Skip to main contentdfsdf

Jeff Walzer's List: Security

    • IT security executives must begin using more progressive risk management techniques if they ever hope to get ahead of data  breaches, malicious attacks and emerging compliance regulations.
    • Most businesses are already collecting volumes of data that could be put to use in making more informed decisions about IT security and management, but they simply don't know how to put the information to work in a manner that will allow them to do so, according to the  expert.

    2 more annotations...

    • The reality of security is mathematical, based on the probability of different  risks and the effectiveness of different countermeasures.
    • But security is also a feeling, based not on probabilities and mathematical  calculations, but on your psychological reactions to both risks and  countermeasures.

    44 more annotations...

    • fewer businesses are utilizing a strategy that approaches IT risk as a stand-alone skill set or initiative
    • "IT risk doesn't necessarily equate to security risk. That's a big shift, and the key takeaway is that organizations are getting  more mature around the portfolio of risks they have to manage,"

    4 more annotations...

      • however, the Web Application Firewalls?  Talk about products with a poor  track record.  Also let’s think about what Web Application Firewalls are  good at, signature-based protections.  So, yeah, they’ll help with XSS and  SQL Injection, although I’ll go to the grave saying they don’t prevent the  issues entirely, but they have absolutely no capability to find a huge number of  very serious security flaws, such as (off the top of my head and in no specific  order):

         
           
        1. Authentication issues  
        2. Authorization issues  
        3. Arbitrary File Upload/Download  
        4. Cross-Site Request Forgery  
        5. Improper Error Handling  
        6. Flawed Business Logic
    • so, too, can IT officials thwart breaches by customizing security plans for  individual employees in every zone of their companies
    • The lessons we learn from craps pits and blackjack tables reveal that it's never  wise to entrust your business's most valuable or vulnerable assets to a single  employee. Instead, compartmentalize access whenever possible, and never hesitate  to look over employees' shoulders

    2 more annotations...

    • encrypting card numbers on point-of-sale devices is "the most significant  action" that retailers can take to stop attacks such as the one that hit  Hannaford, said Gartner Inc. analyst Avivah Litan.
    • But that doesn't necessarily mean that the new security measures will make  Hannaford -- or other companies that follow its lead -- immune to future  attacks.

    1 more annotation...

    • The strategy of threat prediction suffers from two major flaws. First, it  assumes predictability in a field that is full of surprises.
    • New attacks are not designed in a vacuum; they are designed explicitly to  sidestep our expectations.

    5 more annotations...

    • Associated risks include:

       

      -- Data loss through unmonitored and/or unauthorized file transfers

       

      -- Compliance violations, both with internal policies and external  regulations

       

      -- Business exposure from malware propagation or application vulnerability  exploits

       

      -- Operational cost increases due to higher bandwidth consumption and added  IT expense

       

      -- Lost productivity from excessive use of personal applications

    • Surprisingly, the answer has more to do with management methodology than  security technology.
    • it’s not necessarily that a product failed. It’s not necessarily that an  individual failed. It’s that the process failed. There was no end-to-end  workflow and nobody understood where the break points were in the process.

    1 more annotation...

    • Organizations today must protect sensitive data by first identifying where this  data is, then determining who can access it.
    • Data discovery or content inventorying is the first step organizations must take  to determine what content exists where.

    1 more annotation...

1 - 20 of 31 Next ›
20 items/page
List Comments (0)