Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Expert Commentary On 30,000 Macs Infected With New...
Response Comment: Half Of Businesses Suffered A Cyber-Attack...
Expert Reaction On Google’s Password Checkup Feature Expanding...
Expert Comments On Secondary Extortion Attacks
Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing
Experts Reacted On Retail Giant Kroger Data Breach
Security A Glaring Issue For Chatroom App Clubhouse...
Parents Alerted To Nurserycam Security Breach – Experts...
How Can Consumers Better Protect Their Finances From...
Experts Insight On ‘Silent Stealing’ New Cyber Crime...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Carolyn Crandall
Chief Deception Officerfeature_status*/ ?>
Attivo Networks

Comments Dotted : 3
January 28, 2020

Cybersecurity Experts Weigh In On Jan. 28 Data Privacy Day

Protecting data privacy should be a board level priority for all organizations.
Protecting data privacy should be a board level priority for all organizations. Understanding both legal and operational requirements should not be passed over quickly as the devil is in the details on these matters. Companies should post privacy statements and consumers should read them to determine if the company’s policies are sufficient to protect their information and rights. Noting, this goes well beyond just reading a cookies banner. If these statements are not clear or complete, it.....Read More
Protecting data privacy should be a board level priority for all organizations. Understanding both legal and operational requirements should not be passed over quickly as the devil is in the details on these matters. Companies should post privacy statements and consumers should read them to determine if the company’s policies are sufficient to protect their information and rights. Noting, this goes well beyond just reading a cookies banner. If these statements are not clear or complete, it may be wise to seek out suppliers that maintain proper levels of security and rights administration.  Read Less
Like(1)  (0)

Linkedin Message

@Carolyn Crandall, Chief Deception Officer, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Protecting data privacy should be a board level priority for all organizations. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/cybersecurity-experts-weigh-in-on-jan-28-data-privacy-day

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Carolyn Crandall, Chief Deception Officer, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Protecting data privacy should be a board level priority for all organizations. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/cybersecurity-experts-weigh-in-on-jan-28-data-privacy-day

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
December 01, 2019

2020 Cybersecurity Landscape: 100+ Experts’ Predictions

Significant issues will surface around the lack of adequate detection of threats that have bypassed prevention defences.
2020 will be the year of API connectivity. Driven by the need for on-demand services and automation, there will be a surge in requirements for the use of technology that interconnects through APIs. Vendors that don’t interconnect may find themselves passed over for selection in favour of others with API access that add value to existing solutions. DevOps capabilities will continue to increase their significance in moving projects to products, with only 9% of technology professionals.....Read More
2020 will be the year of API connectivity. Driven by the need for on-demand services and automation, there will be a surge in requirements for the use of technology that interconnects through APIs. Vendors that don’t interconnect may find themselves passed over for selection in favour of others with API access that add value to existing solutions. DevOps capabilities will continue to increase their significance in moving projects to products, with only 9% of technology professionals responsible for the development and quality of web and mobile applications stating that they had not adopted DevOps and had no plans to do so. This will drive an increased focus on DevSecOps and how opensource software is managed within projects. We will begin to see more examples of the theft of encrypted data as cybercriminals begin to stockpile information in preparation for the benefits of quantum-computing where traditional encryption will become easy to crack. The advances in quantum computing that Google has recently published bring this possibility closer to becoming reality. Significant issues will surface around the lack of adequate detection of threats that have bypassed prevention defences. To combat this, in 2020, we will see the addition of deception technology into security framework guidelines, compliance requirements, and as a factor in cyber insurance premiums and coverage.  Read Less
Like(0)  (0)

Linkedin Message

@Carolyn Crandall, Chief Deception Officer, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Significant issues will surface around the lack of adequate detection of threats that have bypassed prevention defences...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/2020-cybersecurity-predictions-experts-comments

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Carolyn Crandall, Chief Deception Officer, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Significant issues will surface around the lack of adequate detection of threats that have bypassed prevention defences...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/2020-cybersecurity-predictions-experts-comments

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
September 26, 2019

Comments: Why Are SMEs Facing Rising Cybercrime?

A quiet but silent set of landmines within a network, deception technology should be on every SME’s checklist.
Why cyber criminals are targeting SMEs? Most cybercriminals prey on human error, manipulation, and the path of least resistance. A SME often has far less resources and a lower level of talent than an enterprise, making them prime targets for faster and less complicated attacks. With some basic research on an SME’s industry, their applications, and processes, an attacker can build an attack that they can “spray” across that industry. It is not necessarily a complex attack, nor are.....Read More
Why cyber criminals are targeting SMEs? Most cybercriminals prey on human error, manipulation, and the path of least resistance. A SME often has far less resources and a lower level of talent than an enterprise, making them prime targets for faster and less complicated attacks. With some basic research on an SME’s industry, their applications, and processes, an attacker can build an attack that they can “spray” across that industry. It is not necessarily a complex attack, nor are their aspirations for the largest of payouts. The ROI is simply based on being able to target like types of companies and their weaknesses and to be able to easily rinse and repeat their attack. Ransomware is also commonly a SME attack of convenience. The payout is immediate, and all too often paid, as the alternatives could be so severe that the business may not be able to recover. It provides new definition to application of “Account Based Marketing” strategies. What are the other cyber threats that SMEs face and the steps they can take to stay one step ahead of attackers? Although it is unlikely that an attacker would apply an APT to an SME for minimal likely payout, they will have endless opportunities to repackage exploit kits for mass malware or remote access tool (RAT) distribution. Sooner or later, a chink in the armor will be found and the attacker is in. Once the attacker is in, many SMEs have simply not made adequate investment in in-network detection tools, leaving the attacker with the freedom to roam throughout the network at their own pace in order to complete their attack. SME’s should not succumb to being a sitting duck and react only once the attacker has launched a successful attack. The best defence for staying one step ahead of an attacker is to add in the ability to detect threats that have bypassed their anti-virus and firewall perimeters both quickly and accurately. Gartner, Inc. recently highlighted deception technology as a critical security control for SMEs at their recent Security and Risk Summit. They emphasized the technology because it is extremely accurate, easy to manage, and does not require highly skilled operators, which has been the Achilles heel of other forms of detection technology. A quiet but silent set of landmines within a network, deception technology should be on every SME’s checklist to ensure that attacker’s do not go undetected or responded too.  Read Less
Like(1)  (0)

Linkedin Message

@Carolyn Crandall, Chief Deception Officer, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"A quiet but silent set of landmines within a network, deception technology should be on every SME’s checklist...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/comments-why-are-smes-facing-rising-cybercrime

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Carolyn Crandall, Chief Deception Officer, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"A quiet but silent set of landmines within a network, deception technology should be on every SME’s checklist...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/comments-why-are-smes-facing-rising-cybercrime

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

David Kennefick, Solutions Architect, Edgescan

"Mac users are advised to update their operating systems and install an antivirus. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Lewis Jones, Threat Intelligence Analyst, Talion

"The Silver Sparrow malware comes with a mechanism to completely remove itself, which is usually utilised for high-stealth operations. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Amit Sharma, Security Engineer , Synopsys Software Integrity Group

"One of the most substantial security challenges organisations currently face is how to manage their legacy products. "

Experts Reacted On Retail Giant Kroger Data Breach

Chris Ross, SVP, Barracuda Networks

"Combatting the issue from a business perspective requires an overhaul of cybersecurity policy. "

Response Comment: Half Of Businesses Suffered A Cyber-Attack In Last 12 Months

Jake Moore, Cybersecurity Specialist, ESET

"Password checking tools are an essential part of account security. "

Expert Reaction On Google’s Password Checkup Feature Expanding For Android Users

Satnam Narang, Senior Research Engineer, Tenable

"Despite the exclusivity of Clubhouse being available on an invite-only basis and limited to iOS devices. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Simon Mullis, Director of Technical Account Management, Tanium

"Simple steps can be put in place by any company that experiences a data breach to ensure it doesn’t happen again. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Stephen Kapp, CTO and Founder, Cortex Insight

"Organisations would be well-advised to embrace secure-by-design practices to avoid similar incidents. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Jonathan Reiber, Senior Director of Cybersecurity Strategy and Policy, AttackIQ

"ATT&CK provides an inventory for adversary tactics, techniques, and procedures that any organization can adopt. "

Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing

Jake Moore, Cybersecurity Specialist, ESET

"Similar to when Zoom usage went through the roof, Clubhouse is experiencing a huge uptake and learning as it goes. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Nick Emanuel, Senior Director of Product , Webroot

"Clubhouse is currently riding a wave of popularity. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Greg Foss, Senior Cybersecurity Strategist, VMware Carbon Black

"For opportunistic cybercriminals, secondary extortion is the name of the game. "

Expert Comments On Secondary Extortion Attacks

David Stewart, CEO, CriticalBlue - Approov

"You can't keep scripts and bots out of your business. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Saryu Nayyar, CEO, Gurucul

"Unfortunately, cybersecurity is an afterthought for many developers. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Martin Jartelius, CSO , Outpost24

"It’s been a month from becoming aware of the breach to this wider disclosure, but it seems it’s been hard to establish who has been affected at all. "

Experts Reacted On Retail Giant Kroger Data Breach

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel