Heartbleed – When Will the Next Shoe Drop?
April 22, 2014, Rick Dakin, CEO, Co-founder and Chief Security Strategist
Last week, while I was in the offices of one of our customers, a long-present but little-known vulnerability in OpenSSL became public knowledge. Our client detected it early and made the necessary patches and updates. The systems deployed by their customers are now secure. Consumers will change their passwords and credentials stolen prior to the Heartbleed fixes will be worthless. Read more
April 04, 2014, Rick Dakin, CEO, Co-founder and Chief Security Strategist
On Wednesday, I attended a roundtable discussion the Securities and Exchange Commission held to gather information on cybersecurity trends and potential disclosure requirements for regulated public companies and stock exchanges.
Target Hackers Broke in Via HVAC Company?
February 06, 2014, Adam Shnider, VP, West Region, Professional Services
When I first heard about the account used to gain access to the Target environment, my first reaction was to laugh at the ridiculousness of the HVAC vendor having an impact on the CDE like it seems to (or is rumored) to have had in the recent breach. Then I started thinking with the PCI controls, including 8.5.6, requirements for revoking vendor access, how could an HVAC vendor account be the culprit for such a broad attack and how could this affect our customers.
Detecting and Preventing Compromises in Retail Payment Systems
January 14, 2014, Mike Weber, Vice President, Coalfire Labs
Information Week’s Matthew Swartz published an article on the recently- confirmed payment card breaches at Target, Nieman Marcus and three other unnamed retailers. This article and many others reveal that these attacks involve sophisticated malware and some even suggest it is the work of the same gang. To be clear, Coalfire and the Coalfire Labs group that I lead are not involved in these investigations. But we do perform security audits and digital forensics investigations for many retailers. And based on that experience, we can confidently say this: all retailers are targets, and many retailers have already been compromised..
What every CIO should know about the new ISO 27001:2013 framework
November 27, 2013, Karl Steinkamp, Director
Originally released in 2005, the ISO 27001 standard has recently been updated with additional guidelines for assessing risks within information management systems. These changes constitute the first revisions to the standard in eight years and have major implications for organizational compliance. With greater focus on risk ownership and continuous improvement, ISO 27001:2013 will require companies to formulate new risk management processes that incorporate procedures to ensure compliance. According to CSO magazine’s David Braue, these revisions in ISO 27001:2013 address the complex current security environment and incorporate necessary user feedback.