Equifax, simply doing what’s right (which.....Read More
This simply reinforces the notion that good Privileged Access Management practices are the best defense against bad actors. Had the Equifax breach been the result of an extremely smart and motivated hacker doing something amazing to get the data, that would have been one thing. But since it’s the case of the target ignoring the bare-minimum of best practices and paying a significant price for the oversight, what happened is alarming. In the case of Equifax, simply doing what’s right (which would have taken about 1 minute to implement) would have saved the company from a world of trouble. Organisations should not treat database security any differently from other security. For instance, they should avoid sharing the admin password. In circumstances when the admin password is issued, they need to make sure they know who it was issued to, for what purpose, and that this has been documented. When employees have admin access, their actions need to be monitored. Finally, organisations must implement analytics to determine if and when someone may have gained admin access without their knowledge or permission. To maintain these protocols, organisations should implement a comprehensive and well-designed PAM program and ensure that it includes databases and DBAs along with all other privileged users and admin accounts across all systems.  Read Less
Like(1)  (0)

Linkedin Message

@Todd Peterson, IAM evangelist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Organisations should not treat database security any differently from other security. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/comment-equifax-used-default-admin-user-name-and-password-to-secure-hacked-portal

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Todd Peterson, IAM evangelist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Organisations should not treat database security any differently from other security. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/comment-equifax-used-default-admin-user-name-and-password-to-secure-hacked-portal

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
October 03, 2019

‘Shocking In Its Sophistication’: How Hackers Targeted ANU Student Data – Experts Comments

This is particularly in the case of higher education institution which are at risk as a result of maintaining old computers.
In 2018 it took just 16 minutes for the first click to occur on a phishing email. As such, it is worrying that in 2019, that timeframe has not lengthened at all. Whilst advanced privileged access management systems and two factor authentication may be used correctly by organisations, newly developed infected emails can still pass the defence line and enter a network. With this in mind, it is important that identity and access management systems and processes are current, with the fast moving.....Read More
In 2018 it took just 16 minutes for the first click to occur on a phishing email. As such, it is worrying that in 2019, that timeframe has not lengthened at all. Whilst advanced privileged access management systems and two factor authentication may be used correctly by organisations, newly developed infected emails can still pass the defence line and enter a network. With this in mind, it is important that identity and access management systems and processes are current, with the fast moving nature of these hacks, it is vital organisations keep up. This is particularly in the case of higher education institution which are at risk as a result of maintaining old computers and old systems that house significant amounts of valuable personal data which can be sold on the black market.  Read Less
Like(1)  (0)

Linkedin Message

@Todd Peterson, IAM evangelist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"This is particularly in the case of higher education institution which are at risk as a result of maintaining old computers...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/shocking-in-its-sophistication-how-hackers-targeted-anu-student-data-experts-comments

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Todd Peterson, IAM evangelist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"This is particularly in the case of higher education institution which are at risk as a result of maintaining old computers...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/shocking-in-its-sophistication-how-hackers-targeted-anu-student-data-experts-comments

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
September 16, 2019

Experts Comments: Personal Records Of Most Of Ecuador’s Population Leaked

Server misconfigurations are on the news every week, and in some cases lead to massive data leaks.
This case further illustrates how organisations of all kinds are still getting security wrong because generally, security is a hassle to their business. No one likes entering user IDs and passwords and even fewer like entering the second factor of authentication that should be used by all organisations. Server misconfigurations are on the news every week, and in some cases lead to massive data leaks, such as the one suffered by the Ecuadorian civil registry. However, there are options to make.....Read More
This case further illustrates how organisations of all kinds are still getting security wrong because generally, security is a hassle to their business. No one likes entering user IDs and passwords and even fewer like entering the second factor of authentication that should be used by all organisations. Server misconfigurations are on the news every week, and in some cases lead to massive data leaks, such as the one suffered by the Ecuadorian civil registry. However, there are options to make the first and second factor of authentication less obtrusive so that users are more prone to do the right thing. Practices such as adapting the requirement based on risk, delegating permissions to prevent sharing of superuser credentials, and implementing multifactor authentication in a manner that is user friendly (such as via an app on the user’s phone) all improve security and minimise disruption.  Read Less
Like(0)  (0)

Linkedin Message

@Todd Peterson, IAM evangelist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Server misconfigurations are on the news every week, and in some cases lead to massive data leaks...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-comments-personal-records-of-most-of-ecuadors-population-leaked

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Todd Peterson, IAM evangelist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Server misconfigurations are on the news every week, and in some cases lead to massive data leaks...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-comments-personal-records-of-most-of-ecuadors-population-leaked

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
August 29, 2019

Check Point Software Patches Privilege Escalation Vulnerability

Long term, you can combine your PSM with Privileged Account Analytics which detect anomalies in the privileged users' behaviour.
Advanced Privileged Access Management solutions can help safeguard an organisation’s IT environment by protecting and securing backend resources which are accessed by administrators, whose credentials can be used to escalate privileges. Of course, patching this vulnerability is key to mitigating the problem. In addition, by using Privileged Session Management (PSM) to strategically limit command or application execution to only those necessary for given tasks or more tactically block.....Read More
Advanced Privileged Access Management solutions can help safeguard an organisation’s IT environment by protecting and securing backend resources which are accessed by administrators, whose credentials can be used to escalate privileges. Of course, patching this vulnerability is key to mitigating the problem. In addition, by using Privileged Session Management (PSM) to strategically limit command or application execution to only those necessary for given tasks or more tactically block critical commands and channels on the fly, organisations can minimise their risks of attackers gaining access. Long term, you can combine your PSM with Privileged Account Analytics which detect anomalies in the privileged users' behaviour. This helps to not only provide a baseline for what constitutes ‘normal’ activity, but also allows for visibility and action against unexpected deviations from the baseline.  Read Less
Like(4)  (0)

Linkedin Message

@Todd Peterson, IAM evangelist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Long term, you can combine your PSM with Privileged Account Analytics which detect anomalies in the privileged users\' behaviour. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/check-point-software-patches-privilege-escalation-vulnerability

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Todd Peterson, IAM evangelist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Long term, you can combine your PSM with Privileged Account Analytics which detect anomalies in the privileged users\' behaviour. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/check-point-software-patches-privilege-escalation-vulnerability

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

David Kennefick, Solutions Architect, Edgescan

"Mac users are advised to update their operating systems and install an antivirus. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Lewis Jones, Threat Intelligence Analyst, Talion

"The Silver Sparrow malware comes with a mechanism to completely remove itself, which is usually utilised for high-stealth operations. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Amit Sharma, Security Engineer , Synopsys Software Integrity Group

"One of the most substantial security challenges organisations currently face is how to manage their legacy products. "

Experts Reacted On Retail Giant Kroger Data Breach

Chris Ross, SVP, Barracuda Networks

"Combatting the issue from a business perspective requires an overhaul of cybersecurity policy. "

Response Comment: Half Of Businesses Suffered A Cyber-Attack In Last 12 Months

Jake Moore, Cybersecurity Specialist, ESET

"Password checking tools are an essential part of account security. "

Expert Reaction On Google’s Password Checkup Feature Expanding For Android Users

Satnam Narang, Senior Research Engineer, Tenable

"Despite the exclusivity of Clubhouse being available on an invite-only basis and limited to iOS devices. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Simon Mullis, Director of Technical Account Management, Tanium

"Simple steps can be put in place by any company that experiences a data breach to ensure it doesn’t happen again. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Stephen Kapp, CTO and Founder, Cortex Insight

"Organisations would be well-advised to embrace secure-by-design practices to avoid similar incidents. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Jonathan Reiber, Senior Director of Cybersecurity Strategy and Policy, AttackIQ

"ATT&CK provides an inventory for adversary tactics, techniques, and procedures that any organization can adopt. "

Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing

Jake Moore, Cybersecurity Specialist, ESET

"Similar to when Zoom usage went through the roof, Clubhouse is experiencing a huge uptake and learning as it goes. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Nick Emanuel, Senior Director of Product , Webroot

"Clubhouse is currently riding a wave of popularity. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Greg Foss, Senior Cybersecurity Strategist, VMware Carbon Black

"For opportunistic cybercriminals, secondary extortion is the name of the game. "

Expert Comments On Secondary Extortion Attacks

David Stewart, CEO, CriticalBlue - Approov

"You can't keep scripts and bots out of your business. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Saryu Nayyar, CEO, Gurucul

"Unfortunately, cybersecurity is an afterthought for many developers. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Martin Jartelius, CSO , Outpost24

"It’s been a month from becoming aware of the breach to this wider disclosure, but it seems it’s been hard to establish who has been affected at all. "

Experts Reacted On Retail Giant Kroger Data Breach

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel