background preloader

HTTB Morning Ed.

Facebook Twitter

Twitter Feed. Database security: At rest, but not at risk. Database security is starting to show up on the radar of C-level execs, and no wonder.

Database security: At rest, but not at risk

According to Verizon's "2012 Data Breach Investigations Report," 174 million corporate records were compromised in 2011 (the highest since 2004, according to the company), and in a survey by the Independent Oracle Users Group, 31 percent of respondents anticipated a major data breach this year. At the same time, most companies are still fairly low on the database security maturity curve, and so are just beginning to shift their attention from protecting the corporate borders to guarding the corporate jewels.

Businesses are faced with a heightened threat landscape, more sophisticated database attacks and an increased regulatory compliance burden, and Forrester Research predicts they will begin to spend more on database security, which now accounts for just 5 percent to 10 percent of their overall information security budgets. Here's a CISO's guide to database security options. Third-Party Tools vs. Morning Tech. With help from Erin Mershon, Jessica Meyers and Brooks Boliek PATENT VOTE PUSHED BACK (AGAIN) — The Senate Judiciary Committee will wait until at least Thursday to take a vote on its patent reform measure, several lobbyists close to the committee negotiations said, even as senators are set to come together this afternoon for a 2:30 meeting.

Morning Tech

Negotiators are still puzzling over several of the provisions expected in a manager's amendment, though that text could yet come before this afternoon. Either way, Senators are still set to discuss the state of negotiations and the agreement this afternoon, a committee aide said. Leahy, for one, is hoping to "begin consideration" of the entire package today, he said in a Monday statement.

Gun Control Amendment Slipped Into Cyber Security Bill   McCain’s Stance on Cybersecurity Is Wrong. There are few politicians–heck, few Americans, period–for whom I have greater respect than John McCain.

McCain’s Stance on Cybersecurity Is Wrong

Not only do I have endless admiration for his character, I find his policy judgment, especially in the national security area, to be close to faultless. Which may be just another way of saying I seldom disagree with him. But I find myself in disagreement with his stance on cybersecurity–as does one of his closest Senate colleagues, Joe Lieberman. Lieberman is co-sponsoring legislation that would allow the Department of Homeland Security to set minimal cybersecurity standards for air traffic control systems, dams, power plants and other such facilities that are absolutely essential to the safe functioning of the American economy. ManageFlitter - Work faster & smarter with Twitter. Twitter Feed.

Researcher demonstrates highly persistent hardware backdoor. Spurred by the conclusion of a recent report that said that given the fact that China is the de-facto manufacturer of most IT equipment in the world, it could easily backdoor any computer well before it's shipped to its buyers, security researcher Jonathan Brossard decided to prove the practicality of such backdooring.

Researcher demonstrates highly persistent hardware backdoor

He set out to create a backdoor that is persistent, stealthy, portable, cheap, that allows remote updates and provide remote access, and whose creation and deployment cannot be attributed to any individual or state. Federal News Radio. By LOLITA C.

Federal News Radio

BALDOR Associated Press WASHINGTON (AP) - The Pentagon is still grappling with how to write the rules of cyberwarfare, such as when and how to fire back against a computer-based attack, senior military leaders told Congress Wednesday. Four months ago the military's top cyberwarrior predicted the rules would be ironed out in a "month or two" and sent to other federal agencies for discussion. Sign In. Visualizing Malware Genomes - Advanced Visualization from Invincea. Data breaches and human error: avoiding the traps. 30 July 2012 Nick Banks of Imation Mobile Security, discusses how digital security can limit the damage caused by carelessness.

A day in the life of a U.S. drone operator. Risk intelligent governance in the age of cyber threats. Continuing reports of cyberattacks on high-profile businesses – as well as recent SEC guidance urging companies to consider disclosing cybersecurity incidents – are prompting boards of directors to start exploring cyber threat risk with their executive teams in earnest.

Risk intelligent governance in the age of cyber threats

However, at many companies, boards may experience unexpected challenges at the very first step: understanding the company’s current exposure to cyber threat risk and its effectiveness in managing it. The frequent problem is that, the greater a company’s need for effective governance over cyber threat risk, the harder it can be for boards to learn enough about the issue to provide it. Until a company reaches a certain level of sophistication, it simply may not have the language, metrics, or technology in place to offer boards clear answers about cyber threat risk exposure and effectiveness.

Fortunately, there’s a way out of the catch-22. To read more, download the complete article . . . . Former NSA Official Disputes Claims by NSA Chief. Gen.

Former NSA Official Disputes Claims by NSA Chief

Keith Alexander, head of the NSA and U.S. Cyber Command appearing at the 2012 DefCon hacker conference in Las Vegas on Friday. Photo: Kim Zetter/Wired LAS VEGAS — A former NSA official has accused the NSA’s director of deception during a speech he gave at the DefCon hacker conference on Friday when he asserted that the agency does not collect files on Americans. William Binney, a former technical director at the NSA, said during a panel discussion that NSA Director Gen.

Twitter Feed

High Technology Threat Brief (HTTB) The evolving threat landscape from mischievous attacks to cyber war and espionage. High Technology Threat Brief (HTTB) 8.7 million mobile customers hacked in S. Korea. Security 2012: Prepare for rogue employees before they strike - MIS Asia. New Tool From Moxie Marlinspike Cracks Some Crypto Passwords. 1,500 severe security events detected on Black Hat WLAN. About Computer Forensics And Cyber Crime – TECHNOLOGY MEDIA. The evolving threat landscape - from mischievous attacks to cyber war and espionage.

July 30, 2012 The evolving threat landscape - from mischievous attacks to cyber war and espionage Cyber attacks are becoming increasingly visible to the public, with high-profile breaches and ongoing commentary from large organisations such as Google and the UN frequently making headlines.

The evolving threat landscape - from mischievous attacks to cyber war and espionage

When it comes to cyber crime, we are currently seeing a shift from unwitting individuals being targeted for relatively low financial gain (i.e. through credit card fraud) to large corporations or indeed governments being hit due to the high pay-off intellectual property (IP) and sensitive information that they hold. The tactics used by hackers have also evolved from hit and miss attacks, to targeted intelligence gathering on specific victims to state-sponsored espionage, where the hackers' aim is not so much to acquire specific information, but rather to opportunistically gather IP and trade secrets indiscriminately across the target industry. High Technology Threat Brief (HTTB) Digital Forensics, Inc. Pro tips from social engineering hackers. Hakin9 Exploiting Software July 2012 Issue is out! « CYBER ARMS ...

Digital Forensics, Inc. Taking USB Attacks To The Next Level – Dark Reading. Journey Into Incident Response: Malware Root Cause Analysis. What are the most Popular Approaches to Commit Identity Theft or ... High Technology Threat Brief (HTTB) High Technology Threat Brief (HTTB)

High Technology Threat Brief (HTTB) High Technology Threat Brief (HTTB) Hackers publish AAPT data in protest over web spy plan - Sydney Morning Herald. Digital Forensics, Inc. Pro tips from social engineering hackers. Digital Forensics, Inc. 8.7 million mobile customers hacked in S. Korea. 'Spoofing', 'Phishing' and 'Link Altering' – Nike Air Costly Financial ... Phishing Sites Reach All Time High : #TheFraudTube.