<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber Security November 2018</title>
	<atom:link href="http://www.epanorama.net/blog/2018/11/01/cyber-security-november-2018/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2018/11/01/cyber-security-november-2018/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 07 Apr 2026 11:05:02 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/11/01/cyber-security-november-2018/comment-page-12/#comment-1615710</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 04 Dec 2018 14:20:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179894#comment-1615710</guid>
		<description><![CDATA[Knowing Value of Data Assets is Crucial to Cybersecurity Risk Management
https://www.securityweek.com/knowing-value-data-assets-crucial-cybersecurity-risk-management

Knowing the True Value of Data Assets Will Improve Cyber Security and Promote Meaningful Cyber Insurance

Understanding the value of corporate assets is fundamental to cybersecurity risk management. Only when the true value is known can the correct level of security be applied.

Sponsored by DocAuthority and based on Gartner&#039;s Infonomics Data Valuation Model, Ponemon Institute queried 2,827 professionals across the U.S. and UK to gauge how different business functions value different information assets. The business functions included in the research comprise IT security, product &amp; manufacturing, legal, marketing &amp; sales, IT, finance &amp; accounting, and HR.]]></description>
		<content:encoded><![CDATA[<p>Knowing Value of Data Assets is Crucial to Cybersecurity Risk Management<br />
<a href="https://www.securityweek.com/knowing-value-data-assets-crucial-cybersecurity-risk-management" rel="nofollow">https://www.securityweek.com/knowing-value-data-assets-crucial-cybersecurity-risk-management</a></p>
<p>Knowing the True Value of Data Assets Will Improve Cyber Security and Promote Meaningful Cyber Insurance</p>
<p>Understanding the value of corporate assets is fundamental to cybersecurity risk management. Only when the true value is known can the correct level of security be applied.</p>
<p>Sponsored by DocAuthority and based on Gartner&#8217;s Infonomics Data Valuation Model, Ponemon Institute queried 2,827 professionals across the U.S. and UK to gauge how different business functions value different information assets. The business functions included in the research comprise IT security, product &amp; manufacturing, legal, marketing &amp; sales, IT, finance &amp; accounting, and HR.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/11/01/cyber-security-november-2018/comment-page-12/#comment-1615688</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 04 Dec 2018 13:58:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179894#comment-1615688</guid>
		<description><![CDATA[5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics
https://securityintelligence.com/5-tips-for-uncovering-hidden-cyberthreats-with-dns-analytics/

How DNS Analytics Can Boost Your Defense

The Domain Name System (DNS) is one of the foundational components of the internet that malicious actors commonly exploit and use to deploy and control their attack framework. The internet relies on this system to translate domain names into numbers, known as Internet Protocol (IP) addresses. Giving each IP a unique identifier allows computers and devices to send and receive information across networks. However, DNS also opens the door for opportunistic cyberattackers to infiltrate networks and access sensitive information.]]></description>
		<content:encoded><![CDATA[<p>5 Tips for Uncovering Hidden Cyberthreats with DNS Analytics<br />
<a href="https://securityintelligence.com/5-tips-for-uncovering-hidden-cyberthreats-with-dns-analytics/" rel="nofollow">https://securityintelligence.com/5-tips-for-uncovering-hidden-cyberthreats-with-dns-analytics/</a></p>
<p>How DNS Analytics Can Boost Your Defense</p>
<p>The Domain Name System (DNS) is one of the foundational components of the internet that malicious actors commonly exploit and use to deploy and control their attack framework. The internet relies on this system to translate domain names into numbers, known as Internet Protocol (IP) addresses. Giving each IP a unique identifier allows computers and devices to send and receive information across networks. However, DNS also opens the door for opportunistic cyberattackers to infiltrate networks and access sensitive information.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/11/01/cyber-security-november-2018/comment-page-12/#comment-1615687</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 04 Dec 2018 13:58:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179894#comment-1615687</guid>
		<description><![CDATA[Getting to know the Threat Hunting process
https://www.pandasecurity.com/mediacenter/security/getting-to-know-the-threat-hunting-process/

 these are the steps of the investigation:

1- Hypothesis Generation The first step when it comes to formulating an investigation is to create hypotheses. The aim of these hypotheses is to find evidence of threats before they are exploited, or even ones that are already being exploited.

2 – Validation of the hypotheses. Once a hypothesis has been defined, its validity needs to be verified. We then need to look for the existence of threats that fit this hypothesis. In this stage it is usual for some hypotheses to be discarded, while research into others is prioritized due to their likelihood or criticality.

3 – Finding evidence. From the results obtained in the previous search, we need to verify if a threat really exists. False positives and mistakes in configuration are set aside, and efforts are focused on the validated hypotheses.

4 – Discovery of new patterns. The attack is reconstructed to find any new patterns and tactics used to carry it out.

5 – Notification and enrichment. Using the knowledge generated during the Threat Hunting process, the automatic detection systems are enriched and improved. This way, the organization’s global security is improved thanks to the discoveries made during the investigation.]]></description>
		<content:encoded><![CDATA[<p>Getting to know the Threat Hunting process<br />
<a href="https://www.pandasecurity.com/mediacenter/security/getting-to-know-the-threat-hunting-process/" rel="nofollow">https://www.pandasecurity.com/mediacenter/security/getting-to-know-the-threat-hunting-process/</a></p>
<p> these are the steps of the investigation:</p>
<p>1- Hypothesis Generation The first step when it comes to formulating an investigation is to create hypotheses. The aim of these hypotheses is to find evidence of threats before they are exploited, or even ones that are already being exploited.</p>
<p>2 – Validation of the hypotheses. Once a hypothesis has been defined, its validity needs to be verified. We then need to look for the existence of threats that fit this hypothesis. In this stage it is usual for some hypotheses to be discarded, while research into others is prioritized due to their likelihood or criticality.</p>
<p>3 – Finding evidence. From the results obtained in the previous search, we need to verify if a threat really exists. False positives and mistakes in configuration are set aside, and efforts are focused on the validated hypotheses.</p>
<p>4 – Discovery of new patterns. The attack is reconstructed to find any new patterns and tactics used to carry it out.</p>
<p>5 – Notification and enrichment. Using the knowledge generated during the Threat Hunting process, the automatic detection systems are enriched and improved. This way, the organization’s global security is improved thanks to the discoveries made during the investigation.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/11/01/cyber-security-november-2018/comment-page-12/#comment-1615632</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 04 Dec 2018 08:38:18 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179894#comment-1615632</guid>
		<description><![CDATA[Hacked and Fake Accounts
https://www.facebook.com/help/1216349518398524/?helpref=hc_fnav]]></description>
		<content:encoded><![CDATA[<p>Hacked and Fake Accounts<br />
<a href="https://www.facebook.com/help/1216349518398524/?helpref=hc_fnav" rel="nofollow">https://www.facebook.com/help/1216349518398524/?helpref=hc_fnav</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/11/01/cyber-security-november-2018/comment-page-12/#comment-1615631</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 04 Dec 2018 08:37:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179894#comment-1615631</guid>
		<description><![CDATA[The state of cyberwarfare: 2 things you need to know
https://www.zdnet.com/article/the-state-of-cyberwarfare-2-things-you-need-to-know/#ftag=RSSbaffb68

If you want to understand why you should be worried about the proliferation of cyberweapons and the lack of arms control treaties governing them, then read on.

Cybersecurity headlines in recent years have been dominated by companies losing money by being hacked and leaking the data of millions of customers.

But today, cybersecurity is moving beyond the financial impact to concerns over public safety, national security, and even cyberwarfare.

To understand the state of cyberwar and its potential impact, we should all keep in mind two things:
1. The proliferation of cyberweapons is already happening
2. Arms control of cyberweapons hasn&#039;t caught up]]></description>
		<content:encoded><![CDATA[<p>The state of cyberwarfare: 2 things you need to know<br />
<a href="https://www.zdnet.com/article/the-state-of-cyberwarfare-2-things-you-need-to-know/#ftag=RSSbaffb68" rel="nofollow">https://www.zdnet.com/article/the-state-of-cyberwarfare-2-things-you-need-to-know/#ftag=RSSbaffb68</a></p>
<p>If you want to understand why you should be worried about the proliferation of cyberweapons and the lack of arms control treaties governing them, then read on.</p>
<p>Cybersecurity headlines in recent years have been dominated by companies losing money by being hacked and leaking the data of millions of customers.</p>
<p>But today, cybersecurity is moving beyond the financial impact to concerns over public safety, national security, and even cyberwarfare.</p>
<p>To understand the state of cyberwar and its potential impact, we should all keep in mind two things:<br />
1. The proliferation of cyberweapons is already happening<br />
2. Arms control of cyberweapons hasn&#8217;t caught up</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/11/01/cyber-security-november-2018/comment-page-12/#comment-1615523</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Dec 2018 17:00:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179894#comment-1615523</guid>
		<description><![CDATA[What is Phishing?
https://blog.sucuri.net/2018/11/what-is-phishing.html

Phishing is a serious threat to any industry. We have seen this topic appear in the news more each day. You might have already received a fraudulent email from what seemed to be your bank or even seen the hacking that took place during the 2016 US presidential election. But what do you know about phishing?]]></description>
		<content:encoded><![CDATA[<p>What is Phishing?<br />
<a href="https://blog.sucuri.net/2018/11/what-is-phishing.html" rel="nofollow">https://blog.sucuri.net/2018/11/what-is-phishing.html</a></p>
<p>Phishing is a serious threat to any industry. We have seen this topic appear in the news more each day. You might have already received a fraudulent email from what seemed to be your bank or even seen the hacking that took place during the 2016 US presidential election. But what do you know about phishing?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/11/01/cyber-security-november-2018/comment-page-12/#comment-1615522</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Dec 2018 17:00:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179894#comment-1615522</guid>
		<description><![CDATA[Secure your privileged administrative accounts with a phased roadmap
https://cloudblogs.microsoft.com/microsoftsecure/2018/11/29/secure-your-privileged-administrative-accounts-with-a-phased-roadmap/]]></description>
		<content:encoded><![CDATA[<p>Secure your privileged administrative accounts with a phased roadmap<br />
<a href="https://cloudblogs.microsoft.com/microsoftsecure/2018/11/29/secure-your-privileged-administrative-accounts-with-a-phased-roadmap/" rel="nofollow">https://cloudblogs.microsoft.com/microsoftsecure/2018/11/29/secure-your-privileged-administrative-accounts-with-a-phased-roadmap/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/11/01/cyber-security-november-2018/comment-page-12/#comment-1615436</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Dec 2018 10:26:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179894#comment-1615436</guid>
		<description><![CDATA[Security Automation Can be a Game Changer for Any SOC or CSIRT, Including Yours
https://www.securityweek.com/business-outcomes-automated-phishing-response

As I’ve written about in previous articles, security automation technology is creating impressive gains for security and incident response teams, by helping them improve operational effectiveness, increase speed and agility, and reduce risk. More and more security analysts and SOC managers are beginning to understand the potential of automation as they experience it firsthand or hear about it from their peers.

https://www.securityweek.com/authors/stan-engelbrecht]]></description>
		<content:encoded><![CDATA[<p>Security Automation Can be a Game Changer for Any SOC or CSIRT, Including Yours<br />
<a href="https://www.securityweek.com/business-outcomes-automated-phishing-response" rel="nofollow">https://www.securityweek.com/business-outcomes-automated-phishing-response</a></p>
<p>As I’ve written about in previous articles, security automation technology is creating impressive gains for security and incident response teams, by helping them improve operational effectiveness, increase speed and agility, and reduce risk. More and more security analysts and SOC managers are beginning to understand the potential of automation as they experience it firsthand or hear about it from their peers.</p>
<p><a href="https://www.securityweek.com/authors/stan-engelbrecht" rel="nofollow">https://www.securityweek.com/authors/stan-engelbrecht</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/11/01/cyber-security-november-2018/comment-page-11/#comment-1615435</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Dec 2018 10:25:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179894#comment-1615435</guid>
		<description><![CDATA[Facebook Mulled Charging for Access to User Data
https://www.securityweek.com/facebook-mulled-charging-access-user-data

Facebook on Wednesday said it considered charging application makers to access data at the social network.

Such a move would have been a major shift away from the policy of not selling Facebook members&#039; information, which the social network has stressed in the face of criticism alleging it is more interested in making money than protecting privacy.

&quot;To be clear, Facebook has never sold anyone&#039;s data,&quot; director of developer platforms and programs Konstantinos Papamiltiadis said in response to an AFP inquiry.]]></description>
		<content:encoded><![CDATA[<p>Facebook Mulled Charging for Access to User Data<br />
<a href="https://www.securityweek.com/facebook-mulled-charging-access-user-data" rel="nofollow">https://www.securityweek.com/facebook-mulled-charging-access-user-data</a></p>
<p>Facebook on Wednesday said it considered charging application makers to access data at the social network.</p>
<p>Such a move would have been a major shift away from the policy of not selling Facebook members&#8217; information, which the social network has stressed in the face of criticism alleging it is more interested in making money than protecting privacy.</p>
<p>&#8220;To be clear, Facebook has never sold anyone&#8217;s data,&#8221; director of developer platforms and programs Konstantinos Papamiltiadis said in response to an AFP inquiry.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/11/01/cyber-security-november-2018/comment-page-11/#comment-1615434</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 03 Dec 2018 10:24:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179894#comment-1615434</guid>
		<description><![CDATA[Marriott Hit by Massive Data Breach: 500 Million Starwood Customers Impacted
https://www.securityweek.com/marriott-hit-massive-data-breach-500-million-starwood-customers-impacted]]></description>
		<content:encoded><![CDATA[<p>Marriott Hit by Massive Data Breach: 500 Million Starwood Customers Impacted<br />
<a href="https://www.securityweek.com/marriott-hit-massive-data-breach-500-million-starwood-customers-impacted" rel="nofollow">https://www.securityweek.com/marriott-hit-massive-data-breach-500-million-starwood-customers-impacted</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
