In-brief: detecting anomalous behavior is a necessary part of incident response – but it’s also harder than it sounds, argues Alan Hall of BlueCoat Systems in this commentary.
Hacks & Hackers
Sign Up with the Usual Suspects: Consumer Breach Response is Broken and How to Fix It | Digital Guardian
In-brief:The scourge of data breaches and identity theft is more than a decade old. But our tools for dealing with these common incidents are outdated and ineffective. Why? (Editor’s note: this blog post has been cross posted from Digital Guardian’s blog, where you can read it in its entirety.)
12 Years Later: Common Configuration Flaw + Internet of Things = Massive Attacks
In-brief: A common configuration flaw may be behind a massive network of IoT devices used in “credential stuffing” attacks, according to the security firm Akamai.
Breaches Without Borders: New Data Protection Laws Cast A Wide Net
In-brief: Like it or not, U.S. companies will be expected to comply with strict new European breach notification laws. The good news: responding to breaches in this new regulatory environment just takes a little preparation, says Michael Bruemmer of Experian.
Security Firm Warns on Flaw in Insulin Pump with No Easy Fix
In brief: A flaw in a wearable insulin pump sold by Johnson & Johnson has the potential to allow a malicious actor to force the device to administer doses of insulin to a patient without their knowledge.