
Mark Bower
Senior Vice President /*=$expert->feature_status*/ ?>
comforte AG
Comments Dotted :
11
August 20, 2020
Breaches like this fuel the attacks to people that open more doors to much more valuable data.
Breaches like this fuel the attacks to people that open more doors to much more valuable data. Given the prevalence of work-from-home right now, its not surprising to see data like this circulating. Specific personal data enables more effective spearphishing to attack an enterprise with higher risk, higher value data. The bottom line here is enterprises need to be both protecting their own personal data to neutralize it from risk of theft and scraping, and ensuring employees don’t become the.....Read More

July 13, 2020
Organizations facing the dilemma of amassing sensitive data to run, compete and grow business must take first-line defense strategies.
This is a welcome move, and while critical to help recover funds stolen from US businesses and interests, especially smaller entities that can be decimated by direct financial attack, it will not be a full deterrent or defense against well-funded organized crime and nation-state attackers. The lure of data theft, identity and financial crime and economic influence through distributed and coordinated attackers capable of operating in jurisdictions outside of the US is great as evidenced by the.....Read More

June 24, 2020
Aside from human error, it illustrates the frailty of modern, dynamic environments to some configurations leading to possible catastrophe.
The likely culprit here is human error, but it illustrates the frailty of modern, dynamic environments to just one or two configurations that can lead to potential catastrophe. While the data exposed here is limited in nature, it’s a timely reminder that organizations capturing personal data need to examine the complete data lifecycle risks and implement protective and operational controls that limit its exposure end to end.

May 28, 2020
Bank Of America Admits Paycheck Protection Program Data Breach – Enterprise Security Expert Comments
The missing piece here that could have saved the day was using de-identified data during the test run to avoid regulated data exposure.
It goes to show that even the best prepared organizations can suffer breach risks in the rush to changing marketing conditions or harsh deadlines like SBA loan processing. The missing piece here that could have saved the day was using de-identified data during the test run to avoid regulated data exposure. De-identifying data can be as simple as transforming it with technologies like tokenization to a neutralized form that can still drive the application in production or test, but not expose it .....Read More

May 22, 2020
Hashed MD5 passwords aren’t difficult to brute force.
It looks like security and privacy have been an afterthought, not a matter of culture and software development process. If the passwords are hashed with MD5, then the users affected should be immediately making sure their ID’s and passwords aren’t used elsewhere with the same password. MD5 is a goner as far as security is concerned but used by mistaken developers unfamiliar with its security risks, or using older code libraries using MD5. Hashed MD5 passwords aren’t difficult to brute.....Read More

May 19, 2020
When storing critically sensitive data, security and privacy must always be at the front of the discussion.
All indications are that this was an accidental software issue, but such incidents can be the cause of massive breaches of trust as well as data. Given the critical need for data security for businesses and people in stressed economic times, organizations establishing new services should really take a look at more modern, snap-in data tokenization technology to modernize their approach to data collection.
When storing critically sensitive data, security and privacy must always be at the front .....Read More

May 19, 2020
The report shows the Great Digital Train Robbery is alive and well.
The report shows the Great Digital Train Robbery is alive and well. External, multi-faceted and industrialized hacking continues to pepper large enterprises at 72% of overall victims. It’s no surprise that web application patters, around 45% of attacks, expose technology services firms, retail, financial and Insurance services and professional services most to compromise. They are the highest aggregators of highly sensitive data with substantial 3rd party data sharing risk.
Personal data.....Read More

May 07, 2020
The Australian government COVID-19 apps downloaded by 3 million people so far collect more personal data.
The COVID app situation is a classic case of balancing risk and benefits, which is exactly what CISO’s do 24 hours a day. The infection tracing methods published by Google and Apple appear reasonable and well grounded, with sound cryptographic methods to de-risk data using rolling cryptographically ‘tokenized’ Bluetooth pseudorandom identifiers vs actual personal data – the data is also in constant time-based change.
The architecture is tuned to COVID19’s characteristics too, for.....Read More

May 05, 2020
There are new data security methods that are ideal for dynamic edge telemetry systems and online analytic platforms.
Tesla always push boundaries of driverless technology, so it’s quite unexpected to hear of data leakage of personal data from automotive components like this, especially those at the edge of powerful online network systems that drive modern intelligent vehicles. The question on my mind is, could Tesla avoid personal data storage like this using modern data-centric security technology? Very probably. There are new data security methods that are ideal for dynamic edge telemetry systems and.....Read More

April 22, 2020
Have best practices like data-centric security been traded-off to launch quickly.
It’s clear that prioritizing services to save vulnerable small businesses in a pandemic is a priority, but this exposure begs more questions about application data handling risk. Have best practices like data-centric security been traded-off to launch quickly, leading to further exposure and attack down the line? The last thing these businesses need is their identity data abuse cascading to deeper economic injury risk.
Attackers are smart, following the money, and the path of least.....Read More
