Least Privilege Access – Still at the Front Lines of Security

Ever since authentication and authorization became the norm for access to computer systems, the principle of least privilege (POLP) has been the de-facto baseline for proper security. At its very core, least privilege access means granting a user just enough permissions (authorization) to access the data and systems in their company’s enterprise necessary to do his or her job – nothing more, nothing less. In theory, adhering to the POLP sounds like the perfect identity and access management strategy, but often implementing least privilege is easier said than done.

4 Security Roles That Can Benefit From Threat Intelligence

Key Takeaways

  • Threat intelligence is widely imagined to be the domain of elite analysts. In reality, it adds value across the security function for organizations of all sizes.
  • Security teams are routinely unable to process the alerts they receive. Threat intelligence integrates with existing technologies to enable the automated prioritization of serious threats and removal of false positives.
  • Vulnerability management teams cannot accurately prioritize the most important vulnerabilities without access to the external insights and context provided by threat intelligence.
  • Preventative security measures are dependent on an understanding of the current threat landscape. Threat intelligence harvests key insights on threat actors, TTPs, and more from across technical, open web, and dark web sources.

It’s safe to say that threat intelligence is widely misunderstood.

IQ Capital is raising £125M to invest in deep tech startups in the UK

The rapid pace of technology innovation and applications in recent decades — you could argue that just about every kind of business is a “tech” business these days — has spawned a sea of tech startups and larger businesses that are focused on serving that market, and equally demanding consumers, on a daily basis. Today, a venture capital firm in the UK is announcing a fund aimed at helping to grow the technologies that will underpin a lot of those daily applications.

Twitter puts a tighter squeeze on spambots

Twitter has announced a range of actions intended to bolster efforts to fight spam and “malicious automation” (aka bad bots) on its platform — including increased security measures around account verification and sign-up; running a historical audit to catch spammers who signed up when its systems were more lax; and taking a more proactive approach to identifying spam activity to reduce its ability to make an impact.

New Zealand’s Z Energy flags possible data breach in November

New Zealand-based fuel supplier Z Energy Ltd on Wednesday said it has been presented with evidence that customer data from its Z Card Online database was accessed by a third party in November 2017. The database held customer data such as names, addresses, registration numbers, vehicle types and credit limits with the company, Z Energy said in a statement. The data accessed did not include bank details, pin numbers or information that would put customer finances directly at risk, it said. Z Energy did not specify the extent to which its customer data had been compromised.

Cybersecurity pros are limiting their personal use of Facebook, survey says

About 65% of surveyed current and former attendees at the annual Black Hat USA security conference say they’re limiting their use of Facebook or not using it at all after the recent controversies over the company’s security practices, Black Hat reports. The organization has surveyed its attendees on security matters annually since 2015, and the majority of those surveyed reported working in a computer security profession. This year’s survey generally found attendees pessimistic about the outlook for privacy and security.

Ransomware and malicious crypto miners in 2016-2018

Ransomware is not an unfamiliar threat. For the last few years it has been affecting the world of cybersecurity, infecting and blocking access to various devices or files and requiring users to pay a ransom (usually in Bitcoins or another widely used e-currency), if they want to regain access to their files and devices.

CISO Chat – Quentyn Taylor, Director Information Security for Canon EMEA

On the back of what was a fantastic first round of questioning with insightful responses from leading figures in the IT security industry, the CISO Chat segment on the IT Security Guru has returned for the second round of questioning. We have caught up with a host of CISO’s and senior security experts to get their thoughts and ideas on the 2018 cyber landscape and will include advice, guidance & problems faced. We will leave the favourite food and hobby questions for another time.

Orlando Police End Test of Amazon’s Real-Time Facial ‘Rekognition’ System

An anonymous reader quotes a report from NPR: The city of Orlando, Fla., says it has ended a pilot program in which its police force used Amazon’s real-time facial recognition — a system called “Rekognition” that had triggered complaints from rights and privacy groups when its use was revealed earlier this year. Orlando’s deal to open part of its camera systems to Amazon was reported by NPR’s Martin Kaste in May, after the ACLU noticed that an Amazon Rekognition executive mentioned the city as a customer.

On Monday, the ACLU of Florida wrote a letter to Mayor Buddy Dyer and the Orlando City Council, demanding that the city “immediately” shut down “any face surveillance deployment or use by city agencies and departments.” On the same day, Orlando city and police officials issued a joint statement saying that the test of how its officers might use the Rekognition technology ended last week. The city added, “Staff continues to discuss and evaluate whether to recommend continuation of the pilot at a further date,” adding that “the contract with Amazon remains expired.”