WebProNews

Tag: Internet Security

  • Cybersecurity is Rapidly Changing

    Cybersecurity is Rapidly Changing

    “We cannot control our adversary,” says Rick McElroy, Security Strategist for CarbonBlack, a leading next-generation cybersecurity firm. “Although we can choose to control them once in our environment. We have little to no control over when the “big attack” happens. For too long I think we have focused so hard on finding the adversary that our internal threat intelligence has suffered as a result”. Sharing threat intelligence has gotten easier. Vendors have done a ton to allow teams to cultivate and exchange threat intel and while there is always more work we have abandoned the one thing we have a hope of controlling. The home field advantage.”

    Editor Note: CarbonBlack is offering a free webinar on why companies are moving toward next-generation security here:

    Free Webinar: Why Companies are Replacing AV with Advanced Endpoint Protection

    McElroy adds, “I have heard major CISOs sit in a room and say “asset management is impossible, so why try?” How is this what a leader would say? Yes, this thing we do isn’t easy but giving up is a sure fire way to never achieve a strategic goal.”

    “It’s time we bring this to all defenders, not just customers of a certain organization. Carbon Black is on a mission to make the world safe from cyber attacks. To achieve this mission, we need every one of us sharing and helping quiet the noise. We need application developers and threat hunters on the same page. We need to unite as a community.”

    Traditional AV is Falling Short

    Just about every enterprise company is feverishly working on implementing next-generation solutions to protect against internet threats. The primary reason is that traditional AV software is no longer effective enough:

    First, let’s look at why traditional AV is falling short against the cyber-attacks organizations face today. Traditional AV technologies still rely on a signature-based approach that can only identify known threats. Attackers can run circles around this approach by making small tweaks to their malware in between signature updates; this allows them to operate with impunity while organizations scramble to deploy new updates.

    In short, traditional AV leaves organizations one step behind the attacker. Making matters worse, a signature-based approach cannot detect modern attacks that do not write files to disk (so-called file-less attacks) or techniques that use trusted system tools like PowerShell to perform malicious actions. In order to combat the shortcomings of traditional AV, organizations must ensure that they have AV technology that takes a proactive approach to cybersecurity. – Dan Larson, Vice President Product Marketing at CrowdStrike via Security Ledger.

    The Security Fight Has Escalated

    “Nearly 20 years ago, viruses such as the Melissa virus and Love Bug worm were causing millions of dollars’ worth of damage, hijacking email servers, corrupting corporate and government documents, and forcing systems to shut down,” stated Martin Borrett, IBM Distinguished Engineer and CTO IBM Security Europe. “Today, cybercrime is a global plague that will cost the world economy $6 trillion annually by 2021, according to Cybersecurity Ventures.”

    Borrett added, “As cybercriminals, nation-state attackers and hacktivist groups have become more sophisticated, the security industry has grown up to defend our national security as well as the vital interests of businesses and consumers. Gradually, the battle between attackers and defenders has become something akin to an arms race: New types of attacks lead to new defenses to block them. Security innovations become outdated as soon as attackers find ways around them. Meanwhile, cyberattackers continue to rely on social engineering tricks that are hard to defend against.”

    New Cybersecurity Approaches Are Clearly Needed

    According to Dr. Kirk Borne, Principal Data Scientist at Booz Allen, what’s needed is for companies to modernize their current cybersecurity defenses:

    For modern cybersecurity operations to be effective, it’s necessary for organizations to monitor diverse data streams to identify strong activity signals. This includes monitoring network traffic data to find well-known patterns of common adversary activities, such as data exfiltration or beaconing. While these detection techniques are critical to cybersecurity operations, it is imperative to leverage such signals to predict future activities. Further capabilities could even be created to modify the behavior of the actor (or analyst) to the benefit of the organization and mission. This could include systems on networks that are trained to autonomously take action, such as blocking access to resources or redirecting traffic, based on a predicted behavior.

    Modern attackers are too agile and creative for organizations to rely on passive descriptive analytics or reactive diagnostics techniques for protection. Rather, building an ability to forecast future outcomes through predictive analytics that utilize prior knowledge of events, particularly the precursor signals evident before an attack, are proactive measures. – Dr. Kirk Borne via a recent post on O’Reilly Media.

  • The State of IT Security [Infographic]

    We all know about threats to the valuable data we store everyday, we hear about them all the time. There’s always some anonymous hacker shutting down a website, or publishing someones private data. It’s just something that has become part of living in the age of information. After all, you can’t have so much information so readily available and not have it fall into the wrong hands once in awhile.

    Unfortunately, there’s a lot more to data breaches than just the hacks we hear about in the press. Verizon has taken a particular interest in tracking breaches of data and has been doing so since 2004. You might not be surprised to learn that last year, 2011, was the second highest year for breaches ever.

    The breaches occurred in all kinds of industry including; banking, healthcare, retail, information management, food service, and probably just about any field you can think of. They also happened all over the world. So what can be done?

    This next infographic from Backgroundcheck.org gives us the lowdown on where these breaches are happening, what we can do to better protect ourselves, and what these breaches are costing us. Everybody should take a look at this one, it’s packed with useful data management information.

    Check it out:

    Data Breaches

  • At Least Five Major Web-Security Companies Will Not Help Pakistan Censor The Internet

    At Least Five Major Web-Security Companies Will Not Help Pakistan Censor The Internet

    At least five major companies offering information security products will not submit bids to the Pakistani government, which has been openly seeking an internet censor since February.

    San Diego-based Websense was one of the first to openly reject the offer, announcing in a March 2nd statement: “Websense will not submit a response to this request for proposal (RFP), and we call on other technology providers to also do the right thing for the citizens of Pakistan and refuse to submit a proposal for this contract.” McAfee, Inc. became one of the latest technological providers opting not to bid on the controversial contract. The company announced its position via tweet on Monday:

    Update for our followers: McAfee has confirmed that it is not pursuing the Pakistan Firewall RFP. 3 days ago via HootSuite ·  Reply ·  Retweet ·  Favorite · powered by @socialditto

    Free speech advocacy groups like the Electronic Freedom Foundation and the Center for Democracy and Technology and the Electronic Freedom Foundation are backing a Pakistani rights group, Bolo Bhi, in a campaign against the government’s request for proposal. The free speech organization, whose name means “Speak Up,” has made a direct appeal to eight internet security companies, asking them not to submit proposals to Pakistan’s government. Moreover, they encourage the companies to make public their rejections of the proposal. The idea is that, while companies considering the proposal might not be so keen to announce their plans, if enough of their competitors openly reject the bill, Pakistan’s potential internet censors will stand out by their silence. Those companies, by consequence, could be the recipients of a lot of negative PR soon.

    In addition to Websense and Mcafee, Cisco, Sandvine, and Verizon are among the major companies who have taken a public stance against Pakistan’s proposal.

    At present, Blue Coat Systems, Netsweeper, Huawei and ZTE, have remained conspicuously silent about the matter.

    [Via: NY Times Bits.]

  • EFF Releases HTTPS Everywhere Extension For Firefox, Chrome

    EFF Releases HTTPS Everywhere Extension For Firefox, Chrome

    Like it or not, the internet is changing. We who use the internet have passed into the era of uncertain privacy and questionable surveillance of our online activities. Rather than await the full implications of what the Googles and Facebooks are doing with our private information, the Electronic Frontier Foundation and Tor have partnered to not only encourage internet users to take a more proactive role in protecting their internet security, but offered a few tools to help out with the task.

    For those that don’t know, Tor is basically the internet’s shadow: it’s a network of “virtual tunnels” that allows users to enhance their privacy on the internet by preventing “traffic analysis,” a common form of internet surveillance used by pretty much any entity with the means and determination to find out what you’re doing on the internet.

    One of the first and best ways in which people can increase their level of online security is by installing a new browser extension for Firefox and Chrome called HTTPS Everywhere. The extension “encrypts your communication with many websites and, in conjunction with Tor, helps to protect your anonymity online.” HTTPS Everywhere will most notably improve your online security against anybody that’s snooping around on your wireless network, plus it’ll protect you against any eavesdroppers hanging around on the network you’re using to communicate with a website.

    To better understand how HTTPS and Tor can level up your online security, EFF put together an interactive graphic to help you answer any lingering questions you may have about what HTTPS is, why you need to be concerned about the vulnerability of your online privacy, and how these guidelines will keep you safer and sounder.

    As we slouch onward into this new age of online hyper-surveillance, the old maxim “better to be safe than sorry” can not be valued enough.

  • Google Chrome Gets Endorsement From German Government

    Google’s adoration from governments is no longer limited to the United States because now they’ve earned some love from Germany. In a statement released this week, the Federal Office for Information Security made several recommendations for PC users running Windows on how to use the Internet safely. Several topics are covered, such as virus protection software and ISPs, and when it came to selecting the browser that would provide the most protection against cyber attacks, they recommended Google Chrome.

    From the release (I don’t read German and so this is translated using Chrome’s built-in translating device so I remove myself from any responsibility for awful translations):

    By using Google Chrome in conjunction with the other measures outlined above, you can reduce the risk of a successful IT greatly reduce attack.

    Equally beneficial in Google Chrome is the auto-update feature, which also integrated the Adobe Flash Player covers. Thus, the Adobe Flash Player is kept up to date.

    The report goes on to say other encouraging things about Chrome, such as calling it a “central component for using any online service.” Google accepted the endorsement graciously (is there any other way to accept praise, though?) in a post to their official blog earlier today:

    Security has always been a core focus of Chrome, so we’re particularly honored to see several of its security benefits recognized in the report.

  • Good To Know: Google Advertises Offline To Attract People Online

    If it starts to look like the things you typically see online are starting to spill over into Real Life, you’re not imagining things. For one reason or another, Google has decided to launch an in-print and outdoor ad campaign to promote their Good to Know campaign, a mission to “help people stay safe on the Internet and manage the information they share online.”

    According to Ad Age, Google is running print ads for their Good to Know with USA Today, The Wall Street Journal, and USA Today. Google’s own Good to Know site states that the advertisements will also appear on public transport and, yes, online. It’s basically Internet Safety 101 to help newbies avoid getting drained by online vampires (not real vampires, for any newbies reading this – there are no vampires on the Internet. Promise).

    The campaign is segmented into four areas regarding staying safe on the Internet and successfully keeping one’s personal information secure. The first, perhaps best considered the primer for understanding Internet security, is simply called “Stay safe online” and contains a list of online jargon (e.g., malware, spyware, phishing), ways to look out for yourself, password security, and so on. The main course of Internet safety, if you will. The accompanying video should help newbies catch on:

    Following that, other topics include how your data is used online, how Google uses your data, and how to manage your data. Again, Google provides another video via their campaign:

    The ads themselves are pretty benign, almost child-like in their aesthetic. It’s pretty disarming if not outright inviting. Some examples of what you can expect to see from these print ads:

    That’s a pretty and fun welcome manual to the Internet, yeah?

    So now for the question such a marketing campaign begs: Why would Google, the company many people tend to think as synonymous with the Internet, take out ads in newspapers and outdoor billboards? My thinking on it is thus:

    People who are regular Internet users likely already have this whole Internet safety/security message down cold. However, there are people who don’t use the Internet regularly and, due to all news being bad news these days, probably only hear mostly bad things coming from this Internet place. Identities stolen, loved ones stalked, bank accounts emptied, dogs and cats living together, etc. This class of advert, methinks, is directed at those people uninitiated in the ways of the Internet and hopes to assuage any of the trepidation and intimidation when they are confronted with Internet.

    And the more people that are online, the more Google stands to gain. So why compete with the Facebooks and Twitters with long-time Internet users if you can just create a new pocket of Internet users while painting yourself as the good guy at the same time?

    Pretty clever, Google. Pretty clever.