http://www.wired.com/2015/03/clintons-email-server-vulnerable/ By ANDY GREENBERG SECURITY Wired.com 03.04.15 FOR A SECRETARY of state, running your own email server might be a clever—if controversial—way to keep your conversations hidden from journalists and their pesky Freedom of Information Act requests. But ask a few security experts, and the consensus is that it’s not a very smart way to keep those conversations hidden from hackers. On Monday, the New York Times revealed that former secretary of state and future presidential candidate Hillary Clinton used a private email account rather than her official State.gov email address while serving in the State Department. And this was no Gmail or Yahoo! Mail account: On Wednesday the AP reported that Clinton actually ran a private mail server in her home during her entire tenure leading the State Department, hosting her email at the domain Clintonemail.com. Much of the criticism of that in-house email strategy has centered on its violation of the federal government’s record-keeping and transparency rules. But as the controversy continues to swirl, the security community is focused on a different issue: the possibility that an unofficial, unprotected server held the communications of America’s top foreign affairs official for four years, leaving all of it potentially vulnerable to state-sponsored hackers. “Although the American people didn’t know about this, it’s almost certain that foreign intelligence agencies did, just as the NSA knows which Indian and Spanish officials use Gmail and Yahoo accounts,” says Chris Soghoian, the lead technologist for the American Civil Liberties Union. “She’s not the first official to use private email and not the last. But there are serious security issue associated with these kinds of services…When you build your house outside the security fence, you’re on your own, and that’s what seems to have happened here.” […]
http://www.eweek.com/security/data-theft-a-major-concern-for-organizations.html By Nathan Eddy eWEEK.com 2014-05-01 This will not come as a surprise to most IT security people: Most enterprises lack the tools and business intelligence to protect their critical information in an optimal manner, according to new research conducted by the Ponemon Institute and sponsored by Websense. The main problems are a critical deficit of security solution effectiveness, a disconnect in executives’ perceived value of data, and limited visibility into attack activity, according to the global cyber-security report, The findings, based on the responses of IT security practitioners with an average of 10 years’ experience in the field from 15 countries, including Brazil, China, Germany, India, the United Kingdom and the United States, revealed a global consensus that security professionals need access to heightened threat intelligence and defenses. According to respondents, there is a gap between data breach perception and reality–specifically regarding the potential revenue loss to their business. Eighty percent of respondents say their company’s leaders do not equate losing confidential data with a potential loss of revenue. […]
http://www.computerworld.com/s/article/9246266/White_House_pushes_cybersecurity_framework_for_critical_infrastructure By Grant Gross IDG News Service February 12, 2014 A new cybersecurity framework released Wednesday by the Obama administration aims to help operators of critical infrastructure develop comprehensive cybersecurity programs. The voluntary framework creates a consensus on what a good cybersecurity program looks like, senior administration officials said. The 41-page framework takes a risk management approach that allows organizations to adapt to “a changing cybersecurity landscape and responds to evolving and sophisticated threats in a timely manner,” according to the document. Organizations can use the framework to create a “credible” cybersecurity program if they don’t already have one, said one senior Obama administration official. “The key message is that cybersecurity is not something you just put in place and walk away,” the official said, in a background press briefing. “There’s no prescription or magic bullet for cybersecurity. There are only well-conceived, proven ways of continuously managing the risks.” The framework, building on a presidential directive from a year ago, can help “companies prove to themselves and to their stakeholders that good cybersecurity can be the same thing as good business,” the official said. […]
http://www.govhealthit.com/news/years-end-policy-work-hipaa-disclosure-accounting By Anthony Brino Associate Editor Government Health IT November 25, 2013 As the seminal year of 2014 approaches for American healthcare, the Office of the National Coordinator (ONC) is getting an earful about implementing the HIPAA Accounting of Disclosures provision. ONC’s Privacy and Security Tiger Team is slated to convene the Monday after Thanksgiving, December 2nd, two days before the team is giving the Health IT Policy Committee recommendations on moving forward with disclosure accounting. That comes as HHS prepares an interim or final version of rules that many in the industry deemed too hard to achieve — for instance, with mandated PHI access reports for patients. The Tiger Team, which includes Epic CEO Judy Faulkner and Cerner informatics VP David McCallie, MD, is going into December with consensus on several topics, and with a philosophy of “less is more” for approaching the issue as a whole. The “scope of disclosures and related details to be reported to patients” should provide information that “is useful to patients, without overwhelming them” and that doesn’t place “undue burden on covered entities,” the Tiger Team said in an outline of recommendations presented during a November 18th meeting. […]
By Antone Gonsalves CSO.com December 06, 2012
Anonymous is planning to launch a cyberattack this weekend against the website of the International Telecommunications Union, a United Nations agency holding a meeting of 190 governments to discuss political and commercial control of the Internet, a security firm says.
The ITU-organized World Conference on International Telecommunications runs Dec. 3-14 in Dubai. The secretive meet has sparked rage within Anonymous and the blogosphere over a Russian proposal to hand control over the Internet to the ITU.
Such conspiracy theories are unlikely to become reality, experts say. That’s because such a move would require an international consensus, and many countries would oppose such a proposal, including the U.S.
Nevertheless, the hacktivist collective Anonymous posted a YouTube video last week denouncing the ITU meeting and warning of “grave consequences” to human rights.
______________________________________________ Visit the InfoSec News Security Bookstore Best Selling Security Books and More! http://www.shopinfosecnews.org
As many of us already know corporations and banks have changed the way they provide printed information to customers (at least for the most part). Corporations over the last 10 years have increasingly adopted policies against using social security numbers and personally identifiable information (PII) in their mailed reports, bills or customer invoices. This was primarily chartered by privacy advocates to reduce the exposure of customer data and prevent it from being used as a data source for identity theft. The increase of dumpster diving and drive by mailbox raids made it clear that we had to do something about what we disclose. Our governments don’t always seem to adopt the same protections that we’d expect of our public and private corporations so I’m hopeful my article will entice the citizenry to contact their government agencies and demand some changes.