What’s Hiding Behind that DDoS Attack?

Multi-vector patterns of DDoS attacks are becoming more commonplace in the world of cyber warfare. From the volumetric attacks aimed to fill your pipe and squeeze your Internet bandwidth down to nothing, to the low and slow application layer attacks that sneak right through traditional defenses – combination attacks are becoming the norm. When peeling back the onion a bit to try and understand the motivations, but also the collateral damage, an interesting trend is coming to light.

DDoS attacks are increasingly used as a smokescreen to camouflage other cyber-attacks, including data breaches and  financial fraud. The disruption caused by the DDoS attack can expose weaknesses in organizations’ cyber defenses or overwhelm other security tools, like firewalls or IPS/IDS, opening the door for cyber criminals to plant malware or steal sensitive information. Read more

Posted in Data Protection, DDoS, Governance, Risk and Compliance, Network Security, Security Management, Security Threats, Uncategorized | Tagged , , , | Leave a comment

What’s Hiding Behind that DDoS Attack?

Multi-vector patterns of DDoS attacks are becoming more commonplace in the world of cyber warfare. From the volumetric attacks aimed to fill your pipe and squeeze your Internet bandwidth down to nothing, to the low and slow application layer attacks that sneak right through traditional defenses – combination attacks are becoming the norm. When peeling back the onion a bit to try and understand the motivations, but also the collateral damage, an interesting trend is coming to light. Read more

Posted in Data Protection, DDoS, Network Security, Security Management, Security Threats, Uncategorized | Tagged , , , , , , | Leave a comment

Communications Teams Get a Failing Grade Over Heartbleed

First of all, let me say thank you to the security professionals who are working their butts off to develop patches and permanent fixes for problems caused by Heartbleed. I know this is an extraordinary case of the highest priority. Thank you for using your talents and your time to plug this gaping hole and make your users safe again.

That said, I must criticize you for not engaging your colleagues on your communications team to keep your customers apprised of the situation. If ever there was a time to talk directly to consumers about computer security, this is it. Consumers are wholly confused and a little scared by this situation and they don’t know what to do—if anything. Read more

Posted in Data Protection, Governance, Risk and Compliance, Security Management, Security Threats, Uncategorized | Tagged , , | Leave a comment

What’s Needed Now: Supply Chain Integrity Testing

Listen up, all you security experts who want to be an entrepreneur! John Pescatore, the SANS Institute Director of Emerging Security Trends, sees an opportunity for the Next Big Thing in tech security. In Pescatore’s view, there’s a growing need for supply chain integrity testing.

In the wake of all the digital spying revelations let loose by the Edward Snowden documents, there is now a general lack of trust in the hardware and software that we all use to build and manage our networks. Read more

Posted in Governance, Risk and Compliance, Network Security, Security Management, Security Threats, Uncategorized | Tagged , , | Leave a comment

Attack of the Month Video Blog Series: Network Layer Attacks In ICS

In the world of Industrial Control Systems (ICS)  system outage or infiltration can result in system downtime, loss of productivity and loss of revenue, as well as loss of confidentiality, integrity and availability. Additionally, system outage or infiltration could possibly result in loss of life often due to the critical nature of these devices. Together, lack of access to critical ICS components and lack of visibility of the operational performance of these components can create a dire situation for those that are tasked with ensuring the safety of these systems. Read more

Posted in Data Protection, DDoS, Governance, Risk and Compliance, Network Security, Security Management, Uncategorized | Tagged , , , , , | Leave a comment

Who Are Breach Disclosure Laws Meant to Protect? One Merchant Held up Notifications for More Than a Year at the Request of Federal Authorities

I live in Texas, and there’s a regional retailer that has just announced a data breach that is believed to have affected more than half a million customers. The announcement is controversial because the company, Spec’s, supposedly knew about the theft of payment card data almost a year ago and is just now telling customers. As you might imagine, people affected by this breach are rather upset.

Let me lay out the details, as reported by the Houston Chronicle newspaper. (I have no first-hand knowledge of this breach, although I am a Spec’s customer and could possibly be a victim of the breach. I have not received any such notice, though.)

Read more

Posted in Data Protection, Governance, Risk and Compliance, Security Management, Security Threats, Uncategorized | Tagged , , , | Leave a comment

New DDoS Warning Issued – Banking Industry Beware

The Federal Financial Institutions Examination Council (FFIEC), today released advisory statements warning Financial Institutions of risks associated with cyber-attacks on ATM’s, credit card authorization systems and the continued DDoS attacks against public-facing websites. Read more

Posted in Data Protection, DDoS, Governance, Risk and Compliance, Network Security, Uncategorized | Tagged , , , , , | Leave a comment

Who Is Reading Your Email, and for What Purpose?

Thanks to the NSA, so much attention has been on the fact that the federal government is collecting metadata about our phone calls that we have taken our eyes off what’s happening on the email front. There have been a few stark reminders in the news recently that email isn’t private and we shouldn’t use it to transmit sensitive information. It also prompts the question, “Do the ends justify the means when it comes to a need to know?”

In the first example, Microsoft admitted in federal court documents that it went into a blogger’s Hotmail account and searched for content. Not just any content, mind you, but for information about proprietary Microsoft code that an ex-employee had supposedly emailed to the blogger. Microsoft lawyers said they did not need any sort of search warrant to go into the account because the Hotmail terms of service permit Microsoft access to content on its own servers in such extreme cases.

Read more

Posted in Data Protection, Security Threats, Uncategorized | Tagged , , , | Leave a comment

Cybersecurity Professionals Are in Big Demand as Staffing Shortages Hit Critical Levels

In a previous blog post I talked about the upcoming National Cybersecurity Career Fair (NCCF) this June 18 and 19, 2014. NCCF is an innovative virtual meeting place for the top cybersecurity employers and entry to mid level cybersecurity jobseekers in the United States.

It turns out that this job fair is desperately needed by employers in practically every industry, but especially government, healthcare, financial services, retail/wholesale and manufacturing. According to a recent report from Burning Glass Technologies, current cybersecurity staffing shortages are estimated between 20,000 and 40,000 and are expected to continue for years to come. The demand for all levels of IT security professionals has grown more than 3.5 times faster than the demand for other IT jobs over the past five years, and more than 12 times faster than the demand for all other non-IT jobs.  Read more

Posted in Governance, Risk and Compliance, Network Security, Security Management, Security Threats, Uncategorized | Tagged , , | Leave a comment

DDoS Attacks – A Mainstream Occurrence and Disruption to Your Business

Corero recently partnered with John Pescatore, Director of Emerging Security Trends with the SANS Institute in developing a survey program designed to shed more light on organizations’ experiences with DDoS attacks. Read more

Posted in Application Security, DDoS, Network Security, Security Threats | Tagged , , | Leave a comment