[ad_1]
From politics and sports to the environment and food, Times editors and reporters predict the biggest stories of the coming year.
[ad_2]
Cody Long, Steve Saldivar
Source link

[ad_1]
From politics and sports to the environment and food, Times editors and reporters predict the biggest stories of the coming year.
[ad_2]
Cody Long, Steve Saldivar
Source link

[ad_1]
Cisco recently published its tenth annual data breach report, and some of the findings should be cause for concern by people who own, run, or work for businesses.
The firm’s 2017 edition of its annual cybersecurity report entitled “Cybersecurity Report: Chief Security Officers Reveal True Cost of Breaches And The Actions That Organizations Are Taking,” provides insights based on threat intelligence gathered by Cisco’s security experts, combined with input from nearly 3,000 Chief Security Officers (CSOs) and other security operations leaders from businesses in 13 countries.
Cisco noted that according to its research, in 2016:
(If you own or work for a business, take note: data breaches have repercussions.)
(The repercussions are quite costly.)
(Complexity and a lack of skilled professionals are putting businesses at risk.)
(Criminals often don’t need to spend resources crafting and executing advanced attacks – simple attacks can do the job.)
(Spam is a serious problem that has not gone away – because it works!)
Old-fashioned adware software that downloads advertising without user permission – continues to prove successful, infecting 75 percent of organizations polled. (…as is adware.)
Just 56 percent of security alerts are investigated and less than half of legitimate alerts are actually remediated. Defenders, while confident in their tools, are undermined by complexity and manpower challenges; criminals are exploiting the inability of organizations to handle all important security matters in a timely fashion. (Information overload is causing a “Boy who cried worlf” situation in some envrionments, and too many real alerts are overwhelming others.)
Twenty-seven percent of employee-introduced, third-party cloud applications, intended to open up new business opportunities and increase efficiencies, were categorized as high risk and created significant security concerns. (Inadequately vetted applications can create risks.)
On the positive side, 90% of organizations that experienced a breach in 2016 are improving threat defense technologies and processes after attacks by separating IT and security functions (38 percent), increasing security awareness training for employees (38 percent), and implementing risk mitigation techniques (37 percent). (Thankfully, firms are investing in improving the situation.)
Discussing the report, John N. Stewart, Senior Vice President and Chief Security and Trust Officer, at Cisco noted that “In 2017, cyber is business, and business is cyber -that requires a different conversation, and very different outcomes. Relentless improvement is required and that should be measured via efficacy, cost, and well managed risk. The 2017 Annual Cybersecurity Report demonstrates, and I hope justifies, answers to our struggles on budget, personnel, innovation and architecture.”
Here are comments from several other industry insiders on the report.
David Vergara, Head of Global Product Marketing, VASCO Data Security:
“This report makes three things abundantly clear. The first is that cybercriminal’s weapon of choice is not always the sophisticated attack; generally, they prefer the path of least resistance, so security laggards beware. Second is the hard cost of a breach, through lost customers, revenue and business, is rising dramatically. This cost should drive more pointed security resource discussions and prop up related business cases. Third is that the last thing CSO’s need is another point solution to complement the busy array of existing security platforms. Step one is to assess the weakest channels. If mobile represents the greatest risk, leverage a solution that compliments your existing platform to ensure trust on the device and mobile applications.”
Brad Bussie, Director of Product Management, STEALTHbits Technologies:
“When assessing risk, one of the first things you do is identify the value of the asset you are trying to protect or mitigate. If it costs more to protect or mitigate the risk to the asset then the asset itself is worth, you don’t do it. Statistics from this study, and others, show an alarming trend that asset risk is no longer being calculated correctly. Losing customers, revenue, and opportunities can be mapped directly back to breached systems. It would be interesting to see how much it would have cost to protect the systems in question, or to change to process that was exploited and compare it to what was lost because of the breach “
Don Duncan, Security Engineer, NuData Security:
“CISCO’s findings that 22% of breached organizations lost customers and a significant number of these companies lost 20% of their entire customer base is a sobering data point for any organization when considering whether to disclose a breach publically. Regulations may be coming that will force disclosures. Until that happens, with so much at risk it’s no wonder that breach numbers are vastly underestimated. The other important point to note with this finding is what we’ve all known for a while now -breaches are impactful to customers and influence their loyalty. It’s not news that lost customers, revenue, business, and opportunities are part of the fallout from severe breaches, and this study can help many companies grasp the magnitude of what is at stake. What is new is how the attack vectors are changing; becoming more organized and nimble.
Brian Laing, VP of Business Development and Products, Lastline:
“The Cisco data breach report highlights the continually evolving techniques used by criminals to exfiltrate sensitive corporate data, and the resulting impact on business performance. Enterprises must continually expand and enhance their security capabilities to keep up with new techniques, schemes, and technology continually introduced by organized crime.”
[ad_2]
Joseph Steinberg
Source link

[ad_1]
It was this time last year that New York Times media columnist Ben Smith announced he’d be giving up one of the most coveted jobs in journalism. The former BuzzFeed editor’s abrupt departure quickly sparked a guessing game among media-watchers and members of the newsroom as to who would take his place. While Smith went on to build and launch Semafor, his new media start-up with cofounder Justin Smith, the Times has yet to fill his old slot.
I’m told people involved with hiring have solicited beat memos from journalists both inside and outside the paper, though it’s unclear what, if anything, has come of them. A few names outside have emerged as contenders, including the Washington Post media writer (and former Vanity Fair special correspondent) Sarah Ellison, former CNN anchor Brian Stelter, and Puck media columnist Dylan Byers; all three had conversations with newsroom leaders, according to sources. (Semafor’s Max Tani reported earlier on potential candidates in Smith’s new media newsletter, which is now blasted out on Sunday nights around the same time his old Times column used to appear online.) I’m told that Byers was in talks with management about the job but took himself out of the running late last year. Stelter, meanwhile, has had additional meetings with the Times in recent weeks.
It’s surprising for such a high-profile perch—one that Smith made a weekly destination for media junkies not seen since the David Carr era—to be dormant for this long. A Times insider last year told me that Smith’s departure presented an opportunity “for rethinking the focus” of its signature column. And yet, one person who talked to the Times for the gig told me they got the impression that the Times was still trying to figure out what they were doing with the column—and looking for a columnist to come to them with a clear vision for it. “We continue to seek to fill the position,” a Times spokesperson told me, “but don’t have anything further to share on our personnel processes.”
Meanwhile, the paper’s media coverage is without a permanent media editor ever since editor Jim Windolf moved to a new role in Styles about a year ago. Joe Plambeck, an editor on the Business desk, has been editing a lot of the section’s copy in the interim. The Times approached Financial Times US business editor Andrew Edgecliffe-Johnson about the media editor job, according to a source familiar with the information. (Edgecliffe-Johnson declined to comment.)
Perhaps, one contributing factor to the delay is the number of cooks in the kitchen—among those involved in the columnist hiring process is business editor Ellen Pollock, deputy managing editor Sam Dolnick, and, of course, executive editor Joe Kahn—and the fact that the Times doesn’t seem to know what it even wants the column to be. That’s in stark contrast to Smith’s appointment, which famously came together after then executive editor Dean Baquet, knowing exactly what he wanted, took Smith out to a midwinter Lambs Club lunch.
[ad_2]
Charlotte Klein
Source link