
Tim Mackey
Principal Security Strategistfeature_status*/ ?>
Synopsys CyRC
Comments Dotted :
59
January 08, 2021
At best there is a hope the attackers will do as they state and not release the data.
Whenever an organisation is in the position of dealing with a demand of ransom from a cyber-attack, the time for securing data has passed. At best there is a hope the attackers will do as they state and not release the data, but there is nothing to say that copies didn’t otherwise exist, and the attackers view the ransom as but one of a number of revenue streams associated with the data. While there is value in performing post-incident forensic analysis, the best analysis is performed prior
.....Read More
December 03, 2020
From a public perspective, without clarity around how the Spotify for Artists web site is related to the consumer Spotify site.
While the details of what weaknesses in Spotify’s security practices remain unknown, the attack highlights an important aspect of all cyber-attacks – the attackers define the rules of their attack. In this case, vandalism is an obvious component, but it could also be but one aspect of their ultimate goal. From a public perspective, without clarity around how the Spotify for Artists web site is related to the consumer Spotify site, I would recommend that all Spotify users take this.....Read More

December 02, 2020
Container images are a combination of an application.
Container images are a combination of an application with operating system elements and supporting frameworks. Development teams creating distributed systems following a microservice or cloud native philosophy will select third-party container images to perform one of two functions. Either the container image is used “as is” to provide a shared service, such as with a database, or will be embedded as a base image to create a new container image. In both situations, the design and security.....Read More

December 01, 2020
£5 to £10 quid per month in reward points for an app.
Over the years I’ve often been asked about consumers having a marketplace to sell or minimally manage their personal data with a core question of how much consumers might charge. Now we have it – £5 to £10 quid per month in reward points for an app to monitor all internet usage while also having an excess in app permissions allowing the app to listen to background conversations. For some this might be appealing, but it should clearly demonstrate to everyone that personal data is valuable .....Read More

November 23, 2020
The starting point in such a defence is a comprehensive inventory of all software.
If your business were a target of a well-funded malicious group, how would you know? For most victims, the initial exploited weakness was likely an opportunistic one, even when the damage done was significant. Victims of cyber espionage find themselves subject to a strategic set of actions. As highlighted in the report, cyber espionage teams are often well-funded and highly skilled. This combination allows them to infiltrate a business quickly and leave few traces behind which in turn increases .....Read More

October 28, 2020
The underlying threat models should take into account how an attacker might use the data they collect.
Ransomware attacks are on the rise, and for the attackers, it’s likely comforting to learn that per IDC’s ANZ Ransomware Survey almost 1/3 of ANZ organisations hit by ransomware in the past two years paid the ransom. Unfortunately, when payment occurs, those monies are then available to create yet more innovative attacks, and potentially fund other criminal activity – a situation highlighted by the US Department of the Treasury’s Office of Foreign Assets Control in an advisory last.....Read More

October 04, 2020
To realise the potential of this paradigm, security leaders need to embed the knowledge within the development flow.
Prioritisation of feature development relative to security has long been a challenge, but it’s not without a solution. In a DevSecOps world, empowering development teams can result in higher quality code with fewer security defects. To realise the potential of this paradigm, security leaders need to embed the knowledge within the development flow and not simply bolt it on at the end of the development process. By embedding this knowledge within the development flow, security knowledge created .....Read More

October 04, 2020
Biometric based user identification is nothing new.
Biometric based user identification is nothing new. In recent years programs like CLEAR in the US incorporate biometrics to identify airline passengers and programs like Global Entry offer the similar functionality for US passport control. Extending this capability to payment systems is a logical step, but one where participation should be voluntary. Malicious groups know that health and biometric data isn’t easily replaced making it a prime target for any attack. This means that any.....Read More

September 23, 2020
The Computer Fraud and Abuse Act (CFAA) didn’t cover unauthorised access to voting machines.
We can all agree that malicious access to a voting machine at any point in its life is a bad thing , so for those of you who thought it was already illegal to hack a voting machine; things are complicated. Since voting machines are owned and managed at the local district level, and aren’t involved in interstate commerce, the Computer Fraud and Abuse Act (CFAA) didn’t cover unauthorised access to voting machines. With passage of the Defending the Integrity of Voting Systems Act, the CFAA was .....Read More

September 04, 2020
Once armed with that inventory, then a patch policy can be created for each item.
It’s not surprising to find that IT organisations have a disconnect between their perception of patch maturity and the reality of the software running within their organisations. While many businesses likely have a mature patch management strategy around servers and corporate-owned desktops and laptops, these represent a fraction of the software running in a business. Further, if the patch management strategy employed presumes that patches will originate from a commercial software vendor,.....Read More
