Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Iran Nuclear Facility Potential Cyber Attack – What...
Industry Leaders On Android.Joker Malware
Expert Reaction On Pulse Secure VPN Users Can’t...
New Vulnerabilities Put Millions Of IoT Devices At...
Expert Comment On Darktrace Set For IPO
Fake App Attacks On The Rise, As Malware...
Expert On Study That Brits Using Pets’ Names...
Expert Reaction On Europol Publishes Its Serious And...
Fake Netflix App Allows Hackers to Hijack WhatsApp
Hackers Pretend To Be Your Friend In The...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Piers Wilson
Head of Product Management feature_status*/ ?>
Huntsman Security

Comments Dotted : 5
December 14, 2020

SolarWinds Supply Chain Cyberattack – Experts Insight

A holistic approach to cyber-security is vital to ensure defences are as effective as possible.
A successful, nation-state supply-chain attack isn’t a surprise, but it should be a serious wake-up call. Many organisations have fortified their own cybersecurity defences, but as we have seen, a single partner or supplier being breached can undermine any positive action already taken. The fact that a supplier was so successfully breached, putting core US government organisations at risk, highlights the huge importance of a secure supply chain. A holistic approach to cyber-security is.....Read More
A successful, nation-state supply-chain attack isn’t a surprise, but it should be a serious wake-up call. Many organisations have fortified their own cybersecurity defences, but as we have seen, a single partner or supplier being breached can undermine any positive action already taken. The fact that a supplier was so successfully breached, putting core US government organisations at risk, highlights the huge importance of a secure supply chain. A holistic approach to cyber-security is vital to ensure defences are as effective as possible. Having the latest and greatest technologies to secure your own network is only a partial solution if your suppliers are not doing the same. Businesses often carry out due diligence on the financial viability of core partners to ensure they are not a risk. The same has to be true for cybersecurity. Regular assessment or monitoring of all partners’ and suppliers’ cybersecurity practices must become commonplace, alongside a robust cybersecurity program to minimise the risk of falling victim to similar attacks. There is no doubt that as this attack is investigated we will see many more victims come to light. Organisations must act now if they aren’t sure their supply-chain is secure, as waiting will just increase the chances of becoming the next headline.  Read Less
Like(0)  (0)

Linkedin Message

@Piers Wilson, Head of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"A holistic approach to cyber-security is vital to ensure defences are as effective as possible. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/solarwinds-supply-chain-cyberattack-experts-insight

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Piers Wilson, Head of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"A holistic approach to cyber-security is vital to ensure defences are as effective as possible. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/solarwinds-supply-chain-cyberattack-experts-insight

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
October 19, 2020

Experts Reacted On News: British Airways Fined £20m For Data Breach

In a highly interconnected world, it's also not enough to have confidence in your own security.
£20m might seem a big fine and a major consequence of failing to secure data under GDPR, but it is much less than the ICO's original intended fine of £183m. Whether this was a result of clever bargaining by BA, the investigation process uncovering mitigating factors, an acknowledgment of the ravages of Covid-19 on the airline industry, or the ICO deliberately setting a high initial target with a more realistic goal in mind, it could give the message that fines will not be as severe as.....Read More
£20m might seem a big fine and a major consequence of failing to secure data under GDPR, but it is much less than the ICO's original intended fine of £183m. Whether this was a result of clever bargaining by BA, the investigation process uncovering mitigating factors, an acknowledgment of the ravages of Covid-19 on the airline industry, or the ICO deliberately setting a high initial target with a more realistic goal in mind, it could give the message that fines will not be as severe as businesses and some in the security and privacy industry expect. However, what ICO investigators did stress was that BA should have identified weaknesses in advance. This should come as a timely reminder that many cyber-attacks are preventable with standard cybersecurity controls - as long as they are working effectively. Whether following something like the NCSC’s Cyber Essential guidance or the Australian Government’s Essential 8 risk mitigation framework, organisations need to rigidly maintain these foundations, from simple patching and access controls to actively searching for and fixing vulnerabilities. In a highly interconnected world, it's also not enough to have confidence in your own security. What about your partners up and down the entire supply chain, especially as organisations have had to react so quickly to Covid? The risks are great – not only in terms of fines, but in loss of customer confidence in an already highly fragile economy – so regularly taking stock of cyber risk, and obliging partners to do the same, needs to be standard practice.  Read Less
Like(2)  (0)

Linkedin Message

@Piers Wilson, Head of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"In a highly interconnected world, it\'s also not enough to have confidence in your own security. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reacted-on-news-british-airways-fined-20m-for-data-breach

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Piers Wilson, Head of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"In a highly interconnected world, it\'s also not enough to have confidence in your own security. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reacted-on-news-british-airways-fined-20m-for-data-breach

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
February 26, 2020

FCA Admits Revealing Customers’ Details

No matter what an organisation does, or how much experience it has in security and privacy mistakes can happen.
To see the FCA having to refer itself to the ICO shows how easy data can be exposed through human error. In this case it is the inadvertent sharing of a FOI response with personal data contained within it, but it can also happen through deliberate or careless sharing of spreadsheets, data sets or documents, or the transmission of emails to wrongly addressed recipients. No matter what an organisation does, or how much experience it has in security and privacy mistakes can happen. These can be.....Read More
To see the FCA having to refer itself to the ICO shows how easy data can be exposed through human error. In this case it is the inadvertent sharing of a FOI response with personal data contained within it, but it can also happen through deliberate or careless sharing of spreadsheets, data sets or documents, or the transmission of emails to wrongly addressed recipients. No matter what an organisation does, or how much experience it has in security and privacy mistakes can happen. These can be when information is intended to be shared but hasn't been sanitised, or when information stored, transmitted or shared in other ways.  Read Less
Like(2)  (0)

Linkedin Message

@Piers Wilson, Head of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"No matter what an organisation does, or how much experience it has in security and privacy mistakes can happen. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/fca-admits-revealing-customers-details

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Piers Wilson, Head of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"No matter what an organisation does, or how much experience it has in security and privacy mistakes can happen. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/fca-admits-revealing-customers-details

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
December 10, 2019

2020 Cybersecurity Landscape: 100+ Experts’ Predictions

So while boards might perceive cyber security impacts like the loss of data, forensics costs or GDPR fines.
Looking forward to 2020, one of the biggest risks to organisations is that they fail to understand the link between cyber security and reputation. Nowadays, we see a public much less inclined to stand for mistakes and social media channels that can quickly become filled with indignation, vitriol, complaints and dissatisfaction. So while boards might perceive cyber security impacts like the loss of data, forensics costs or GDPR fines - a breach that hits the headlines AND captures the public on .....Read More
Looking forward to 2020, one of the biggest risks to organisations is that they fail to understand the link between cyber security and reputation. Nowadays, we see a public much less inclined to stand for mistakes and social media channels that can quickly become filled with indignation, vitriol, complaints and dissatisfaction. So while boards might perceive cyber security impacts like the loss of data, forensics costs or GDPR fines - a breach that hits the headlines AND captures the public on a negative wave could well lead to the kind of repetitional damage and consumer activism we have already seen around labour practices boardroom inequality, sexual harassment tax affairs and environmental practices. If people are ready to organise boycotts and on-line protests with hashtags around - say - the treatment of female employees or single use plastics, then we could easily see #boycottpoorsecurity #saynotodatasharing or #nobreachofmydata.  Read Less
Like(3)  (0)

Linkedin Message

@Piers Wilson, Head of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"So while boards might perceive cyber security impacts like the loss of data, forensics costs or GDPR fines...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/2020-cybersecurity-predictions-experts-comments

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Piers Wilson, Head of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"So while boards might perceive cyber security impacts like the loss of data, forensics costs or GDPR fines...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/2020-cybersecurity-predictions-experts-comments

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
November 20, 2019

Experts Comments On Macy’s Customer Payment Info Stolen In Magecart Breach

Retailers should be extra mindful of security this holiday season
“Consumers trust companies to keep their data secure and with the holiday season around the corner, this is at the top of mind. Cybercriminals are continuously looking for gaps in security defenses and vulnerabilities to turn a quick profit. In this incident, valuable financial information was stolen including credit card numbers, security codes and expiration dates. During peak holiday shopping season, it is imperative companies continuously validate their security controls to make sure they .....Read More
“Consumers trust companies to keep their data secure and with the holiday season around the corner, this is at the top of mind. Cybercriminals are continuously looking for gaps in security defenses and vulnerabilities to turn a quick profit. In this incident, valuable financial information was stolen including credit card numbers, security codes and expiration dates. During peak holiday shopping season, it is imperative companies continuously validate their security controls to make sure they are enabled, configured correctly and operating effectively. What’s more, companies should proactively test and evaluate their cybersecurity posture to find vulnerabilities and remediate them before they can be exploited by bad actors.”  Read Less
Like(0)  (0)

Linkedin Message

@Piers Wilson, Head of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Retailers should be extra mindful of security this holiday season..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/comment-macys-customer-payment-info-stolen-in-magecart-breach

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Piers Wilson, Head of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Retailers should be extra mindful of security this holiday season..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/comment-macys-customer-payment-info-stolen-in-magecart-breach

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Steve Forbes, Government Cyber Security Expert, Nominet States

"It is vital that governments pay close attention to the resilience of their critical infrastructures. "

Iran Nuclear Facility Potential Cyber Attack – What Expert Says

Saryu Nayyar, CEO, Gurucul

"The good news is that it appears the only damage is financial, and likely temporary. "

Industry Leaders On Android.Joker Malware

Eddie Glenn, Senior Product Manager, Venafi

"These timestamps indicate that the code signing certificate was valid at the time it was used to sign the code. "

Expert Reaction On Pulse Secure VPN Users Can’t Login Due To Certificate Related Outage

Jake Moore, Cybersecurity Specialist, ESET

"IoT remains a huge burden on potential victims, but the industry is slowly catching up. "

New Vulnerabilities Put Millions Of IoT Devices At Risk

Sri Sundaralingam, VP of Security and Cloud Solutions, ExtraHop

"The growth of the NDR category underscores the unique value that the network vantage point can provide for security teams. "

Expert Comment On Darktrace Set For IPO

Doug Davis, Senior Product Manager, Semperis

"Hybrid Identity Management Requires Critical Security Adjustments "

Experts Comments On Identity Management Day – Tuesday 13th April

Alan Grau, VP of IoT , Sectigo

"Attackers dupe individuals through a number of methods. "

Fake App Attacks On The Rise, As Malware Hides In Plain Sight

David Emm, Principal Security Researcher , Kaspersky

"Our passwords are the gateway to a plethora of valuable personal data that should never be openly shared. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Colin Truran, Senior Risk, Compliance and Governance Advisor , Quest

"Many of us recognise this problem, but as human beings we will continue to opt for easy passwords. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Ian Pitt, CIO, LogMeIn

"Online security risks have risen substantially over the past year. "

Expert On Study That Brits Using Pets’ Names As Online Passwords

Ilia Kolochenko, CEO, ImmuniWeb

"It is likewise a myth that governments cannot control cryptocurrencies. "

Expert Reaction On Europol Publishes Its Serious And Organised Crime Threat Assessment 2021

Jake Moore, Cybersecurity Specialist, ESET

"Being able to send rogue messages from another app installed on a device is impressive and extremely dangerous. "

Fake Netflix App Allows Hackers to Hijack WhatsApp

Burak Agca, Security Engineer, Lookout

"It is imperative that individuals and organisations keep their mobile operating systems and apps up to date. "

Hackers Pretend To Be Your Friend In The Latest WhatsApp Scam.

Adenike Cosgrove, Cyber Security Strategist, International, Proofpoint

"A password’s complexity is irrelevant if people use the same password for everything. "

Millions Of Brits Still Using Pet’s Names As Passwords Despite Risk

Richard Blech, Founder & CEO, XSOC CORP

"The LI capability was co-opted and exploited by one or more malicious actors. "

Advertised Sites May Appear Genuine On First Glance

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel