By Joel Rosenblatt
Columbia University Director of Computer and Network Security

One of the most useful things to me in trying to secure an enterprise like Columbia University is information, and the more information, the better.  This means that for most of the time that I am not in meetings, I sit and read. 

Most of my input overload comes in the form of emails, approximately 800 to 1,000 per day.  I don’t claim to read all of them, and a good number are vendor solicitations.  

Source: securitycurrent

By Mark Rasch

One of the lessons of crisis management is that you don’t make predictions during a crisis.  Not to say that the recent UK vote to leave the EU (“Brexit”) is a crisis per se, but just that it is a period of uncertainty.  So what impact will Brexit have on data security, privacy, governance, and international cooperation in combatting cyber-crime? 

Source: securitycurrent

Poisoned Windows Background Intelligent Transfer Service (BITS) tasks generated network alerts after malware remediation.


CTU Research

Read how threat actors leveraged a BITS capability to create self-contained, download-and-execute tasks that persisted after the original malware infection was remediated.
Source: SecureWorks