Courts Uphold FTC Regulation-Punishment to Negligent Company

Threatpost has the story:  https://threatpost.com/court-rules-ftc-has-authority-to-punish-wyndham-over-breaches/114390 From the court brief http://www2.ca3.uscourts.gov/opinarch/143514p.pdf are some interesting snippets:   Let’s list the cybersecurity problems that Wyndham had: Stored CC data (which is a violation of PCI standard) Passwords were simple (Example: “micros” in a Micros computer default pw) Did not use firewalls between their corporate network, property management system, … Read more

DefCon Talk Your: Domain is Compromised “Now What”?

  Grant Bugher with perimetergrid.com had a talk on the DEFCON101 track.  “Obtaining and Detecting Domain Persistence” As the slide above states, it is not about _how_ to hack a domain. But assuming someone has – now what? 1st Process start command line logging  and PowerShell logging enabled on all systems. 2nd SysMon(Sysinternals Monitoring Service) … Read more

Security Policy Can Save You

There are many sites with security policies on the Internet, such as Universities recommending what to do and not do. http://sites.gse.harvard.edu/its/top-10-security-dos-and-donts http://www.feinberg.northwestern.edu/docs/mis/General_Security_Policy.pdf A security policy is a guideline to employees and users of network and computing resources for the safety and security of data and resources. It is good to know what one is supposed … Read more

Security Saves From Breach Affects

  I am always working on trying to explain how better security can save your company from headaches and certain disaster in the future. While also figuring out why people are just not paying attention to security in general. And as they say a picture says a thousand words. So lets discuss my little pie … Read more

If Firewall Does Intrusion Prevention & Fails – Now What?

“Detection is a Flawed” Strategy by Simon Crosby at Dark Reading: http://www.darkreading.com/endpoint/times-running-out-for-the-$76-billion-detection-industry/a/d-id/1321381 Simon goes over the problems we have had including the Target failure, where the malware was detected but not acted upon (2014).  So the Firewall Industry does sell a difficult job – they do know that breaches occur, there will be breaches. (image … Read more