What's New Major data breaches are happening all the time. Just last week, more than two million passwords from Facebook, Gmail, Twitter and other accounts were stolen by hackers who installed keylogging malware on millions of computers. Last month, Adobe's mega-breach reached 150 million user records, a hack some are calling the largest in history. We all read about the breaches, but what happens after the breaches? What actions do enterprises take to mop up the mess? ThreatMetrix has put together an infographic that details what happens after the media spotlight has faded.  Read more about: Adobe, data breach back to top | This week's sponsor is HP. |  | Ponemon Report: 2013 Cost of Cyber Crime study According to the Ponemon Institute’s 2013 Cost of Cyber Crime study, the average cost to businesses of cyber crime is more than $7M per year—a 30% increase over last year. Read the study now for all the details. | The Security for Business Innovation Council, made up of security leaders from Global 1,000 companies, issued a report on Tuesday warning that outdated security processes are hindering business innovation. "The ad-hoc processes put in place for the days of perimeter-based security can't handle the scale and complexity of managing cybersecurity risks for a global enterprise today," the report, which was prepared in cooperation with security firm RSA, observes. The council calls on IT security teams to collaborate more closely with functional business groups to identify, evaluate and track cyber risks. The report identifies areas for security process improvement, including risk measurement, business engagement, control assessments, third-party risk assessments and threat detection. The council also offers five recommendations for how to move IT security programs forward: - Shift focus from technical assets to critical business processes--expand beyond a technical view of protecting information assets and get a broader picture of how the business uses information by working with business units to document critical business processes;
- Institute business estimates of cybersecurity risks--describe cybersecurity risks in quantified business terms and integrate these business impact estimates into the risk advisory process;
- Establish business-centric risk assessments--adopt automated tools for tracking information risks so business units can take an active role in identifying and mitigating risks and thus assume greater responsibility for security;
- Institute evidence-based controls assurance--develop and document capabilities to amass data that proves the efficacy of controls on a continuous basis; and
- Develop informed data collection techniques--develop a data architecture that can enhance visibility and enrich analytics and consider the types of questions data analytics can answer in order to identify relevant sources of data.
For more: - read the council's report Related Articles: IT risk management spending to reach $71.1B, says IDC Firms can't outsource security oversight and risk, warns Manulife's CISO Q&A with Steve Durbin of the Information Security Forum Read more about: RSA, Microsoft, Apple, NSA back to top Microsoft, Mozilla and Opera have followed Google's lead and revoked rogue digital certificates issued by a subordinate certificate authority of the French cybersecurity agency ANSSI, Computerworld reports. After a four-day probe, Google found that unauthorized digital certificates had been issued for a number of Google domains by an intermediate CA linked to ANSSI. In response, Google decided to revoke the certificates. "ANSSI has found that the intermediate CA certificate was used in a commercial device, on a private network, to inspect encrypted traffic with the knowledge of the users on that network. This was a violation of their procedures and they have asked for the certificate in question to be revoked by browsers," Adam Langley, security engineer with Google, explained in a blog. Following Google's announcement, Microsoft issued on Monday updates for Windows Vista, Windows 7, Windows Server 2008 and Windows Server 2008 R2 that revoked the fraudulent certificates. However, no update is being issued for Windows XP or Windows Server 2003. "The improperly issued subordinate CA certificate has been misused to issue SSL certificates for multiple sites, including Google web properties. These SSL certificates could be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against several Google web properties. The subordinate CA certificate may also have been used to issue certificates for other, currently unknown sites, which could be subject to similar attacks," the Microsoft security advisory explained. Mozilla said it would revoke the rogue certificates in Firefox 26, which is scheduled to ship on Tuesday. Opera blacklisted the rogue certificates for older versions of its browser, but said users of the most recent version of its browser, Opera 12, were already protected because Opera 12 "did not trust ANSSI to begin with." For more: - read the Computerworld article - check out the Google blog - see Microsoft's security advisory Related Articles: Google to limit digital certificates to 5 years Emergency Alert System vulnerable to hijacking, warns IOActive Read more about: Microsoft, Google back to top Second place McAfee has pulled into a virtual dead heat with Blue Coat at the top of the content security gateway market, according to third quarter revenue stats from Infonetics Research. Cisco, Websense and Symantec are all bunched together behind the market leaders, the market research firm notes. Overall, the market's revenue totaled $694 million in the third quarter, about the same level as the previous quarter. The content security gateway products provide security for firms' web and email traffic, such as spam and virus filtering. "Faced with a rapidly-changing threat landscape and a dizzying array of security choices, service providers are dialing back spending as they formulate their long-term protection strategies, leaving the content security market basically flat," says Jeff Wilson, principal analyst for security at Infonetics Research.  One content security gateway market segment that is growing is software-as-a-service, which saw a 29 percent year-over-year jump in sales in the third quarter. Another segment, content security gateway software, makes up one third of market revenue. "SaaS continues to be a real bright spot in the content security market, and we look for this segment to top $1 billion by 2017," adds Wilson. For more: - see Infonetics' release Related Articles: Microsoft leads growing SaaS content security market, says Infonetics Worldwide IT security spending to reach $30.1 billion in 2017, says Canalys Read more about: cisco, McAfee back to top IT risk management spending is forecast by IDC to reach $71.2 billion in 2014, 16.5 percent of all IT spending. That amount will increase to $87.4 billion by 2017, increasing at a 7 percent compound annual growth rate, IDC predicts. Risk management is core to business strategies across the banking, capital markets and insurance sectors, the research firm notes. "Regulatory pressures, tightening, and oversight resulting from the financial and economic upheavals of the past decade and the first three years of the current decade continue to be prime motivators for risk management investments," says Michael Versace, global research director for IDC financial insights. "Risk IT strategies and investments over the forecast period will remain critical as policymakers around the globe stay focused on capital buffers, trade transparency, accounting and reporting improvements, internal control and IT system continuity, third-party risk, financial crime and fraud, and the impact of cyber threats on the safety and soundness of the financial marketplace," he says. According to a recent survey by consulting firm Nexia, 48 percent of companies plan to increase spending on risk management next year, while another 48 percent plans to maintain the same level of investment. Nexia surveyed 73 companies and more than 40 advisory firms in 23 countries. While two-thirds of the companies said they have a formal risk assessment process in place, 57 percent of companies have yet to put a formal risk management training program in place and 38 percent of companies say risk tolerances are only reviewed annually or less frequently. For more: - see IDC's release - read the Nexia report Related Articles: Cloud-based security to spur growth in specialized threat analysis and protection market BYOD, IoT among security risks to enterprises next year, says ISF Firms can't outsource security oversight and risk, warns Manulife's CISO Read more about: Risk Management, IDC back to top |
No comments:
Post a Comment
Keep a civil tongue.