
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics
On the issue of the platform being used by bots, adversarial groups, and others for purposes of information/hybrid warfare, that is already established fact. Anyone remotely informed on these issues can see it has a serious bot and abuse problem – that one could reasonably infer is not adequately being addressed nor the scope of which is being fully understood. Mudge was hired to do a job by the previous CEO on this issue and on the insider threat problem, but the patterns of interference many transformational CISOs face seem to have all been exhibited here. Anyone that cares about the mission we are on as a security community will want to see Mudge prevail for the good of the entire industry.
Twitter’s former head of security’s SEC filing presents an egregious pattern of security lapses. The alleged widespread lack of basic security hygiene and wilful neglect of best practices at Twitter is unfortunately all too commonplace in many organizations. These organizations are often faced with balancing an expanded security apparatus and a scalable revenue-generating product. Many of the shortcomings are readily addressable through various integrated security technologies that grow with the revenue-generating production environment, including visibility of all assets on the network and where they’re communicating. Instead, Twitter’s management policies may cost the company massive fines in light of the FTC’s 2011 consent order to create a comprehensive security program.Twitter’s former head of security’s SEC filing presents an egregious pattern of security lapses. The alleged widespread lack of basic security hygiene and wilful neglect of best practices at Twitter is unfortunately all too commonplace in many organizations. These organizations are often faced with balancing an expanded security apparatus and a scalable revenue-generating product. Many of the shortcomings are readily addressable through various integrated security technologies that grow with the revenue-generating production environment, including visibility of all assets on the network and where they’re communicating. Instead, Twitter’s management policies may cost the company massive fines in light of the FTC’s 2011 consent order to create a comprehensive security program.