IT - Security

Why Monitoring Third-Party SSL Certificates Matters
Recorded Future, February 5th, 2020


"This week, Microsoft Teams - a workplace collaboration tool similar to Slack - went down for three hours. Users attempting to log in were met with a message stating that the app failed to establish an HTTPS connection.

The problem? An expired SSL certificate, which normally allows users to ensure a secure connection between a web browser and a web server..."


Professionals in the cybersecurity space are well aware of the skills gap, which has already left 4 million global jobs unfilled

"CISOs are already feeling the effects across their team, especially in their efforts to hire experienced professionals.

Closing the skills gap at your organization is becoming increasingly challenging as intense competition means many companies are priced out of hiring experienced talent based on their ability to get a higher salary elsewhere. Moreover, because the security space, and the responsibilities of those working within it, are changing so rapidly, it is becoming increasingly difficult for CISOs and hiring managers to articulate exactly what they need in a candidate..."


How CISOs Can Justify Cybersecurity Purchases
HelpNet Security, February 4th, 2020
Sometimes a disaster strikes: ransomware encrypts critical files, adversaries steal sensitive data, a business application is compromised with a backdoor...

"This is the stuff that CISOs' nightmares are made of. As devastating as such incidents can be, for the short time after they occur, the enterprise usually empowers the CISO to implement security measures that he or she didn't get funding for earlier.

Of course, waiting for disastrous events is a reckless and unproductive way to fund cybersecurity purchases. How can you make a proactive business case for justifying expenses that advance your security program? I have a few suggestions based on my prior consulting experience and my recent work as a CISO at a cybersecurity firm..."


When every employee is part of the security equation, having a security culture that includes education, collaboration between IT operations and security teams, and security tools is essential.

"Securing the enterprise is no easy task. With a huge workforce to train, hundreds or even thousands of devices to manage and protect, and forever evolving security threats - the job never stands still.

CSOs and CISOs rely on their strong network of information to keep their organization as secure as possible. IDG TECH(Talk) led a Twitter discussion, plus a live-streamed video, with security experts and tech industry watchers to talk about the state of enterprise security in 2020 and how to keep attackers out..."


For cities, states and towns, paying up is short-sighted and only makes the problem worse

"When it comes to ransomware attacks on municipalities, paying hackers isn't the right solution. First, there's no guarantee hackers will return sensitive data. Second, there's no guarantee cybercriminals won't leverage and monetize the data anyway, returned or not. To effectively fight back, we need to make ransomware payments illegal, and develop a strong industry of cyber professionals, a digital army of sorts, to proactively increase security awareness and data protection..."

At the end of 2019, Forbes identified data privacy and security as the most pressing issue in the upcoming decade

"The issue is already prevalent: Every day, a new story crops up about leaked, compromised, or misused data. While clicking through their often numerous social media accounts, consumers are providing these companies with more personal data. The growth of home security devices such as the Ring camera has also fed the collection of personal data into the surveillance economy..."

The Defense Department has issued the long-awaited cybersecurity standards that all must meet.

"On Jan 31, the Pentagon released the official version 1.0 Cybersecurity Maturity Model Certification. It requires any company that does business with the Department of Defense, primes as well as subcontractors, to meet to meet "at least a basic level of cybersecurity standards" when they respond to requests for proposals.

CMMC is informed by the National Institute of Standards and Technology's guidance on protecting controlled unclassified information (CUI) in non-federal systems and on security and privacy controls for federal systems. It outlines five levels of certification addressing both cybersecurity practices and processes..."


Which ten software vulnerabilities should you patch as soon as possible (if you haven't already)?

"Recorded Future researchers have analyzed code repositories, underground forum postings, dark web sites, closed source reports and data sets comprising of submissions to popular malware repositories to compile a list of the ten most exploited vulnerabilities by cybercriminals in 2019.

The list

The list is comprised of two vulnerabilities in Adobe Flash Player, four vulnerabilities affecting Microsoft's Internet Explorer browser, three MS Office flaws and one WinRAR bug:..."


Fresh Thinking On Cybersecurity Threats For 2020
SearchSecurity, February 3rd, 2020
It's a good time to take a clear-eyed view of the likely security threats facing your organization. But then what? Experts suggest getting creative with your threat responses

"Metaphors may be cheesy, but often they make total sense, especially when it comes to cybersecurity. For example, when eye doctors say someone has 20/20 vision, the person's vision isn't perfect, but it's enough to see an object from a distance of 20 feet. A cybersecurity program doesn't need to be perfect either. It needs to be sufficient enough to protect an organization's unique data and assets from cybersecurity threats..."

This podcast was produced in partnership with the CyberWire

"In our conversation this week, we discuss the challenges of reporting on a highly technical subject area, making your stories accessible to the general public, and having the courage to ask the obvious questions. We'll get his insights on being a good consumer of news, as well as his thoughts on where journalism is headed..."

Decomposing DevOps: What is and what is not DevOps?
Thursday, February 20th, 2020: 6:00 PM to 7:30 PM


TBD - Miami

Confused about DevOps and what it can do for you and your organization? Join us at our February 20 MeetUp, where we will decompose DevOps into what it is, we will identify the top three myths surrounding this topic, and will give guidance on how to keep learning more about DevOps.

Hosted by Rick Regueira from South Florida Agile Association


Best Antivirus Software: 13 Top Tools
CSO Online, February 7th, 2020
These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability

"The AV-TEST Institute recently tested the most popular Windows 10 client antivirus products on three primary criteria: protection, performance, and usability. Four of the 15 products tested earned a perfect rating of 6 for each of those criteria:

  • Kaspersky Small Office Security
  • Kaspersky Endpoint Security
  • Symantec Endpoint Protection
  • Symantec Endpoint Protection Cloud

The top 13 antivirus offerings shown here in alphabetical order scored at least 17 points out of a possible 18..."


Do you know how to use threat intelligence feeds to best effect in your company? Learn what this valuable yet often confusing resource can and can't do for cybersecurity

"In August, coordinated ransomware attacks hit municipalities and local government agencies hard in Texas. For example, the town of Borger, Texas, lost access to its vital statistics and utility-payment systems. Another town, Kaufman, couldn't use phones, access its systems or accept payments from its residents.

While better security could have helped each individual town detect an attack and, perhaps, avoid an infection, protecting the more than 1,200 towns and cities in Texas requires the ability to turn attacks seen by one municipality into threat intelligence that can protect every other town as well. The attackers' infiltration of systems in town offices, police departments and other organizations could have been detected, said Daniel Basile, CISO for the Rellis Campus of the Texas A&M University System, if information on the exploitation techniques and the indicators of compromise (IOC) had been collected from initial victims and shared..."

See all Archived IT - Security articles See all articles from this issue