text
stringlengths
12
69.1k
Hietala: One of the big things that's changed that I've observed is if you go back a number of years, the sorts of cyber threats that were out there were curious teenagers and things like that . Today, you've got profit-motivated individuals who have perpetrated distributed denial of service attacks to extort money.
Now, they’ve gotten more sophisticated and are dropping Trojan horses on CFO's machines and they can to try in exfiltrate passwords and log-ins to the bank accounts.
We had a case that popped up in our newspaper in Colorado, where a mortgage company, a title company lost a million dollars worth of mortgage money that was loans in the process of funding. All of a sudden, five homeowners are faced with paying two mortgages, because there was no insurance against that.
When you read through the details of what happened it was, it was clearly a Trojan horse that had been put on this company's system. Somebody was able to walk off with a million dollars worth of these people's money.
So you've got profit-motivated individuals on the one side, and you've also got some things happening from another part of the world that look like they're state-sponsored, grabbing corporate IP and defense industry and government sites. So, the motivation of the attackers has fundamentally changed and the threat really seems pretty pervasive at this point.
Complexity is a big part of the challenge, with changes like you have mentioned on the client side, with mobile devices gaining more power, more ability to access information and store information, and cloud. On the other side, we’ve got a lot more complexity in the IT environment, and much bigger challenges for the folks who are tasked for securing things.
Stikeleather: One other piece of it is require an increased amount of business knowledge on the part of the IT group and the security group to be able to make the assessment of where is my IP, which is my most valuable data, and what do I put the emphasis on.
One of the things that people get confused about is, depending upon which analyst report you read, most data is lost by insiders, most data is lost from external hacking, or most data is lost through email. It really depends. Most IP is lost through email and social media activities. Most data, based upon a recent Verizon study, is being lost by external break-ins.
When you move from just "I'm doing security" to "I'm doing risk mitigation and risk management," then you have to start doing portfolio and investment analysis in making those kinds of trade-offs.
We've kind of always have the one-size-fits-all mindset about security. When you move from just "I'm doing security" to "I'm doing risk mitigation and risk management," then you have to start doing portfolio and investment analysis in making those kinds of trade-offs.
... At the end of the day it's the incorporation of everything into enterprise architecture, because you can't bolt on security. It just doesn't work. That’s the situation we're in now. You have to think in terms of the framework of the information that the company is going to use, how it's going to use it, the value that’s associated with it, and that's the definition of EA.
... It's one of the reasons we have so much complexity in the environment, because every time something happens, we go out, we buy any tool to protect against that one thing, as opposed to trying to say, "Here are my staggered differences and here's how I'm going to protect what is important to me and accept the fact nothing is perfect and some things I'm going to lose." Mezzapelle: It comes back to one of the bottom lines about empowering the business. It means that not only do the IT people need to know more about the business, but the business needs to start taking ownership for the security of their own assets, because they are the ones that are going to have to belay the loss, whether it's data, financial, or whatever.
We need to connect the dots and we need to have metrics. We need to look at it from an overall threat point of view, and it will be different based on what company you're about.
They need to really understand what that means, but we as IT professionals need to be able to explain what that means, because it's not common sense. We need to connect the dots and we need to have metrics. We need to look at it from an overall threat point of view, and it will be different based on what company you're about.
You need to have your own threat model, who you think the major actors would be and how you prioritize your money, because it's an unending bucket that you can pour money into. You need to prioritize.
The way that we've done that is this is we've had a multi-pronged approach. We communicate and educate the software developers, so that they start taking ownership for security in their software products, and that we make sure that that gets integrated into every part of portfolio.
The other part is to have that reference architecture, so that there’s common services that are available to the other services as they are being delivered and that we can not control it but at least manage from a central place. Stikeleather: The starting point is really architecture. We're actually at a tipping point in the security space, and it comes from what's taking place in the legal and regulatory environments with more-and-more laws being applied to privacy, IP, jurisdictional data location, and a whole series of things that the regulators and the lawyers are putting on us.
One of the things I ask people, when we talk to them, is what is the one application everybody in the world, every company in the world has outsourced. They think about it for a minute, and they all go payroll. Nobody does their own payroll any more. Even the largest companies don't do their own payroll. It's not because it's difficult to run payroll. It's because you can’t afford all of the lawyers and accountants necessary to keep up with all of the jurisdictional rules and regulations for every place that you operate in.
Data itself is beginning to fall under those types of constraints. In a lot of cases, it's medical data. For example, Massachusetts just passed a major privacy law. PCI is being extended to anybody who takes credit cards.
Because all these adjacencies are coming together, it's a good opportunity to sit down and architect with a risk management framework. How am I going to deal with all of this information?
The security issue is now also a data governance and compliance issue as well. So, because all these adjacencies are coming together, it's a good opportunity to sit down and architect with a risk management framework. How am I going to deal with all of this information?
Hietala: I go back to the risk management issue. That's something that I think organizations frequently miss. There tends to be a lot of tactical security spending based upon the latest widget, the latest perceived threat -- buy something, implement it, and solve the problem.
Taking a step back from that and really understanding what the risks are to your business, what the impacts of bad things happening are really, is doing a proper risk analysis. Risk assessment is what ought to drive decision-making around security. That's a fundamental thing that gets lost a lot in organizations that are trying to grapple the security problems.
Stikeleather: I can argue both sides of the [cloud security] equation. On one side, I've argued that cloud can be much more secure. If you think about it, and I will pick on Google, Google can expend a lot more on security than any other company in the world, probably more than the federal government will spend on security. The amount of investment does not necessarily tie to a quality of investment, but one would hope that they will have a more secure environment than a regular company will have.
You have to do your due diligence, like with everything else in the world. I believe, as we move forward, cloud is going to give us an opportunity to reinvent how we do security.
On the flip side, there are more tantalizing targets. Therefore they're going to draw more sophisticated attacks. I've also argued that you have statistical probability of break-in. If somebody is trying to break into Google, and you're own Google running Google Apps or something like that, the probability of them getting your specific information is much less than if they attack XYZ enterprise. If they break in there, they are going to get your stuff.
Recently I was meeting with a lot of NASA CIOs and they think that the cloud is actually probably a little bit more secure than what they can do individually. On the other side of the coin it depends on the vendor. You have to do your due diligence, like with everything else in the world. I believe, as we move forward, cloud is going to give us an opportunity to reinvent how we do security.
I've often argued that a lot of what we are doing in security today is fighting the last war, as opposed to fighting the current war. Cloud is going to introduce some new techniques and new capabilities. You'll see more systemic approaches, because somebody like Google can't afford to put in 150 different types of security. They will put one more integrated. They will put in, to Mary Ann’s point, the control panels and everything that we haven't seen before.
So, you'll see better security there. However, in the interim, a lot of the software-as-a-service (SaaS) providers, some of the simpler platform-as-a-service (PaaS) providers haven’t made that kind of investment. You're probably not as secured in those environments.
Mezzapelle: For the small and medium size business cloud computing offers the opportunity to be more secure, because they don't necessarily have the maturity of processes and tools to be able to address those kinds of things. So, it lowers that barrier to entry for being secure.
For enterprise customers, cloud solutions need to develop and mature more. They may want to do with hybrid solution right now, where they have more control and the ability to audit and to have more influence over things in specialized contracts, which are not usually the business model for cloud providers.
I would disagree with Jim Stikeleather in some aspects. Just because there is a large provider on the Internet that’s creating a cloud service, security may not have been the key guiding principle in developing a low-cost or free product. So, size doesn't always mean secure.
You have to know about it, and that's where the sophistication of the business user comes in, because cloud is being bought by the business user, not by the IT people. That's another component that we need to make sure gets incorporated into the thinking. Stikeleather: I am going to reinforce what Mary Ann said. What's going on in cloud space is almost a recreation of the late '70s and early '80s when PCs came into organizations. It's the businesspeople that are acquiring the cloud services and again reinforces the concept of governance and education. They need to know what is it that they're buying.
There will be some new work coming out over the next few months that lay out some of the tough issues there and present some approaches to those problems.
I absolutely agree with Mary. I didn't mean to imply size means more security, but I do think that the expectation, especially for small and medium size businesses, is they will get a more secure environment than they can produce for themselves.
Hietala: There are a number of different groups within The Open Group doing work to ensure better security in various areas. The Jericho Forum is tackling identity issues as it relates to cloud computing. There will be some new work coming out of them over the next few months that lay out some of the tough issues there and present some approaches to those problems.
We also have the Open Trusted Technology Forum (OTTF) and the Trusted Technology Provider Framework (TTPF) that are being announced here at this conference. They're looking at supply chain issues related to IT hardware and software products at the vendor level. It's very much an industry-driven initiative and will benefit government buyers, as well as large enterprises, in terms of providing some assurance of products they're procuring are secure and good commercial products.
Also in the Security Forum, we have a lot of work going on in security architecture and information security management. There are a number projects that are aimed at practitioners, providing them the guidance they need to do a better job of securing, whether it's a traditional enterprise, IT environment, cloud and so forth. Our Cloud Computing Work Group is doing work on a cloud security reference architecture. So, there are number of different security activities going on in The Open Group related to all this.
conversation when the organ prelude started.
a smattering of bishops in their red and white regalia.
Gay marriage continued to grow as an issue this week as more gay couples chose to exchange marriage vows. In San Francisco, Rosie O'Donnell and her longtime companion were among the gay couples who decided to tie the knot. And in New Paltz, New York, just up the Hudson from New York City, several couples were married by the city's 26-year-old mayor. At the same time, the politics heated up.
I have been in prayer and reflection concerning the diocese's position on the Network of Anglican Communion Dioceses and Parishes. I have read the March 3, 2004 letter to the Executive Council signed by the Rev. Chuck Treadwell and 16 clergy.
Which is why it is difficult to take Episcopal Church Presiding Bishop Frank Griswold seriously when he said in a February 25 statement on the Federal Marriage Amendment (FMA) that the Episcopal Church is “committed to continuing discussion and discernment” concerning human sexuality.
March 05 2004 By virtueonline ECUSA: The "Lone Ranger" or Lonely Prophet?
Add to that the suspension of relations with the Episcopal Church by Anglican bishops and provinces worldwide. Church leaders such as the presiding bishop who have accused George Bush of being the “lone ranger” in foreign policy have themselves formed a small band of “lone rangers” in acting unilaterally against the other 67 million members of the Anglican Communion and 1.3 billion Roman Catholic and Orthodox Christians.
It is not a group dedicated to break away from the Episcopal Church, as some have portrayed it, and neither is it an attempt to take the Diocese out of the Episcopal Church, as has also been charged. It is an attempt to remain within the Episcopal Church and make a voice heard which is largely at variance with decisions made at the last General Convention in August 2003.
These people met all the candidates, as did I and many non-delegates, and we prayed and inquired of God about their choice and vote. I know of others who apparently did not bother meeting the candidates, including one who told me, wouldn’t it be great for Gene to be bishop, as she knows him.
TORONTO — Toronto police have arrested a landscaper who they say killed men and buried their body parts in potted plants on the properties where he worked.
Bruce McArthur, 66, is charged with five murders. Authorities expect the number of victims to go up.
“We do believe there are more and I have no idea how many more there are going to be,” homicide detective Sgt. Hank Idsinga told reporters Monday.
Police have identified more than 30 properties where McArthur worked and urged his past clients to come forward.
Initially, investigators thought the victims were all from the Gay Village, a neighborhood in Toronto known for its predominantly gay population. But new evidence is expanding the victim profile, Idsinga said.
“The last two victims don’t quite fit the profile of the earlier victims. It encompasses more than just the gay community,” he said.
The Ministry of the Attorney General said McArthur’s lawyer is Jeffery Couse. When CNN reached Couse, he declined to comment.
Police have characterized McArthur as a serial killer.
McArthur was first charged earlier this month in two murders. They were in connection with the death of two men who went missing last year.
On Monday, police added three first-degree murder charges in connection with missing persons cases that dated as far back as 2012.
Gary Speedie was a former coworker of McArthur. The two met while doing landscape work for a mutual friend.
Speedie said he hadn’t seen McArthur in several years.
“We did go to his apartment that he shared with his ex-partner for dinner once about 12 years ago. He came to our place for Christmas gatherings around the same time,” he said.
Kayhan was reported missing in October 2012.
Lisowick was never reported missing, but authorities believe he was murdered sometime between May 2016 and July 2017.
Mahmudi was reported missing in August 2015.
Esen had no fixed address, and often had a small plastic suitcase on wheels, police said. He was reported missing in April last year.
Kinsman was last seen in June 2017.
“He was always the smartest guy in the room. And wasn’t boastful about that. If he was your friend he was loyal and kind and generous. I miss him very much.” Healy said.
McArthur is due in Toronto provincial criminal court on February 14.
Mark Clements, a torture victim of Chicago police Cmdr. Jon Burge, gets emotional July 6, 2016, during testimony at a City Council hearing regarding police oversight reforms.
Ald. Debra Silverstein, 50th, from left, Milagros "Milly" Santiago, 31st, and David Moore, 17th, listen to testimony of Shari Runner, CEO of the Chicago Urban League who excoriated the council for the handling of the hearings July 6, 2016.
City officials took the latest step Wednesday to try to convince a skeptical public they are doing enough to deal with deeply entrenched problems at the Chicago Police Department, holding a City Council hearing on Mayor Rahm Emanuel’s promised police oversight reforms.
Its name may hint at the presence of a healthful component, but fruit juice is often anything but healthy -- and it shouldn’t be included in the diet of children under age 1, experts argue.
According to a new policy statement issued by the American Academy of Pediatrics (AAP), fruit juice offers “no nutritional benefit” to tots who haven’t yet celebrated their first birthday.
Sugary fruit juice contributes to the rising rates of obesity and concerns about dental health, the AAP contends in its statement -- the first revision to its stance on fruit juice since 2001.
Per the new recommendations, children older than 1 year can consume 100% fruit juice as part of a well-balanced diet. However, the amount a child consumes should be limited based on his or her age.
Toddlers. Parents and caregivers should restrict fruit juice intake to 4 ounces daily (at most) for toddlers age 1-3. Additionally, toddlers shouldn’t be given juice from bottles or “sippy cups.” The group argues that doing so could lead to tooth decay.
Age 4-6. Limit fruit juice intake to 4-6 ounces daily.
Ages 7-18. Limit fruit juice intake to 8 ounces or 1 cup of the recommended 2 to 2 ½ cups of fruit servings per day.
Previously, the Academy advised against offering fruit juice to children under the age of 6 months. Now, the group says children shouldn’t have fruit juice at all during their entire first year of life.
A separate report, “The First 1,000 Days: Nourishing America’s Future,” suggests nutrition during the 1,000 days between a child’s conception and their second birthday plays a huge role in their overall brain and physical development.
The report found that at least 40% of parents introduce sugary drinks to their children too early.
The AAP says children should be encouraged to eat whole fruits and be educated about the benefits of fruit as compared with juice, which lacks fiber and may contribute to excessive weight gain.
The full statement has been published online in the journal Pediatrics.
A new study has found that Vitamin D, readily available in supplements or cod liver oil, can counter the effects of Crohn's disease. John White, an endocrinologist at the Research Institute of the McGill University Health Centre, led a team of scientists from McGill University and the Université de Montréal who present their findings about the inflammatory bowel disease in the latest Journal of Biological Chemistry.
"Our data suggests, for the first time, that Vitamin D deficiency can contribute to Crohn's disease," says Dr. White, a professor in McGill's Department of Physiology, noting that people from northern countries, which receive less sunlight that is necessary for the fabrication of Vitamin D by the human body, are particularly vulnerable to Crohn's disease.
Vitamin D, in its active form (1,25-dihydroxyvitamin D), is a hormone that binds to receptors in the body's cells. Dr. White's interest in Vitamin D was originally in its effects in mitigating cancer. Because his results kept pointing to Vitamin D's effects on the immune system, specifically the innate immune system that acts as the body's first defense against microbial invaders, he investigated Crohn's disease. "It's a defect in innate immune handling of intestinal bacteria that leads to an inflammatory response that may lead to an autoimmune condition," stresses Dr. White.
Dr. White and his team found that Vitamin D acts directly on the beta defensin 2 gene, which encodes an antimicrobial peptide, and the NOD2 gene that alerts cells to the presence of invading microbes. Both Beta-defensin and NOD2 have been linked to Crohn's disease. If NOD2 is deficient or defective, it cannot combat invaders in the intestinal tract.
What's most promising about this genetic discovery, says Dr. White, is how it can be quickly put to the test. "Siblings of patients with Crohn's disease that haven't yet developed the disease might be well advised to make sure they're vitamin D sufficient. It's something that's easy to do, because they can simply go to a pharmacy and buy Vitamin D supplements. The vast majority of people would be candidates for Vitamin D treatment."
"This discovery is exciting, since it shows how an over-the-counter supplement such as Vitamin D could help people defend themselves against Crohn's disease," says Marc J. Servant, a professor at the Université de Montréal's Faculty of Pharmacy and study collaborator. "We have identified a new treatment avenue for people with Crohn's disease or other inflammatory bowel diseases."
This study was funded by a grant from McGill University.
Robert, Julie. "Sufferers Of Crohn's Disease May Benefit From Vitamin D Supplements." Medical News Today. MediLexicon, Intl., 29 Jan. 2010. Web.
Of all the directors currently working, there are few who use locations more eloquently than Matteo Garrone. His latest film – and arguably his best – unfolds under mottled, corpse-flesh skies in a sprawl of cancerous concrete along a blighted seafront just north of Naples. Also used in Garrone’s breakthrough picture Gomorrah, it’s a location with a history. A semi-derelict resort known locally as the parco degli abusivi, or Park of the Illegals, it was developed in a haze of 1960s optimism but corrupted from the foundations up by organised crime. The perfect backdrop, then, to this tale of Marcello (Marcello Fonte), a meek little dog groomer who aspires to a decent life but finds his world tainted by the targeting of bullying lowlife Simone (Edoardo Pesce).
Fonte, who deservedly won the best actor prize at Cannes this year, is remarkable. He is in many ways a tragic figure, with his mournful, trusting eyes and a smile that is the craven, appeasing grimace of a kicked animal. Admittedly, the whole dog/man symbolism is a little on the nose at times. Simone clenches his big hammy fist and cuffs him, an outward display of affection that is designed to hurt just enough to keep Marcello in line.
There are a few things that Marcello holds dear. His relationship with his daughter from a failed marriage. The dogs he cares for. And his standing within the community of fellow business owners in the gap-toothed strip of shopfronts. One by one, Simone threatens or destroys them. Finally, having served a prison sentence for a crime that Simone committed, Marcello decides that he has had enough and attempts to strike back against his tormentor. It was never going to be an even fight. If Marcello is a nervy terrier of a man, Simone is a battle-scarred mastiff.
A wrenching final shot, in which realisation settles on Marcello’s face as he slumps in a desolate children’s playground, is given an added potency by the knowledge that this sad, savage tale is based on a true story.
Watch a trailer for Dogman.
A madrasa student in Feni was set on fire yesterday allegedly for refusing to withdraw a case filed against the principal for sexually harassing her late last month.
With 75 percent burns, the 18-year-old is now struggling for life at the Dhaka Medical College Hospital.
Some four unidentified persons allegedly took her to the rooftop of three-storey administrative building of Sonagazi Islamia Senior Fazil Madrasa yesterday morning, saying a friend was being assaulted there.
The girl was an Alim (equivalent to HSC) examinee and a few minutes were left before the beginning of Arabic first paper test at 10:00am.
“They asked her to withdraw the case against Principal Maulana Siraj Ud Doula. As she refused to budge, one of them poured kerosene on her from a glass and set her ablaze,” the victim's elder brother told The Daily Star, quoting her.