El Diario del CISO (The CISO Journal) Edición 11 2018 | Page 4
users into believing not only that a website is associated with
someone else but also that the website is secure when it is not.
Influencers
Wayne Schepens
Managing Director at LaunchTech Communications
A crack in Under Armour
Within Security Operations Centers (SOCs), and throughout IT
security departments, people and tools rule supreme. Cybersecurity
management within most organizations is dictated by spending on
human resources and technology, with little to no emphasis on
Return on Investment (ROI) analysis, and little to no proof-of-value
analysis on the myriad of security products in use.
As a result, much confusion within the cybersecurity industry exists
concerning the true effectiveness and Total Overall Cost (TOC)
concerning security tools. Customers making use of cybersecurity
products tend to ask ambiguous, irrelevant questions like, “How long
has it been since we’ve had a successful breach?” Unfortunately,
this question is not fruitful. Breaches are inevitable, and this thinking
is not proactive. Answering this question will not mitigate future risks,
which is all that counts. Leaders are scratching their heads
wondering what works, what does not work, and how to strengthen
their cybersecurity posture for future.
The complete article is here
Doug Isenberg
Internet Law Attorney (The GigaLaw Firm); Marketing Entrepreneur
How Cybersquatters Use 'https' to Confuse Internet Users
Cybersquatters may be adding a new trick to their repertoire:
including the characters "https" in a domain name to confuse Internet
As Wikipedia notes, "https" is "an adaptation of the Hypertext
Transfer Protocol (HTTP) for secure communication over a computer
network" and is used for the "protection of the privacy and integrity of
the exchanged data."
The complete article is here