×Close
Forgot Your Password Message:
Close
×Close
Close
×Close
Close
×Close
×Close
The breaches of the infidelity-focused online dating service Ashley Madison and toymaker VTech illustrate just how bad the data-breach epidemic got in 2015.
"What those breaches have in common is they exposed information, including people's personal data, in perhaps unexpected and alarming ways,"DataBreachToday Executive Editor Mathew J. Schwartz says in a year-end audio blog (click player below image to listen). Plus, the organizations storing the information apparently failed to adequately secure it in the first place.
In the blog, Schwartz also:
Explains how Ashley Madison's marketing suggested that clients' personal information would be secure, even though it wasn't; Analyzes the approach VTech took to secure data that raises questions about the security of all of its Internet-tied products aimed at children; and Asks what else regulators or legislators should be doing to close the gap between how products are marketed, and how they actually perform, from a security standpoint."The big takeaway is ... don't assume anything is secure until proven otherwise," Schwartz says. "Anything that is Internet-connected, don't trust it without guarantees."
Cybersecurity , Data Breach , Risk Management
Your Cybersecurity Forecast: Current Threat Trends and Insights for 2015 and BeyondAddressing the challenges of how to better defend against and more rapidly detect data breaches involves much more than buying the latest technology, says security expert Haroon Meer.
"We are hyper-obsessed with the latest [technology], and so, as an industry, we get pretty caught up in just about whatever the industry is selling," says Meer, who heads Johannesburg-based security firm Thinkst Applied Research.
Meer delivered the opening keynote speech at the recent Black Hat Europe 2015 briefings, focusing on how self-defeating behaviors can sabotage information security professionals' ability to do the right thing (see 5 Secrets to Security Success).
"We keep moving on as we try to solve new, shiny problems, which we then half solve, but we still haven't completely solved problems that we knew about 20 years ago. And we are still getting actively taken out by those old problems," Meer says in an interview with Information Security Media Group. "So in the end you end up with an enterprise full of half-implemented solutions, which half-protect you from something, and that sort of half-protection doesn't hold up against determined attackers."
In this interview (see audio link below photo), Meer also discusses:
Basic security defenses, such as segmenting networks and restricting admin-level rights, that too many organizations still lack; The importance of focusing on breach-detection speed; Customizing security to fit each organization's requirements.Meer is the founder of Thinkst Applied Research. He previously served as the technical director and CTO for information security consultancy SensePost. Meer has contributed to books on information security, published a papers on various information security topics and regularly makes presentations at conferences around the world.