I can also be found writing on BH Consulting as Brian Honan's Social Media manager as well as appearing on Naked Security.




Survey: 80 Percent Of IT Security Professionals Say They Can Detect A Data Breach On Critical Systems Within A Week

Tripwire, Inc. today announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, Nevada.

Industry research shows most breaches go undiscovered for weeks, months or even longer. Despite this evidence, 51 percent of respondents said their organisation could detect a data breach on critical systems in 24 to 48 hours, 18 percent said it would take three days and 11 percent said within a week.

According to the Mandiant 2014 Threat Report, the average time required to detect breaches is 229 days. The report also states that the number of companies that detected their own breaches dropped from 37 percent in 2012 to 33 percent in 2013.

Dwayne Melancon, chief technology officer for Tripwire commented:

“I think the survey respondents are either fooling themselves or are naively optimistic. A majority of the respondents said they could detect a breach in less than a week, but historical data says it is likely to be months before they notice.”

When asked to name the top challenges in detecting data breaches quickly, 34% of respondents identified too much data, specifically too many alerts and false positives, and incomplete visibility across their network and endpoints as key limiting factors.

Melancon continued:

“The problem is not just ‘too much data’ as the survey indicates – the bigger issue is that most organisations are ignoring the foundational security controls needed to run a secure infrastructure. Organisations must shift their focus from hoping they will notice breaches ‘in the moment’ to reducing their attack surface through configuration hardening and proactive vulnerability management. Once they have taken these steps, they can implement a continuous monitoring approach that detects suspicious changes and activity on their systems. This approach reduces noise and dramatically increases the accuracy of the alerts, enabling them to detect and respond to breaches quickly.”

Heartbleed Research Shows Top Companies Are Slow To Mitigate Threat

According to Venafi, 97% of Global 2000 organisations’ public-facing servers remain vulnerable to cyber attacks due to incomplete Heartbleed remediation. This leaves the door open for attackers to spoof legitimate websites, decrypt private communications, and steal sensitive data sent over SSL. Undiscovered for over two years, Heartbleed is an OpenSSL vulnerability that allows attackers to [...]

Continue

Emmental, The Swiss Cheese Of Banking Security

Researchers at Trend Micro have discovered a new attack centred around a hole in Android-based two factor authentication systems used by some banks in Austria, Japan, Sweden and Switzerland. The attack begins in a familiar way – the prospective victim will receive a phishing email that will appear to be from a well-known and reputable site. [...]

Continue

Brits Abroad: Workaholic Holidaymakers Take Their Insecure Practices And Devices With Them

With the schools out for summer, it’s time for Brits to pack up their suitcases and jet off to sunnier destinations, and a new July 2014 survey from ESET in conjunction with One Poll has revealed most people won’t be forgetting their work-enabled mobile device in their luggage this year, with the anticipation of having to [...]

Continue

Infosec And Diversity

When I was younger I lived on the Essex/Suffolk border in an area probably best described as farmland. My village was what you may call ‘quaint’, consisting of a post office, four pubs, a great river for fishing in and nothing much else besides open space. It was so quiet and peaceful that the local police [...]

Continue