Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Expert Commentary On 30,000 Macs Infected With New...
Response Comment: Half Of Businesses Suffered A Cyber-Attack...
Expert Reaction On Google’s Password Checkup Feature Expanding...
Expert Comments On Secondary Extortion Attacks
Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing
Experts Reacted On Retail Giant Kroger Data Breach
Security A Glaring Issue For Chatroom App Clubhouse...
Parents Alerted To Nurserycam Security Breach – Experts...
How Can Consumers Better Protect Their Finances From...
Experts Insight On ‘Silent Stealing’ New Cyber Crime...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Chris DeRamus
CTO and co-founderfeature_status*/ ?>
DivvyCloud

Comments Dotted : 6
May 20, 2020

UK airline easyJet data breach impacts 9M customers – expert commentary

ompanies should follow the principle of least-privileged access when provisioning identity and access management (IAM) permissions.
Airports and airlines are increasingly reliant on technology and the global aviation industry is more connected than ever before, making these companies much more susceptible to cyberattacks. Research from ImmuniWeb found that 97% of the world’s top airports failed the cybersecurity posture test administered by the firm. Unfortunately, this data breach impacting easyJet passengers illuminates how many organizations’ cybersecurity and compliance practices are reactive. To properly protect.....Read More
Airports and airlines are increasingly reliant on technology and the global aviation industry is more connected than ever before, making these companies much more susceptible to cyberattacks. Research from ImmuniWeb found that 97% of the world’s top airports failed the cybersecurity posture test administered by the firm. Unfortunately, this data breach impacting easyJet passengers illuminates how many organizations’ cybersecurity and compliance practices are reactive. To properly protect customer data, airlines and all organizations must transition to more advanced, proactive security measures. Companies should follow the principle of least-privileged access when provisioning identity and access management (IAM) permissions by providing checks to restrict identities from being able to access more than they are granted in their systems. This can be accomplished by employing automated security tools that continuously protect systems and servers from IAM vulnerabilities, as well as misconfigurations, policy violations, and other threats to ensure holistic security and compliance. Additionally, organizations should implement multi-factor authentication (MFA) for all users, securely manage service accounts and their corresponding keys, and enforce best practices for the use of audit logs and cloud logging roles.”  Read Less
Like(0)  (0)

Linkedin Message

@Chris DeRamus, CTO and co-founder, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"ompanies should follow the principle of least-privileged access when provisioning identity and access management (IAM) permissions...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/uk-airline-easyjet-data-breach-impacts-9m-customers-expert-commentary

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Chris DeRamus, CTO and co-founder, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"ompanies should follow the principle of least-privileged access when provisioning identity and access management (IAM) permissions...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/uk-airline-easyjet-data-breach-impacts-9m-customers-expert-commentary

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
November 05, 2019

2020 Cybersecurity Landscape: 100+ Experts’ Predictions

Misconfigurations will continue to plague organizations in 2020
Cloud misconfigurations will continue to cause massive data breaches. As enterprises continue to adopt cloud services across multiple cloud service providers in 2020, we will see a slew of data breaches caused by misconfigurations. Due to the pressure to go big and go fast, developers often bypass security in the name of innovation. All too often this leads to data exposure on a massive scale such as the First American Financial Corporation’s breach of over 885 million mortgage records in.....Read More
Cloud misconfigurations will continue to cause massive data breaches. As enterprises continue to adopt cloud services across multiple cloud service providers in 2020, we will see a slew of data breaches caused by misconfigurations. Due to the pressure to go big and go fast, developers often bypass security in the name of innovation. All too often this leads to data exposure on a massive scale such as the First American Financial Corporation’s breach of over 885 million mortgage records in May. Companies believe they are faced with a lose-lose choice: either innovate in the cloud and accept the risk of suffering a data breach, or play it safe with existing on-premise infrastructure and lose out to more agile and modern competitors. In reality, companies can accelerate innovation without loss of control in the cloud. They can do this by leveraging automated security tools that give organizations the ability to detect misconfigurations and alert the appropriate personnel to correct the issue, or even trigger automated remediation in real-time. Automation also grants enterprises the ability to enforce policy, provide governance, impose compliance, and provide a framework for the processes everyone in the organization should follow—all on a continuous, consistent basis. Companies can innovate while maintaining security, they simply must adopt the proper cloud strategies and solutions.  Read Less
Like(2)  (0)

Linkedin Message

@Chris DeRamus, CTO and co-founder, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Misconfigurations will continue to plague organizations in 2020..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/2020-cybersecurity-predictions-experts-comments

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Chris DeRamus, CTO and co-founder, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Misconfigurations will continue to plague organizations in 2020..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/2020-cybersecurity-predictions-experts-comments

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
August 21, 2019

Biometric Database Breach: Expert Commentary

Companies continue to suffer breaches from misconfigurations
Leaving servers unprotected seems like such a simple mistake to avoid, but more and more companies suffer data breaches as the result of misconfigurations, and we read about them in the news almost every day. Suprema joins Aavgo, University of Chicago Medicine, Rubrik, Gearbest, Ascension and countless other organizations this year as victims of data leaks due to misconfigurations. The truth is, organizations are lacking the proper tools to identify and remediate insecure software.....Read More
Leaving servers unprotected seems like such a simple mistake to avoid, but more and more companies suffer data breaches as the result of misconfigurations, and we read about them in the news almost every day. Suprema joins Aavgo, University of Chicago Medicine, Rubrik, Gearbest, Ascension and countless other organizations this year as victims of data leaks due to misconfigurations. The truth is, organizations are lacking the proper tools to identify and remediate insecure software configurations and deployments on a continuous basis. Automated cloud security solutions give companies the ability to detect misconfigurations and alert the appropriate personnel to correct the issue, and they can even trigger automated remediation in real time.  Read Less
Like(0)  (0)

Linkedin Message

@Chris DeRamus, CTO and co-founder, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Companies continue to suffer breaches from misconfigurations..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/biometric-database-breach-expert-commentary

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Chris DeRamus, CTO and co-founder, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Companies continue to suffer breaches from misconfigurations..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/biometric-database-breach-expert-commentary

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
August 21, 2019

MoviePass Exposes 161M Records

Ignoring vulnerabilities that are reported by white hat hackers is not a wise move.
Leaving 58,000+ records containing payment card data unencrypted on a publicly accessible database is concerning, however, the fact that MoviePass initially ignored the vulnerability when it was notified is even worse. Misconfigurations like this are frequent, and enterprises should be thankful when white hat security researchers flag vulnerabilities before they can be exploited. Consumers that trusted MoviePass with their data expect their personally identifiable information to be protected.....Read More
Leaving 58,000+ records containing payment card data unencrypted on a publicly accessible database is concerning, however, the fact that MoviePass initially ignored the vulnerability when it was notified is even worse. Misconfigurations like this are frequent, and enterprises should be thankful when white hat security researchers flag vulnerabilities before they can be exploited. Consumers that trusted MoviePass with their data expect their personally identifiable information to be protected with mature security controls. Within the months that MoviePass’ database was exposed, cybercriminals not only could have made fraudulent purchases, but they also could have launched phishing attacks against MoviePass customers to gain access to additional sensitive information. MoviePass joins Honda, AavGo, Rubrik, Gearbest and countless other organizations this year to fall victim to data leaks via cloud service misconfigurations. The truth is, most companies still lack the proper tools to identify and remediate insecure software configurations and deployments on a continuous basis. Automated cloud security solutions must be a priority for all companies that are using cloud services. Without these tools in place companies will continue to lack the ability to detect misconfigurations and alert the appropriate personnel to correct the issue or better drive automated remediation in real time.  Read Less
Like(11)  (0)

Linkedin Message

@Chris DeRamus, CTO and co-founder, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Ignoring vulnerabilities that are reported by white hat hackers is not a wise move...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/moviepass-exposes-161m-records

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Chris DeRamus, CTO and co-founder, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Ignoring vulnerabilities that are reported by white hat hackers is not a wise move...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/moviepass-exposes-161m-records

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
August 07, 2019

Security Lapse Exposed Weak Points On Honda’s Internal Network

Organizations must change how they deploy and build apps entirely
To avoid incidents misconfigurations like what Honda experienced, organizations should change how they deploy and build applications entirely. Not necessarily just a technology shift, but more of a cultural change. Everything an IT department does will need to change: how they deploy applications, what applications they build, how they learn from their customers, etc. All of that has to change because engineering teams have direct access to infrastructure and old processes aren’t going to.....Read More
To avoid incidents misconfigurations like what Honda experienced, organizations should change how they deploy and build applications entirely. Not necessarily just a technology shift, but more of a cultural change. Everything an IT department does will need to change: how they deploy applications, what applications they build, how they learn from their customers, etc. All of that has to change because engineering teams have direct access to infrastructure and old processes aren’t going to work. Simple truth: the rate of change and the dynamic nature of software-defined infrastructure has outstripped human capacity. If companies get a list of a thousand problems, even with 100 people tasked with resolving them, problems either disappear, move, or are replaced with even more significant issues. Enterprises need to be able to deal with faults in real-time. Organizations need a security solution that provides the automation essential to enforce policy, to reduce risk, provide governance, impose compliance, and increase security across large-scale hybrid cloud infrastructure. Automation should take the pain out of making cloud infrastructure secure in a shared responsibility world by providing a framework for what organizations should be doing via a continuous, real-time process. By utilizing security automation, companies can stay agile and innovate, while maintaining the integrity of their technology stack and applying the policy they deem necessary to operate their business. Core to a company’s solution should be an easy-to-use interface from which clients can manage their existing cloud infrastructure. At scale, policy enforcement cannot and should not be manually performed. Security automation can discover and automatically take action to address policy infringements or security issues (like an exposed ElasticSearch Database). It also allows for simultaneous offense and defense, resulting in increased innovation and a reduction of risk.  Read Less
Like(0)  (0)

Linkedin Message

@Chris DeRamus, CTO and co-founder, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Organizations must change how they deploy and build apps entirely..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-lapse-exposed-weak-points-on-hondas-internal-network

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Chris DeRamus, CTO and co-founder, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Organizations must change how they deploy and build apps entirely..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-lapse-exposed-weak-points-on-hondas-internal-network

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
August 07, 2019

Capital One Suffers Data Breach Affecting 100 Million Customers

Organizations need to leverage AWS S3 access policies
In Capital One’s case, this was a misconfigured firewall that led to the exposure of an Amazon S3 bucket. But similar to S3 bucket configuration, firewalls can only be accessed by users explicitly given access. S3 buckets, however, by default, only grant access to the account owner and the resource creator, so someone has to misconfigure an S3 bucket deliberately to expose the data. As a most basic first step to avoiding S3 bucket leaks, companies need to take advantage of native AWS.....Read More
In Capital One’s case, this was a misconfigured firewall that led to the exposure of an Amazon S3 bucket. But similar to S3 bucket configuration, firewalls can only be accessed by users explicitly given access. S3 buckets, however, by default, only grant access to the account owner and the resource creator, so someone has to misconfigure an S3 bucket deliberately to expose the data. As a most basic first step to avoiding S3 bucket leaks, companies need to take advantage of native AWS capabilities to ensure they are purposefully using AWS S3 access policies to define who can access the objects stored within. Companies can then ensure their team is well trained to never open access to the public, unless necessary, as doing so can result in the exposure of PII and other sensitive data, and help prevent unauthorized access to your data by taking advantage of capabilities like AWS Config. The challenge is that many organizations, especially those in the financial industry, struggle to adopt and enforce best practices consistently, and only 100% consistency can ensure protection against a breach. For financial service organizations to take full advantage of the opportunities public cloud offers, they must ensure that clear cloud governance standards are defined and that they can present evidence of compliance to assessors and auditors. An investment in cloud operations is a vital additional step.  Read Less
Like(8)  (0)

Linkedin Message

@Chris DeRamus, CTO and co-founder, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Organizations need to leverage AWS S3 access policies..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/capital-one-suffers-data-breach-affecting-100-million-customers

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Chris DeRamus, CTO and co-founder, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Organizations need to leverage AWS S3 access policies..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/capital-one-suffers-data-breach-affecting-100-million-customers

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

David Kennefick, Solutions Architect, Edgescan

"Mac users are advised to update their operating systems and install an antivirus. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Lewis Jones, Threat Intelligence Analyst, Talion

"The Silver Sparrow malware comes with a mechanism to completely remove itself, which is usually utilised for high-stealth operations. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Amit Sharma, Security Engineer , Synopsys Software Integrity Group

"One of the most substantial security challenges organisations currently face is how to manage their legacy products. "

Experts Reacted On Retail Giant Kroger Data Breach

Chris Ross, SVP, Barracuda Networks

"Combatting the issue from a business perspective requires an overhaul of cybersecurity policy. "

Response Comment: Half Of Businesses Suffered A Cyber-Attack In Last 12 Months

Jake Moore, Cybersecurity Specialist, ESET

"Password checking tools are an essential part of account security. "

Expert Reaction On Google’s Password Checkup Feature Expanding For Android Users

Satnam Narang, Senior Research Engineer, Tenable

"Despite the exclusivity of Clubhouse being available on an invite-only basis and limited to iOS devices. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Simon Mullis, Director of Technical Account Management, Tanium

"Simple steps can be put in place by any company that experiences a data breach to ensure it doesn’t happen again. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Stephen Kapp, CTO and Founder, Cortex Insight

"Organisations would be well-advised to embrace secure-by-design practices to avoid similar incidents. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Jonathan Reiber, Senior Director of Cybersecurity Strategy and Policy, AttackIQ

"ATT&CK provides an inventory for adversary tactics, techniques, and procedures that any organization can adopt. "

Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing

Jake Moore, Cybersecurity Specialist, ESET

"Similar to when Zoom usage went through the roof, Clubhouse is experiencing a huge uptake and learning as it goes. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Nick Emanuel, Senior Director of Product , Webroot

"Clubhouse is currently riding a wave of popularity. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Greg Foss, Senior Cybersecurity Strategist, VMware Carbon Black

"For opportunistic cybercriminals, secondary extortion is the name of the game. "

Expert Comments On Secondary Extortion Attacks

David Stewart, CEO, CriticalBlue - Approov

"You can't keep scripts and bots out of your business. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Saryu Nayyar, CEO, Gurucul

"Unfortunately, cybersecurity is an afterthought for many developers. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Martin Jartelius, CSO , Outpost24

"It’s been a month from becoming aware of the breach to this wider disclosure, but it seems it’s been hard to establish who has been affected at all. "

Experts Reacted On Retail Giant Kroger Data Breach

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel