Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Qualys Hit With Ransomware And Customer Invoices Leaked
Experts Reaction On PrismHR Hit By Ransomware Attack
Expert Insight On Ryuk’s Revenge: Infamous Ransomware Is...
ObliqueRAT Trojan Lurks On Compromised Websites – Experts...
Microsoft Multiple 0-Day Attack – Tenable Comment
Experts Reaction On Malaysia Airlines 9 Years Old...
IoT Security In The Spotlight, As Research Highlights...
Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber...
Expert Reaction On Solarwinds Blames Intern For Weak...
Expert Reaction On Go Is Becoming The Language...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Alyn Hockey
VP of Product Management feature_status*/ ?>
Clearswift

Comments Dotted : 4
May 20, 2020

UK airline easyJet data breach impacts 9M customers – expert commentary

A major data breach is the last thing the travel sectors needs now
This last thing that the travel industry needed right now was a data breach of this size and scale. However you look at it, nine million customers with their data breached is not a good look and the true cost of this to EasyJet is yet to be revealed. Such breaches occur with depressing regularity now, yet organisations do not seem to think it will happen to them – until it does. Effective cyber security is not just a question of investing in the latest software, it’s about that combination .....Read More
This last thing that the travel industry needed right now was a data breach of this size and scale. However you look at it, nine million customers with their data breached is not a good look and the true cost of this to EasyJet is yet to be revealed. Such breaches occur with depressing regularity now, yet organisations do not seem to think it will happen to them – until it does. Effective cyber security is not just a question of investing in the latest software, it’s about that combination of people, processes and technology. If an organisation is lacking any one of these three, then they will be vulnerable. People use budget airlines in their millions and accept that certain elements of the experience will be different to other airlines. Whether that acceptance extends to having their personal information hacked, is another question.  Read Less
Like(0)  (0)

Linkedin Message

@Alyn Hockey, VP of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"A major data breach is the last thing the travel sectors needs now..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/uk-airline-easyjet-data-breach-impacts-9m-customers-expert-commentary

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Alyn Hockey, VP of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"A major data breach is the last thing the travel sectors needs now..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/uk-airline-easyjet-data-breach-impacts-9m-customers-expert-commentary

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
April 01, 2020

Industry Leaders And Cybersecurity Experts Insight On Marriott International Data Breach

Smart cyber security relies on people, process and technology. If any one of these is missing, then the organisation will be vulnerable.
“Successful cyber security is not just a question of investing in the latest software, it’s about a combination of people, processes and technology. If an organisation is lacking any one of these three, then they will be vulnerable.” “The fact that this breach began in mid-January and was only discovered and halted by the end of February is really not good. It then took a further month to begin notifying the customers that had been breached. Cyber security is complicated and.....Read More
“Successful cyber security is not just a question of investing in the latest software, it’s about a combination of people, processes and technology. If an organisation is lacking any one of these three, then they will be vulnerable.” “The fact that this breach began in mid-January and was only discovered and halted by the end of February is really not good. It then took a further month to begin notifying the customers that had been breached. Cyber security is complicated and challenging against an ever-evolving threat, but an essential part of it is having the right processes in place – being able to identify breaches as soon as possible, taking measures to stop them and reporting them to the relevant authorities. It feels like those processes just weren’t in place here. Given that Marriott International has already been fined £99M by the Information Commissioner’s Office (ICO) under GDPR for its previous breach, it is hard to understand why that was the case.”  Read Less
Like(0)  (0)

Linkedin Message

@Alyn Hockey, VP of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Smart cyber security relies on people, process and technology. If any one of these is missing, then the organisation will be vulnerable...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/industry-leaders-and-cybersecurity-experts-insight-on-marriott-international-data-breach

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Alyn Hockey, VP of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Smart cyber security relies on people, process and technology. If any one of these is missing, then the organisation will be vulnerable...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/industry-leaders-and-cybersecurity-experts-insight-on-marriott-international-data-breach

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
March 03, 2020

Experts Insight On Visser Data Breach (Supplier To Lockheed, Tesla, Boeing And SpaceX)

If ransomware attacks are on the rise again, organisations need to allow password protected documents only from trusted senders.
It has felt like ransomware incidents are ramping up once more, with a number of attacks over the past few weeks. This DoppelPaymer attack has been the most high profile of those, partly because of the organisation being held to ransom - Visser, a parts manufacturer to major brands such as Boeing, Tesla and SpaceX – and partly because of DopplePaymer’s nature. It’s file-encrypting malware which first exfiltrates a company’s data and only discloses the data theft when that company goes.....Read More
It has felt like ransomware incidents are ramping up once more, with a number of attacks over the past few weeks. This DoppelPaymer attack has been the most high profile of those, partly because of the organisation being held to ransom - Visser, a parts manufacturer to major brands such as Boeing, Tesla and SpaceX – and partly because of DopplePaymer’s nature. It’s file-encrypting malware which first exfiltrates a company’s data and only discloses the data theft when that company goes to the ransomware’s website to pay the ransom. This means that organisations might not even be aware of their data being exfiltrated, a highly vulnerable place to be in. DoppelPaymer relies on employees opening the email message, which will contain a password so that the user can open the file – once this has happened then the ransomware can move across a network and take all the data it wishes. But these types of file are relatively easy to defend against. Organisations can build policy to allow password protected documents only from trusted senders, although ideally they should move to use email encryption as its more secure.  Read Less
Like(0)  (0)

Linkedin Message

@Alyn Hockey, VP of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"If ransomware attacks are on the rise again, organisations need to allow password protected documents only from trusted senders. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-visser-data-breach-supplier-to-lockheed-tesla-boeing-and-spacex

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Alyn Hockey, VP of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"If ransomware attacks are on the rise again, organisations need to allow password protected documents only from trusted senders. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-visser-data-breach-supplier-to-lockheed-tesla-boeing-and-spacex

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
February 14, 2020

Coronavirus Emotet – Expert Analysis

Coronavirus-based attacks are best defended against via education, testing and technology.
It’s really difficult for organisations to stay protected, because there is so much variety in social engineering threats and the Coronavirus is just the latest example. People are concerned the Coronavirus and are perhaps more vulnerable to emails purporting to be about that. Protecting the enterprise against such attacks is done via a combination of education, testing and technology. Staff need to be trained on a regular basis about new threats and the best ways to deal with them,.....Read More
It’s really difficult for organisations to stay protected, because there is so much variety in social engineering threats and the Coronavirus is just the latest example. People are concerned the Coronavirus and are perhaps more vulnerable to emails purporting to be about that. Protecting the enterprise against such attacks is done via a combination of education, testing and technology. Staff need to be trained on a regular basis about new threats and the best ways to deal with them, phishing tests must be carried out regularly and the right technology is essential. It must protect staff and detect the real phishing messages as best as it can – bearing in mind that it’s a constant arms race between the security vendors and cyber criminals, who are more than willing to use news such as the Coronavirus to get people to open emails and click on the links.  Read Less
Like(0)  (0)

Linkedin Message

@Alyn Hockey, VP of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Coronavirus-based attacks are best defended against via education, testing and technology. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/coronavirus-emotet-expert-analysis

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Alyn Hockey, VP of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Coronavirus-based attacks are best defended against via education, testing and technology. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/coronavirus-emotet-expert-analysis

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Jake Moore, Cybersecurity Specialist, ESET

"In general, malicious actors now use full-blown extortion tactics to make sure they get what they came for in attacks like this. "

Qualys Hit With Ransomware And Customer Invoices Leaked

Ilia Kolochenko, CEO, ImmuniWeb

"Qualys’s response to the incident is a laudable example of transparent and professional handling of a security incident. "

Qualys Hit With Ransomware And Customer Invoices Leaked

Natalie Page, Cyber Threat Intelligence Analyst, Sy4 Security

"Due to the nature of this organisation, PrismHR makes for an extremely valuable target to an adversary looking to extract sensitive information. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Lewis Jones, Threat Intelligence Analyst, Talion

"Ransomware renders any files it touches unreadable unless, and until, a victim pays for a digital key needed to unlock the encryption on them. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Stephen Kapp, CTO and Founder, Cortex Insight

"An attack like this will not only impact PrismHR but also its customers who will need access to systems in order to pay employees. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Richard Walters, CTO , Censornet

"“Careless clicks sink ships.” "

Expert Insight On Ryuk’s Revenge: Infamous Ransomware Is Back And Stronger Than Ever

Saryu Nayyar, CEO, Gurucul

"The evolution of the ObliqueRAT trojan is a good example of how malicious actors are constantly updating their tools and techniques. "

ObliqueRAT Trojan Lurks On Compromised Websites – Experts Comments

James McQuiggan, Security Awareness Advocate, KnowBe4

"It is essential to conduct red team or pen testing exercises. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Nikos Mantas, Incident Response Expert, Obrela Security Industries

"Data security should be a priority for all organisations today. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

David Sygula, Senior Cybersecurity Analyst , CybelAngel

"Organisations must constantly scan for leaked documents outside the enterprise perimeter. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Satnam Narang, Senior Research Engineer, Tenable

"We expect other threat actors to begin leveraging these vulnerabilities in the coming days and weeks. "

Microsoft Multiple 0-Day Attack – Tenable Comment

Sam Curry, Chief Security Officer, Cybereason

"Total transparency is needed and they need to hone in on more specific details and be completely transparent with Enrich members. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Florian Thurmann, Technical Director, EMEA , Synopsys Software Integrity Group

"Your organisation won’t be able to determine which of their employees has made a given change in the system. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Alan Grau, VP of IoT , Sectigo

"Best-practices for IoT device security include strong authentication and secure software updates. "

IoT Security In The Spotlight, As Research Highlights Alexa Security Flaws

Jake Moore, Cybersecurity Specialist, ESET

"Sensitive data such as this leaked into dark web forums can have damaging consequences. "

Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber Attack

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel