Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
ObliqueRAT Trojan Lurks On Compromised Websites – Experts...
Microsoft Multiple 0-Day Attack – Tenable Comment
Experts Reaction On Malaysia Airlines 9 Years Old...
IoT Security In The Spotlight, As Research Highlights...
Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber...
Expert Reaction On Solarwinds Blames Intern For Weak...
Expert Reaction On Go Is Becoming The Language...
Three Reasons The Security Industry Is Protecting The...
Experts On Google Voice Outage
Preparing For Tomorrow – Why Weathering The Initial...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Will LaSala
Director of Security Services, Security Evangelist feature_status*/ ?>
OneSpan

Comments Dotted : 3
July 10, 2020

Experts Insight On New Dark Web Audit Reveals 15 Billion Stolen Logins

Hackers have all the information they need to attack billions of users today.
We have been watching the number of stolen credentials rise for over 20 years now, we should not be surprised that we have finally eclipsed the 15 billion credentials number. Concerns are also heightened during a time when many people are still working remotely under lockdown, which presents a field day for hackers of all types, as digital customers are a prime target for cyber-attacks. Now more than ever, users should understand that using a single form of authentication such as a password or.....Read More
We have been watching the number of stolen credentials rise for over 20 years now, we should not be surprised that we have finally eclipsed the 15 billion credentials number. Concerns are also heightened during a time when many people are still working remotely under lockdown, which presents a field day for hackers of all types, as digital customers are a prime target for cyber-attacks. Now more than ever, users should understand that using a single form of authentication such as a password or SMS text or a knowledge-based question and answer, is open to compromise. The web and mobile applications as well as the platforms they run on have numerous holes and backdoors which allow hackers to easily attack using these credentials. Technologies such as multi-factor authentication can help protect the stolen credentials, while technologies such as application shielding can help protect the applications from being attacked. These technologies help strengthen security on the consumer side, but banks can help protect their customers as well by ensuring their risk analytics technologies are up to date and are checking real-time transactions across all applications and channels, looking for anomalies and patterns that are the hallmark of an attack. Hackers have all the information they need to attack billions of users today, but consumers and financial institutions can make things more difficult if the correct technologies are applied.  Read Less
Like(0)  (0)

Linkedin Message

@Will LaSala, Director of Security Services, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Hackers have all the information they need to attack billions of users today...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-new-dark-web-audit-reveals-15-billion-stolen-logins

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Will LaSala, Director of Security Services, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Hackers have all the information they need to attack billions of users today...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-new-dark-web-audit-reveals-15-billion-stolen-logins

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
April 01, 2020

Industry Leaders And Cybersecurity Experts Insight On Marriott International Data Breach

Instead, organizations should look to implement risk-based tools that adapt to the changes.
As a Marriott customer myself, it is very disheartening that they apparently did not learn from their first missteps. Security is easily overlooked and often misplaced trust leads to failures such as this. Large organizations can often find it difficult to implement a one-size fits all authentication and security plan. From my experience, a one-size fits all approach never works and seems to leave the door open for hackers to break through. Instead, organizations should look to implement.....Read More
As a Marriott customer myself, it is very disheartening that they apparently did not learn from their first missteps. Security is easily overlooked and often misplaced trust leads to failures such as this. Large organizations can often find it difficult to implement a one-size fits all authentication and security plan. From my experience, a one-size fits all approach never works and seems to leave the door open for hackers to break through. Instead, organizations should look to implement risk-based tools that adapt to the changes. Businesses this large, that are still having problems with their security need to bring in outside help and implement the appropriate technology such as multi-factor authentication, behavioral analysis, biometrics, and even data from third-party tools as soon as possible, to ensure that the right level of security is applied at the right time.  Read Less
Like(0)  (0)

Linkedin Message

@Will LaSala, Director of Security Services, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Instead, organizations should look to implement risk-based tools that adapt to the changes. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/industry-leaders-and-cybersecurity-experts-insight-on-marriott-international-data-breach

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Will LaSala, Director of Security Services, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Instead, organizations should look to implement risk-based tools that adapt to the changes. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/industry-leaders-and-cybersecurity-experts-insight-on-marriott-international-data-breach

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
November 07, 2019

Experts Comments On Facebook Reveals Another Privacy Breach, This Time Involving Developers

Now Facebook has made a change to their privacy policy and is ensuring that applications adhere to that policy.
In my view, Facebook was reviewing their policies and how they were implemented, then came across an unintended flaw in their APIs that allowed certain developers access to information that they now restrict. From Facebook’s explanation on their blog, most of these apps were designed to help manage people within a group. The most important thing to remember here is that the original group administrator had to add and approve these applications, they also had access to the restricted data. Now .....Read More
In my view, Facebook was reviewing their policies and how they were implemented, then came across an unintended flaw in their APIs that allowed certain developers access to information that they now restrict. From Facebook’s explanation on their blog, most of these apps were designed to help manage people within a group. The most important thing to remember here is that the original group administrator had to add and approve these applications, they also had access to the restricted data. Now Facebook has made a change to their privacy policy and is ensuring that applications adhere to that policy. From a consumer standpoint, this should be an indicator to go and check the groups that you belong to, make sure you agree with the apps the group administrator has granted permissions to use and ask to find out what types of data those apps have access to. If you disagree with the group’s privacy, then remove yourself from the group so they will stop having access to it. It is important that consumers stay vigilant when it comes to their privacy.  Read Less
Like(1)  (0)

Linkedin Message

@Will LaSala, Director of Security Services, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Now Facebook has made a change to their privacy policy and is ensuring that applications adhere to that policy. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-comments-on-facebook-reveals-another-privacy-breach-this-time-involving-developers

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Will LaSala, Director of Security Services, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Now Facebook has made a change to their privacy policy and is ensuring that applications adhere to that policy. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-comments-on-facebook-reveals-another-privacy-breach-this-time-involving-developers

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Saryu Nayyar, CEO, Gurucul

"The evolution of the ObliqueRAT trojan is a good example of how malicious actors are constantly updating their tools and techniques. "

ObliqueRAT Trojan Lurks On Compromised Websites – Experts Comments

James McQuiggan, Security Awareness Advocate, KnowBe4

"It is essential to conduct red team or pen testing exercises. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Nikos Mantas, Incident Response Expert, Obrela Security Industries

"Data security should be a priority for all organisations today. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

David Sygula, Senior Cybersecurity Analyst , CybelAngel

"Organisations must constantly scan for leaked documents outside the enterprise perimeter. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Satnam Narang, Senior Research Engineer, Tenable

"We expect other threat actors to begin leveraging these vulnerabilities in the coming days and weeks. "

Microsoft Multiple 0-Day Attack – Tenable Comment

Sam Curry, Chief Security Officer, Cybereason

"Total transparency is needed and they need to hone in on more specific details and be completely transparent with Enrich members. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Florian Thurmann, Technical Director, EMEA , Synopsys Software Integrity Group

"Your organisation won’t be able to determine which of their employees has made a given change in the system. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Alan Grau, VP of IoT , Sectigo

"Best-practices for IoT device security include strong authentication and secure software updates. "

IoT Security In The Spotlight, As Research Highlights Alexa Security Flaws

Jake Moore, Cybersecurity Specialist, ESET

"Sensitive data such as this leaked into dark web forums can have damaging consequences. "

Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber Attack

Joseph Carson, Chief Security Scientist & Advisory CISO, Thycotic

"Password hygiene should be part of employee training and cyber awareness training. "

Expert Reaction On Solarwinds Blames Intern For Weak Passwords

Natalie Page, Cyber Threat Intelligence Analyst, Sy4 Security

"Currently Golang produce’s a much lower detection rate against security software. "

Expert Reaction On Go Is Becoming The Language Of Choice For Criminals To Design Malware

Chris Hickman, Chief Security Officer, Keyfactor

"A certificate expiration on its own is not necessarily a security response incident. "

Experts On Google Voice Outage

Adam Enterkin, SVP, EMEA, BlackBerry

"Even the best cybersecurity teams have had major challenges this last year. "

Expert Reaction On GCHQ To Use AI In Cyberwarfare

Jamie Akhtar, CEO and Co-founder, CyberSmart

"Universities are home to some of the world’s most cutting-edge research. "

Comment: Hackers Break Into ‘Biochemical Systems’ At Oxford Uni Lab Studying Covid-19

Jake Moore, Cybersecurity Specialist, ESET

"Honourable criminal hacking is still illegal and comes with some of the same intentions of standard unethical hacking. "

Expert Reaction On Private Data Leaked From Far-right Platform Gab

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel