Security alert overload threatens to bury security teams

When it comes to incident detection and response, enterprise organizations are collecting, processing and analyzing more security data through an assortment of new analytics tools—endpoint detection and response (EDR) tools, network analytics tools, threat intelligence platforms (TIPs), etc.When each of threat management or security analytics tools sees something suspicious, it generates a security alert, and therein lies the problem: Enterprise organizations are getting buried by an avalanche of security alerts. According to ESG research: When asked to identify their top incident response challenges, 36 percent of the cybersecurity professionals surveyed said, “keeping up with the volume of security alerts.” Forty-two percent of cybersecurity professionals say their organization ignores a significant number of security alerts because they can’t keep up with the volume.  When asked to estimate the percentage of security alerts ignored at their organization, 34 percent say between 26 percent and 50 percent, 20 percent of cybersecurity professionals say their organization ignores between 50 percent and 75 percent of security alerts, and 11 percent say their organization ignores more than 75 percent of security alerts. Mama Mia, that’s a lot of security alerts left on the cutting room floor.  All told, the ESG data indicates Continue reading

Security alert overload threatens to bury security teams

When it comes to incident detection and response, enterprise organizations are collecting, processing and analyzing more security data through an assortment of new analytics tools—endpoint detection and response (EDR) tools, network analytics tools, threat intelligence platforms (TIPs), etc.When each of threat management or security analytics tools sees something suspicious, it generates a security alert, and therein lies the problem: Enterprise organizations are getting buried by an avalanche of security alerts. According to ESG research: When asked to identify their top incident response challenges, 36 percent of the cybersecurity professionals surveyed said, “keeping up with the volume of security alerts.” Forty-two percent of cybersecurity professionals say their organization ignores a significant number of security alerts because they can’t keep up with the volume.  When asked to estimate the percentage of security alerts ignored at their organization, 34 percent say between 26 percent and 50 percent, 20 percent of cybersecurity professionals say their organization ignores between 50 percent and 75 percent of security alerts, and 11 percent say their organization ignores more than 75 percent of security alerts. Mama Mia, that’s a lot of security alerts left on the cutting room floor.  All told, the ESG data indicates Continue reading

Swarm Mode with Fleet Management and Collaboration now in public beta, powered by Docker Cloud

With the introduction of swarm mode in Docker 1.12, we showed the world how simple it can be to provision a secure and fully-distributed Docker cluster on which to deploy highly available and scalable applications. The latest Docker 1.13 builds on and improves these capabilities with new features, such as secrets management.

Continuing with the trend that simplicity is paramount to empowering individuals and teams to achieve their goals, today we are bringing swarm mode support to Docker Cloud, with a number of new cloud-enabled capabilities. All of this is in addition to the continuous integration (CI) features of Docker Cloud, including automatic builds, tests, security scans and the world’s largest hosted registry of public and private Docker image repositories.


Fleet Management using Docker ID

Keeping track of many swarms sprawling multiple regions or cloud providers can be a challenge. And securely connecting to remote swarms with TLS means teams must also spend time configuring and maintaining a Public Key Infrastructure. By registering your new or existing swarms with Docker Cloud, teams can now easily manage a large number of swarms running anywhere, and only need their Docker ID to authenticate and securely access any of them.

Docker Continue reading

MWC protest asks about the fate of 4 million recalled Note7 batteries

The question of how the electronics industry recycles or disposes of old batteries came up again due to a Greenpeace protest of Samsung at Mobile World Congress this week.Greenpeace protestors appeared at a Samsung press event in Barcelona on Sunday carrying and erecting banners outside the venue; the group urged reuse and recycling of old batteries.Greenpeace said in a statement that it was demanding Samsung reuse and recycle the 4.3 million Galaxy Note7 batteries that were recalled last year after reports that some of the lithium ion batteries overheated and caught fire.To read this article in full or to leave a comment, please click here

The 10 essential Reddits for security pros

Going viralImage by IDGReddit isn’t just about viral news stories and viral memes or heated thread debates, although there is always plenty of that on the sharing and social media site. For security professionals, as well as those interested in pursuing the field of cybersecurity, there is a wealth of advice, content, and conversation from deep and dirty forensics work to the latest on cyberlaw and everything in-between — if you know where to look.To read this article in full or to leave a comment, please click here

The 10 essential Reddits for security pros

Going viralImage by IDGReddit isn’t just about viral news stories and viral memes or heated thread debates, although there is always plenty of that on the sharing and social media site. For security professionals, as well as those interested in pursuing the field of cybersecurity, there is a wealth of advice, content, and conversation from deep and dirty forensics work to the latest on cyberlaw and everything in-between — if you know where to look.To read this article in full or to leave a comment, please click here

Safari browser sheds users, mimicking IE

Apple's Safari browser, like rival Internet Explorer (IE), has lost a significant number of users in the last two years, data published Wednesday showed.The most likely destination of Safari defectors: Google's Chrome.According to California-based analytics vendor Net Applications, in March 2015, an estimated 69% of all Mac owners used Safari to go online. But by last month, that number had dropped to 56%, a drop of 13 percentage points -- representing a decline of nearly a fifth of the share of two years prior.It was possible to peg the percentage of Mac users who ran Safari only because that browser works solely on macOS, the Apple operating system formerly labeled OS X. The same single-OS characteristic of IE and Edge has made it possible in the past to determine the percentage of Windows users who run those browsers.To read this article in full or to leave a comment, please click here

U.S. Marshals warn against dual phone scams

The U.S Marshals are warning the public not to respond to two recent scams involving people fraudulently posing as Marshals making calls across the country.The first is a warning about a scam where the fraudster calls members of the public and alleging they, or their family members, have an active federal arrest warrant and demanding payment of fines.+More on Network World: Avaya wants out of S.F. stadium suite, not too impressed with 49ers on-field performance either+“Recently, there were reported attempts of a fraudulent caller who identified himself as a Deputy United States Marshal. This phony law enforcement officer informed the potential victims that warrants were being issued for them or their family member due to being absent from a federal grand jury they were previously summoned to appear before. The potential victims were then informed they could avoid arrest by paying a fine by electronic fund transfer or cashier’s check. The Marshals Service became aware of the scam after receiving information from several calls from alert citizens,” the service wrote.To read this article in full or to leave a comment, please click here

U.S. Marshals warn against dual phone scams

The U.S Marshals are warning the public not to respond to two recent scams involving people fraudulently posing as Marshals making calls across the country.The first is a warning about a scam where the fraudster calls members of the public and alleging they, or their family members, have an active federal arrest warrant and demanding payment of fines.+More on Network World: Avaya wants out of S.F. stadium suite, not too impressed with 49ers on-field performance either+“Recently, there were reported attempts of a fraudulent caller who identified himself as a Deputy United States Marshal. This phony law enforcement officer informed the potential victims that warrants were being issued for them or their family member due to being absent from a federal grand jury they were previously summoned to appear before. The potential victims were then informed they could avoid arrest by paying a fine by electronic fund transfer or cashier’s check. The Marshals Service became aware of the scam after receiving information from several calls from alert citizens,” the service wrote.To read this article in full or to leave a comment, please click here

Fileless Powershell malware uses DNS as covert communication channel

Targeted attacks are moving away from traditional malware to stealthier techniques that involve abusing standard system tools and protocols, some of which are not always monitored.The latest example is an attack dubbed DNSMessenger, which was analyzed by researchers from Cisco Systems' Talos team. The attack starts with a malicious Microsoft Word document distributed through an email phishing campaign.When opened, the file masquerades as a "protected document" secured by McAfee, an antivirus brand now owned by Intel Security. The user is asked to click on the enable content button in order to view the document's content, but doing so will actually execute malicious scripting embedded within.To read this article in full or to leave a comment, please click here

Fileless Powershell malware uses DNS as covert communication channel

Targeted attacks are moving away from traditional malware to stealthier techniques that involve abusing standard system tools and protocols, some of which are not always monitored.The latest example is an attack dubbed DNSMessenger, which was analyzed by researchers from Cisco Systems' Talos team. The attack starts with a malicious Microsoft Word document distributed through an email phishing campaign.When opened, the file masquerades as a "protected document" secured by McAfee, an antivirus brand now owned by Intel Security. The user is asked to click on the enable content button in order to view the document's content, but doing so will actually execute malicious scripting embedded within.To read this article in full or to leave a comment, please click here

25% off Xbox One Play and Charge Kit – Deal Alert

Forget disposable batteries and keep the action going with the Xbox One Play & Charge Kit. Recharge while you play or afterwards, even when your Xbox is in standby. The long-lasting rechargeable battery fully charges in under 4 hours. Compatible with the original Xbox One Wireless controller and the new white Xbox Wireless Controller. The typical list price of $24.99 has been reduced 25% to $18.74. See the discounted Xbox One Play and Charge Kit on Amazon.To read this article in full or to leave a comment, please click here

Stuff The Internet Says On Scalability For March 3rd, 2017

Hey, it's HighScalability time:

 

Only 235 trillion miles away. Engage. (NASA)

If you like this sort of Stuff then please support me on Patreon.

  • $5 billion: Netflix spend on new content; $1 billion: Netflix spend on tech; 10%: bounced BBC users for every additional second page load; $3.5 billion: Priceline Group ad spend; 12.6 million: hours streamed by Pornhub per day; 1 billion: hours streamed by YouTube per day; 38,000 BC: auroch carving; 5%: decrease in US TV sets;

  • Quotable Quotes:
    • Fahim ul Haq: Rule 1: Reading High Scalability a night before your interview does not make you an expert in Distributed Systems.
    • @Pinboard: Root cause of outage: S3 is actually hosted on Google Cloud Storage, and today Google Cloud Storage migrated to AWS
    • Matthew Green: ransomware currently is using only a tiny fraction of the capabilities available to it. Secure execution technologies in particular represent a giant footgun just waiting to go off if manufacturers get things only a little bit wrong.
    • dsr_: This [S3 outage] is analogous to "we needed to fsck, and nobody realized how long that would take".
    • tptacek: Uber isn't the driver's employer. Continue reading

IDG Contributor Network: Customization key to successful ITSM implementation

Axelos defines IT Service Management (ITSM) as the implementation and management of quality IT services that meet the needs of the business. IT service management is performed by IT service providers through an appropriate mix of people, process and information technology. A widely adopted framework for ITSM is IT Infrastructure Library (ITIL).ITIL refers to a set of best-practice publications for IT service management. Owned by the U.K. Cabinet Office, ITIL gives guidance on the provision of quality IT services and the processes, functions and other capabilities needed to support them. The ITIL framework is based on a service lifecycle and consists of five lifecycle stages (service strategy, service design, service transition, service operation and continual service improvement), each of which has its own supporting publication.To read this article in full or to leave a comment, please click here