<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security trends 2019</title>
	<atom:link href="http://www.epanorama.net/blog/2018/12/30/cyber-security-trends-2019/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2018/12/30/cyber-security-trends-2019/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 24 Apr 2026 05:32:11 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Russell Welch</title>
		<link>https://www.epanorama.net/blog/2018/12/30/cyber-security-trends-2019/comment-page-17/#comment-1705023</link>
		<dc:creator><![CDATA[Russell Welch]]></dc:creator>
		<pubDate>Tue, 02 Mar 2021 12:54:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=180951#comment-1705023</guid>
		<description><![CDATA[Remote workers are in danger now. 
All this situation with quarantine makes a lot of companies lose their money. 
I found this blogpost, you may be interested in
https://www.clearnetwork.com/top-6-practices-for-securing-remote-workers/]]></description>
		<content:encoded><![CDATA[<p>Remote workers are in danger now.<br />
All this situation with quarantine makes a lot of companies lose their money.<br />
I found this blogpost, you may be interested in<br />
<a href="https://www.clearnetwork.com/top-6-practices-for-securing-remote-workers/" rel="nofollow">https://www.clearnetwork.com/top-6-practices-for-securing-remote-workers/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/12/30/cyber-security-trends-2019/comment-page-17/#comment-1699322</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 20 Dec 2020 15:28:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=180951#comment-1699322</guid>
		<description><![CDATA[https://cybernews.com/editorial/how-nation-states-hack-each-other-the-extraordinary-routine/]]></description>
		<content:encoded><![CDATA[<p><a href="https://cybernews.com/editorial/how-nation-states-hack-each-other-the-extraordinary-routine/" rel="nofollow">https://cybernews.com/editorial/how-nation-states-hack-each-other-the-extraordinary-routine/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Eve Hunt</title>
		<link>https://www.epanorama.net/blog/2018/12/30/cyber-security-trends-2019/comment-page-17/#comment-1698878</link>
		<dc:creator><![CDATA[Eve Hunt]]></dc:creator>
		<pubDate>Sat, 12 Dec 2020 04:35:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=180951#comment-1698878</guid>
		<description><![CDATA[Fine way of describing, and pleasant piece of writing to get information concerning my presentation subject]]></description>
		<content:encoded><![CDATA[<p>Fine way of describing, and pleasant piece of writing to get information concerning my presentation subject</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Eve Hunt</title>
		<link>https://www.epanorama.net/blog/2018/12/30/cyber-security-trends-2019/comment-page-17/#comment-1698688</link>
		<dc:creator><![CDATA[Eve Hunt]]></dc:creator>
		<pubDate>Mon, 07 Dec 2020 07:16:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=180951#comment-1698688</guid>
		<description><![CDATA[Really rather interesting web-site. Incredibly pleasant in the direction of go through and Really considerably fascinating content material. Of course period incorporates not still occur back again and greet]]></description>
		<content:encoded><![CDATA[<p>Really rather interesting web-site. Incredibly pleasant in the direction of go through and Really considerably fascinating content material. Of course period incorporates not still occur back again and greet</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/12/30/cyber-security-trends-2019/comment-page-17/#comment-1680416</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 28 May 2020 18:37:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=180951#comment-1680416</guid>
		<description><![CDATA[Making Remote Working Safer Through Securing the Router

https://pentestmag.com/making-remote-working-safer-through-securing-the-router/

#pentest #magazine #pentestmag #pentestblog #PTblog #remote #work #router #security #cybersecurity #infosecurity #infosec]]></description>
		<content:encoded><![CDATA[<p>Making Remote Working Safer Through Securing the Router</p>
<p><a href="https://pentestmag.com/making-remote-working-safer-through-securing-the-router/" rel="nofollow">https://pentestmag.com/making-remote-working-safer-through-securing-the-router/</a></p>
<p>#pentest #magazine #pentestmag #pentestblog #PTblog #remote #work #router #security #cybersecurity #infosecurity #infosec</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/12/30/cyber-security-trends-2019/comment-page-17/#comment-1680179</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 25 May 2020 13:22:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=180951#comment-1680179</guid>
		<description><![CDATA[How to decode a data breach notice
https://techcrunch.com/2020/05/19/decoding-data-breach-notice/
Data breach notifications are meant to tell you what happened, when
and what impact it may have on you. You&#039;ve probably already seen a few
this year. That&#039;s because most U.S. states have laws that compel
companies to publicly disclose security incidents, like a data breach,
as soon as possible. Europe&#039;s rules are stricter, and fines can be a
common occurrence if breaches aren&#039;t disclosed.]]></description>
		<content:encoded><![CDATA[<p>How to decode a data breach notice<br />
<a href="https://techcrunch.com/2020/05/19/decoding-data-breach-notice/" rel="nofollow">https://techcrunch.com/2020/05/19/decoding-data-breach-notice/</a><br />
Data breach notifications are meant to tell you what happened, when<br />
and what impact it may have on you. You&#8217;ve probably already seen a few<br />
this year. That&#8217;s because most U.S. states have laws that compel<br />
companies to publicly disclose security incidents, like a data breach,<br />
as soon as possible. Europe&#8217;s rules are stricter, and fines can be a<br />
common occurrence if breaches aren&#8217;t disclosed.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/12/30/cyber-security-trends-2019/comment-page-17/#comment-1677088</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 02 May 2020 22:12:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=180951#comment-1677088</guid>
		<description><![CDATA[The State of the Cybersecurity Skills Gap Heading Into 2020
https://pentestmag.com/the-state-of-the-cybersecurity-skills-gap-heading-into-2020/]]></description>
		<content:encoded><![CDATA[<p>The State of the Cybersecurity Skills Gap Heading Into 2020<br />
<a href="https://pentestmag.com/the-state-of-the-cybersecurity-skills-gap-heading-into-2020/" rel="nofollow">https://pentestmag.com/the-state-of-the-cybersecurity-skills-gap-heading-into-2020/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/12/30/cyber-security-trends-2019/comment-page-17/#comment-1677078</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 02 May 2020 21:46:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=180951#comment-1677078</guid>
		<description><![CDATA[Social Engineering Risks: How to Patch the Humans in Your Organization
https://pentestmag.com/social-engineering-risks-how-to-patch-the-humans-in-your-organization/]]></description>
		<content:encoded><![CDATA[<p>Social Engineering Risks: How to Patch the Humans in Your Organization<br />
<a href="https://pentestmag.com/social-engineering-risks-how-to-patch-the-humans-in-your-organization/" rel="nofollow">https://pentestmag.com/social-engineering-risks-how-to-patch-the-humans-in-your-organization/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/12/30/cyber-security-trends-2019/comment-page-17/#comment-1676611</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 27 Apr 2020 15:10:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=180951#comment-1676611</guid>
		<description><![CDATA[S3 Security Is Flawed By Design
https://www.upguard.com/blog/s3-security-is-flawed-by-design

Amazon S3, one of the leading cloud storage solutions, is used by companies all over the world for a variety of use cases to power their IT operations. Over four years, UpGuard has detected thousands of S3-related data breaches caused by the misconfiguration of S3 security settings. Jeff Barr, Chief Evangelist for Amazon Web Services recently announced public access settings for S3 buckets, a new feature designed to help AWS customers stop the epidemic of data breaches caused by incorrect S3 security settings.

The ongoing cloud security problem for this simple storage service has resulted in tens of millions of breached records. So this is welcome news and a step in the right direction for AWS services, but we don&#039;t think it&#039;s enough.

Bad S3 security is a common target for corporate spies.

The S3 Security Problem
Security researchers, including UpGuard, are constantly discovering open, unprotected S3 buckets containing sensitive data. 

Who is responsible for the S3 security problem?
It&#039;s tempting to blame you, the users, for being too lazy or stupid to use S3 properly. We&#039;ve all read about &quot;solutions&quot; to the S3 security problem, including (but not limited to):

Monitoring your S3 buckets using products like AWS Config or UpGuard Core
Building your own S3 monitoring solution using AWS Cloudtrail and Lambda
Command-line testing with tools like S3 Inspector
Using AWS Identity and Access Management (IAM) user policies that specify the users that can access specific buckets and objects
These solutions do work, and we recommend using them to monitor your S3 security posture. To tell you the truth though, it feels a bit unfair. Why should S3 users be forced to spend more money on alternative solutions to resolve a fundamental issue? IAM policies are complicated even for the experienced user.

Our opinion is that the security problem with S3 is one of product design. 

Yes, AWS ensures that S3 servers are private by default. Yet we continue to see thousands of open buckets, and regular breaches.

Our view is that AWS has made it far too easy for S3 users to misconfigure buckets to make them totally publicly accessible over the Internet. It&#039;s up to AWS to create better security solutions by default. There are two key product features we&#039;ve highlighted below that can easily trip you up if you&#039;re not careful.

#1: Any Authenticated Users
The concept of &quot;any authenticated AWS users&quot; is a poorly understood feature of S3 and an extremely common misconfiguration. This level of security allows anybody with an AWS account to see inside your buckets. 

#2: Inconsistent ACLs and Bucket Policies
Another easily misconfigured feature of S3’s security model is the interplay between ACLs and policies governing buckets and the objects inside them. 

Some of the most catastrophic breaches we&#039;ve found caused by people misunderstanding how these settings work together. You can lock down ACLs to an Amazon S3 bucket, but if the bucket policy is misconfigured, then you can still leave your data wide open to the Internet. 

What has AWS done to secure S3?
So if you agree that features of the S3 security model are at least partially responsible for leaky buckets, what has AWS been doing to resolve the problem?

Through 2017, AWS announced multiple changes that promised to help:

Providing a &quot;public&quot; flag for open buckets, and an email outreach campaign to owners of those buckets.
The launch of Amazon Macie, which &quot;is a security service that uses machine learning to automatically discover, classify, and protect sensitive data in AWS&quot;.
After the launch of these features, we saw many exposed buckets disappear. But we also saw many more buckets with sensitive information persist, and new ones created since then with sensitive, publicly accessible data.]]></description>
		<content:encoded><![CDATA[<p>S3 Security Is Flawed By Design<br />
<a href="https://www.upguard.com/blog/s3-security-is-flawed-by-design" rel="nofollow">https://www.upguard.com/blog/s3-security-is-flawed-by-design</a></p>
<p>Amazon S3, one of the leading cloud storage solutions, is used by companies all over the world for a variety of use cases to power their IT operations. Over four years, UpGuard has detected thousands of S3-related data breaches caused by the misconfiguration of S3 security settings. Jeff Barr, Chief Evangelist for Amazon Web Services recently announced public access settings for S3 buckets, a new feature designed to help AWS customers stop the epidemic of data breaches caused by incorrect S3 security settings.</p>
<p>The ongoing cloud security problem for this simple storage service has resulted in tens of millions of breached records. So this is welcome news and a step in the right direction for AWS services, but we don&#8217;t think it&#8217;s enough.</p>
<p>Bad S3 security is a common target for corporate spies.</p>
<p>The S3 Security Problem<br />
Security researchers, including UpGuard, are constantly discovering open, unprotected S3 buckets containing sensitive data. </p>
<p>Who is responsible for the S3 security problem?<br />
It&#8217;s tempting to blame you, the users, for being too lazy or stupid to use S3 properly. We&#8217;ve all read about &#8220;solutions&#8221; to the S3 security problem, including (but not limited to):</p>
<p>Monitoring your S3 buckets using products like AWS Config or UpGuard Core<br />
Building your own S3 monitoring solution using AWS Cloudtrail and Lambda<br />
Command-line testing with tools like S3 Inspector<br />
Using AWS Identity and Access Management (IAM) user policies that specify the users that can access specific buckets and objects<br />
These solutions do work, and we recommend using them to monitor your S3 security posture. To tell you the truth though, it feels a bit unfair. Why should S3 users be forced to spend more money on alternative solutions to resolve a fundamental issue? IAM policies are complicated even for the experienced user.</p>
<p>Our opinion is that the security problem with S3 is one of product design. </p>
<p>Yes, AWS ensures that S3 servers are private by default. Yet we continue to see thousands of open buckets, and regular breaches.</p>
<p>Our view is that AWS has made it far too easy for S3 users to misconfigure buckets to make them totally publicly accessible over the Internet. It&#8217;s up to AWS to create better security solutions by default. There are two key product features we&#8217;ve highlighted below that can easily trip you up if you&#8217;re not careful.</p>
<p>#1: Any Authenticated Users<br />
The concept of &#8220;any authenticated AWS users&#8221; is a poorly understood feature of S3 and an extremely common misconfiguration. This level of security allows anybody with an AWS account to see inside your buckets. </p>
<p>#2: Inconsistent ACLs and Bucket Policies<br />
Another easily misconfigured feature of S3’s security model is the interplay between ACLs and policies governing buckets and the objects inside them. </p>
<p>Some of the most catastrophic breaches we&#8217;ve found caused by people misunderstanding how these settings work together. You can lock down ACLs to an Amazon S3 bucket, but if the bucket policy is misconfigured, then you can still leave your data wide open to the Internet. </p>
<p>What has AWS done to secure S3?<br />
So if you agree that features of the S3 security model are at least partially responsible for leaky buckets, what has AWS been doing to resolve the problem?</p>
<p>Through 2017, AWS announced multiple changes that promised to help:</p>
<p>Providing a &#8220;public&#8221; flag for open buckets, and an email outreach campaign to owners of those buckets.<br />
The launch of Amazon Macie, which &#8220;is a security service that uses machine learning to automatically discover, classify, and protect sensitive data in AWS&#8221;.<br />
After the launch of these features, we saw many exposed buckets disappear. But we also saw many more buckets with sensitive information persist, and new ones created since then with sensitive, publicly accessible data.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/12/30/cyber-security-trends-2019/comment-page-17/#comment-1668964</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 30 Jan 2020 21:18:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=180951#comment-1668964</guid>
		<description><![CDATA[https://www.netresec.com/?page=Blog&amp;month=2020-01&amp;post=Sharing-a-PCAP-with-Decrypted-HTTPS]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.netresec.com/?page=Blog&#038;month=2020-01&#038;post=Sharing-a-PCAP-with-Decrypted-HTTPS" rel="nofollow">https://www.netresec.com/?page=Blog&#038;month=2020-01&#038;post=Sharing-a-PCAP-with-Decrypted-HTTPS</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
