<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TechDiem.com &#187; InfoSec</title>
	<atom:link href="/tag/infosec/feed/" rel="self" type="application/rss+xml" />
	<link>http://techdiem.com</link>
	<description>Your Daily Dose of Technology and Startup News</description>
	<lastBuildDate>Thu, 24 Sep 2015 16:44:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>What Companies Want In A CISO</title>
		<link>http://techdiem.com/2015/09/24/what-companies-want-in-a-ciso/</link>
		<comments>http://techdiem.com/2015/09/24/what-companies-want-in-a-ciso/#comments</comments>
		<pubDate>Thu, 24 Sep 2015 16:43:36 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/24/what-companies-want-in-a-ciso/</guid>
		<description><![CDATA[Joyce Brocaglia founder of the Executive Women&#8217;s Forum and CEO of Alta Associates joins the Dark Reading News Desk at [&#8230;]]]></description>
				<content:encoded><![CDATA[<div align="center" style="padding-left:5px; padding-right:5px; padding-bottom:5px; padding-top:5px; margin-left:auto; margin-right:auto; ">
<script type="text/javascript"><!--
google_ad_client = "ca-pub-3784989093496765";
google_ad_width = 728;
google_ad_height = 90;
google_ad_type = "text_image";
google_color_border = "FFFFFF";
google_color_link = "0000FF";
google_color_text = "000000";
google_color_bg = "FFFFFF";
google_color_url = "008000";
//-->
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
</script>
</div>
<p class="small darkgray">Joyce Brocaglia founder of the Executive Women&#8217;s Forum and CEO of Alta Associates joins the Dark Reading News Desk at Black Hat to discuss closing the gender gap in security and what companies are looking for in a chief information security officer.</p>
<p>Article source: Dark <a href="http://www.darkreading.com/operations/what-companies-want-in-a-ciso/v/d-id/1322307?_mc=RSS_DR_EDT">http://www.darkreading.com/operations/what-companies-want-in-a-ciso/v/d-id/1322307?_mc=RSS_DR_EDT</a> </p><center> <script type="text/javascript"><!--
google_ad_client = "ca-pub-3784989093496765";
google_ad_width = 468;
google_ad_height = 60;
google_ad_type = "text_image";
google_color_border = "FFFFFF";
google_color_link = "0000FF";
google_color_text = "000000";
google_color_bg = "FFFFFF";
google_color_url = "008000";
//-->
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
</script> </center>
]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/24/what-companies-want-in-a-ciso/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Shellshock&#8217;s Cumulative Risk One Year Later</title>
		<link>http://techdiem.com/2015/09/24/shellshocks-cumulative-risk-one-year-later/</link>
		<comments>http://techdiem.com/2015/09/24/shellshocks-cumulative-risk-one-year-later/#comments</comments>
		<pubDate>Thu, 24 Sep 2015 16:43:34 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/24/shellshocks-cumulative-risk-one-year-later/</guid>
		<description><![CDATA[How long does it take to patch an entire distribution and bring it up to date? Longer than you think. [&#8230;]]]></description>
				<content:encoded><![CDATA[<header /><span class="strong black">How long does it take to patch an entire distribution and bring it up to date? Longer than you think. </span>
<p class="">When Windows XP reached its end of life, there were approximately 257 outstanding security patches required to bring the OS up to date &#8212; and this was considering cumulative versions for both commercial and business, as well as patch supercedence. Since the source code is closed, it never suffered from the fragmentation issues affecting many vulnerabilities, such as what we saw last year with the now infamous <a href="http://www.darkreading.com/shellshock-bash-bug-impacts-basically-everything-exploits-appear-in-wild/d/d-id/1316064">Shellshock</a> &#8212; impacting a half-billion Web servers and other Internet-connected devices.</p>
<p>On September 24, 2014, when the bug was first disclosed, open source, Linux, OS X, embedded systems, and Unix all were affected and in total, versions available from 1994 (version 1.14) to 2014 could be exploited due to this GNU bash shell vulnerability. But in the intervening 12 months, a lot more needed to be done than just patching a single platform and bringing it up to date. That in itself is something many organizations still find difficult to do today.</p>
</p>
<p><a href="http://www.darkreading.com/shellshocks-cumulative-risk-one-year-later/a/d-id/1322323?_mc=RSS%5FDR%5FEDTimage_number=1" target="new"><img class="docimage" src="/wp-content/plugins/RSSPoster_PRO/cache/c856b_Shellshock_logo_lock.svg.png" alt="By Bf5man [CC0], via Wikimedia Commons" border="0" /></a></p>
<p>Why are these facts important on the one year anniversary of Shellshock? Over time, it’s become more difficult to properly perform a thorough vulnerability assessment of all the vulnerabilities that have been found in the past, many of which are still applicable. However, the biggest issue is the cumulative problem of flaws which are affecting systems. Information security teams must remember that Shellshock and other flaws are not gone even though they’ve disappeared from media headlines. Some systems, due to age, end of life, or a vendor’s incompetence, still remain unpatched today.</p>
<p>While mitigating controls may help reduce or eliminate the risk, the fact remains that any newly identified vulnerabilities aggravate the problem and increase the total vulnerability count with each new flaw. Shellshock, as bad as it was and may be still to this day, is just another critical vulnerability in the process and systems that are not being patched, or even assessed. This creates a cumulative risk problem, which could allow an exploit through multiple vectors verses just one.</p>
<p>While this may seem like common sense, it represents an interesting problem: How long does it take to patch an entire distribution and bring it up to date? Depending how many missing patches exist, more time is needed to remediate and with each new finding the snowballing effect of risk grows.  This is true for any operating system and application, even when a single cumulative security update is available; the more you have to patch, the longer it will take, and the more it costs to do so.</p>
<p>So how can infosec teams reduce the cumulative side effects from new vulnerabilities? Here are five suggestions:</p>
<ol>
<li>Ensure that your organization has a vulnerability assessment and patch remediation process to identify risks. This helps make sure you’re patching quickly. Once a flaw is found, regardless of how, it can be closed in a timely, non-cumulative fashion.</li>
<li>When selecting technology vendors, verify that service level agreements include security and maintenance patches, as well as end of life dates for operating systems, embedded devices or applications. This will ensure that as solutions are being deployed, they can be remediated for the life expectancy of the implementation.</li>
<li>Vulnerability assessments themselves have evolved greatly from the days of network scanners. Many security tools from IDS/IPS systems, endpoint agents, next generation firewalls, sniffers, etc. can detect vulnerabilities that are dormant or being actively tested in a hostile environment. Do not rely on just one technology to identify risks and missing security patches. Leverage every single one and correlate the information to identify weaknesses and attacks.</li>
<li>Credential access is always a problem with sensitive hosts and when un-hardening is just not permissible. When local agents are not permitted to do the work (patch management, Windows update, or even vulnerability assessment agents), consider having a cloned isolated lab environment where remote access is permitted (un-harden duplicate hosts) to perform assessments. The results can then be applied to production. This works well with cloning features present in many virtualization technologies.</li>
<li>When network assessment technologies are being deployed, work with the network infrastructure team to logically place scanners as electronically close to targets (not over WAN links) as possible. Avoid scanning through firewalls, other security sensors, and whitelist the scanner only when needed. They should be close enough to each subnet that they have unrestricted access to each target they are responsible for and every port. This includes whether they are hosted in the cloud, as a virtual image, or even a physical scanner in a remote country.</li>
</ol>
<p>When was the last time you checked under the hood for the cumulative impact of Shellshock or other vulnerabilities? Let’s chat about that in the comments. </p>
<p><span class="italic">With more than 20 years of IT industry experience, Morey Haber serves as the vice president of technology for BeyondTrust. He joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition and currently oversees solutions for bothvVulnerability and privileged &#8230; View Full Bio</span></p>
<p>Article source: Dark <a href="http://www.darkreading.com/shellshocks-cumulative-risk-one-year-later/a/d-id/1322323?_mc=RSS_DR_EDT">http://www.darkreading.com/shellshocks-cumulative-risk-one-year-later/a/d-id/1322323?_mc=RSS_DR_EDT</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/24/shellshocks-cumulative-risk-one-year-later/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Aussie spy agency gets first bug bounty credit</title>
		<link>http://techdiem.com/2015/09/24/aussie-spy-agency-gets-first-bug-bounty-credit/</link>
		<comments>http://techdiem.com/2015/09/24/aussie-spy-agency-gets-first-bug-bounty-credit/#comments</comments>
		<pubDate>Thu, 24 Sep 2015 10:43:35 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/24/aussie-spy-agency-gets-first-bug-bounty-credit/</guid>
		<description><![CDATA[Australia&#8217;s national spy agency has been credited with its first public vulnerability disclosure after reporting a remote code execution vulnerability [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Australia&#8217;s national spy agency has been credited with its first public vulnerability disclosure after reporting a remote code execution vulnerability in an HP Autonomy component.</p>
<p>The Australian Signals Directorate had previously reported vulnerabilities in a variety of software but it is the first time its work has been publicly recognised.</p>
<p>The agency like its overseas peers dabbles in both defensive and offensive security vulnerability and exploitation research.</p>
<p>It says the disclosure is part of its internal security function.</p>
<p>&#8220;As part of its Information Security function, ASD has previously disclosed vulnerabilities to vendors. This is the first time ASD has been publicly credited with the discovery and disclosure,&#8221; a spokesperson says.</p>
<p>&#8220;ASD vulnerability research work has long served the wider information security community, but until now has not received public acknowledgement.</p>
<p>&#8220;ASD will continue to work with vendors on the discovery and public disclosure of vulnerabilities in software and hardware as appropriate.&#8221;</p>
<p>The vulnerability (CVE-2015-5416) affects an Autonomy component called KeyView IDOL, which parses non-text documents to suck them into databases. The IDOL GIF parsing remote code execution hole is rated a severity score of 7.5 and allows attackers to execute arbitrary code on vulnerable installations</p>
<p>Victims must fall victim to phishing attacks or otherwise visit malicious pages or open malicious files to be exploited.</p>
<blockquote><p>&#8220;It is possible to trigger a buffer overflow by specifying an overly large ImageWidth within a GIF. A remote attacker could exploit this vulnerability to execute arbitrary code under the context of the process.&#8221;</p></blockquote>
<p>A <a target="_blank" href="https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04771027">fix</a> has been issued. ®</p>
<p class="wptl btm">
                    <span>Sponsored: </span><br />
                    <a href="http://go.theregister.com/tl/1391/-3629/go-beyond-apm-with-real-time-it-operations-analytics.pdf?td=wptl1391">Go beyond APM with real-time IT operations analytics</a>
                </p>
<p>Article source: TheReg <a href="http://go.theregister.com/feed/www.theregister.co.uk/2015/09/23/aussie_spy_agency_gets_first_bug_bounty_credit/">http://go.theregister.com/feed/www.theregister.co.uk/2015/09/23/aussie_spy_agency_gets_first_bug_bounty_credit/</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/24/aussie-spy-agency-gets-first-bug-bounty-credit/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Bloodthirsty data parasites hungrily eye up healthcare sector</title>
		<link>http://techdiem.com/2015/09/24/bloodthirsty-data-parasites-hungrily-eye-up-healthcare-sector/</link>
		<comments>http://techdiem.com/2015/09/24/bloodthirsty-data-parasites-hungrily-eye-up-healthcare-sector/#comments</comments>
		<pubDate>Thu, 24 Sep 2015 10:43:34 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/24/bloodthirsty-data-parasites-hungrily-eye-up-healthcare-sector/</guid>
		<description><![CDATA[The healthcare industry sees 340 per cent more security incidents and attacks than the average market segment, according to a [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The healthcare industry sees 340 per cent more security incidents and attacks than the average market segment, according to a new study by Raytheon|Websense.</p>
<p>Raytheon|Websense also warns that healthcare organisations are more than 200 per cent more likely to encounter data theft. Carl Leonard, principal security analyst at Raytheon|Websense, said that healthcare organisations are targeted by hackers because of the richness of the data they hold, which once stolen can be monetised via various scams.</p>
<p>&#8220;Healthcare records hold a treasure trove of data that is valuable to an attacker,&#8221; Leonard explained. &#8220;No other single type of record contains as much Personally Identifiable Information (PII) that can be used in a multitude of different follow-up attacks and various types of fraud.&#8221;</p>
<p>The rapid digitisation of the healthcare industry, combined with the value of the data at hand, has led to a massive increase in the number of targeted attacks against the sector, according to Raytheon|Websense. Health records not only contain vital information on the identity of an individual (name, address, social security) but also often link to financial and insurance information.</p>
<p>&#8220;Access to PII allows an attacker to commit identity fraud, while the financial information can lead to financial exploitation,&#8221; Leonard added. &#8220;This is a logical and profitable secondary attack area for cyber-criminals who have already dealt in stolen credit card data.&#8221;</p>
<p>Healthcare data leaks doubled between 2013 and 2014, <a target="_blank" href="http://www.theregister.co.uk/2015/02/03/icos_data_protection_audit_powers_extended_to_cover_nhs_bodies/">leading UK data privacy watchdog the ICO</a> to levy fines totalling £1.3m against NHS organisations.</p>
<p>Malware slingers are targeting healthcare organisations worldwide. Healthcare is 4.5 times more likely to be impacted by Cryptowall (ransomware designed to blackmail users into paying a ransom for the release of their data) and three times more likely to be impacted by Dyre (malware designed to steal financial data), according to Raytheon|Websense.</p>
<p>&#8220;As healthcare organisations are committed to delivering excellent patient care, there is a must for a high availability of data stores, and malware authors are aware of this. As a result, they are targeting this industry,&#8221; Leonard explained. &#8220;Healthcare records also contain information which is up to ten times more valuable on the black market. Malware authors are determined to launch advanced malware in order to secure access to that valuable data.&#8221;</p>
<p>The figures from Websense Security Labs&#8217; <em>2015 Healthcare Drill-Down Report</em> (available <a target="_blank" href="http://www.websense.com/healthcare-drill-down">here</a>) came from an analysis of &#8220;real-world attack telemetry&#8221;.</p>
<p>The study (extract below) provides an overview of the modern healthcare industry landscape, where various trends and pressures are creating a febrile environment for hacker exploitation.</p>
<blockquote>
<p>Modern medical care is delivered through an incredibly complex network of information technology systems connecting patients, doctors, nurses, pharmacists, technicians, administrators and accountants with electronic health records (EHR), connected medical devices and insurance companies. Driven by the need to improve patient outcomes and lower costs, the rush to embrace digital technology has created a complex network of connected devices, systems and entities where security may be an underfunded afterthought.</p>
<p>Network security is further complicated when IT must balance protecting data from inappropriate access against the fact that lives could be lost if medical personnel cannot access the information they need, when they need it. Data thieves recognise both the incredible value of healthcare information and the vulnerabilities and security gaps which exist in this newly-connected world.</p>
</blockquote>
<p>Raytheon|Websense&#8217;s concern about the growing security problems in the healthcare sector is shared by other security researchers. The healthcare industry was the one most effected by data breaches, according to a new study by Trend Micro based on an analysis of 10 years of data from the Privacy Rights Clearinghouse. The top three breach methods in the healthcare industry were loss or theft, insider leaks and unintended disclosures.</p>
<p>Trend&#8217;s research paper, entitled <em>Follow the Data: Dissecting Data Breaches and Debunking the Myths</em>, analyses data from security breaches between 2005-2015 as logged by PRC. Focusing on leaked data rather than who has been hit by data breaches can yield valuable insights that might otherwise get missed, Trend Micro argues.</p>
<p>&#8220;Much of the attention surrounding these breaches has been focused on who&#8217;s affected and how they can recover,&#8221; a Trend Micro <a target="_blank" href="http://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/follow-the-data">blog post</a> explains. &#8220;The stolen data on the other hand is treated as a lost cause. But there is so much more to learn from studying what was stolen. By following the data, we can get a picture of what attackers are looking for, how they use the data, how much it costs, and where it eventually ends up.&#8221; ®</p>
<p class="wptl btm">
                    <span>Sponsored: </span><br />
                    <a href="http://go.theregister.com/tl/1391/-3629/go-beyond-apm-with-real-time-it-operations-analytics.pdf?td=wptl1391">Go beyond APM with real-time IT operations analytics</a>
                </p>
<p>Article source: TheReg <a href="http://go.theregister.com/feed/www.theregister.co.uk/2015/09/24/health_sector_hack_prognosis/">http://go.theregister.com/feed/www.theregister.co.uk/2015/09/24/health_sector_hack_prognosis/</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/24/bloodthirsty-data-parasites-hungrily-eye-up-healthcare-sector/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Facebook&#8217;s security now sexier, with killer curves</title>
		<link>http://techdiem.com/2015/09/24/facebooks-security-now-sexier-with-killer-curves/</link>
		<comments>http://techdiem.com/2015/09/24/facebooks-security-now-sexier-with-killer-curves/#comments</comments>
		<pubDate>Thu, 24 Sep 2015 10:43:32 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/24/facebooks-security-now-sexier-with-killer-curves/</guid>
		<description><![CDATA[Facebook has boosted its security chops with support for better bang-for-buck email encryption. Menlo Park now supports OpenPGP&#8217;s standard elliptic [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Facebook has boosted its security chops with support for better bang-for-buck email encryption.</p>
<p>Menlo Park now supports OpenPGP&#8217;s standard elliptic curve cryptography public keys meaning security and privacy pundits can post their public keys which will then be used to encrypt email notifications.</p>
<p>It supports NIST curves P-256, P-384, and P-521, and is considering non-NIST curves down the track.</p>
<p>Security software engineers Jon Millican and Steve Weis together with operating systems production bod Phil Dibowitz worked on the initiative.</p>
<p>They say users of the likes of ProtonMail have been calling for encrypted Facebook email support.</p>
<p>&#8220;Elliptic curve cryptography offers high levels of security for relatively smaller key sizes and is being widely adopted in modern cryptographic implementations,&#8221; the geeks <a target="_blank" href="https://www.facebook.com/notes/protect-the-graph/update-facebook-openpgp/1646991155541029?__fnshash=Ac1ZsLt7vv85LG69">say</a> .</p>
<p>&#8220;This new support allows you to post ECC public keys on your profile and have Facebook use them to encrypt email notifications.</p>
<p>&#8220;We&#8217;ve also heard from several organisations that support for Facebook PGP is a popular request from their customers. &#8220;</p>
<p>The team plugs ProtonMail, a zero-knowledge email project born from CERN which supports PGP for Facebook in a way that removes the need for users to juggle Bob and Alice&#8217;s keys through a GUI in its webmail and mobile app.</p>
<p>ProtonMail co-founder Andy Yen says the support of strong open crypto standards by big tech could be an &#8216;unstoppable&#8217; win .</p>
<p>&#8220;If we truly want to have a more private and secure internet, working together will be crucial and we applaud Facebook for sticking with open standards,&#8221; Yen <a target="_blank" href="https://blog.protonmail.ch/protonmail-facebook-pgp/">says</a> .</p>
<p>&#8220;As OpenPGP is universal, in the future, we will also be able to integrate with countless other services.&#8221;</p>
<p>&#8220;We are glad that giants like Facebook are supporting these efforts and if more companies join in, the movement to improve privacy online will be unstoppable.&#8221;</p>
<p>ProtonMail users can jettison the old PGP setup and immediately begin to fire encrypted Facebook comms using their OpenPGP public keys. ®</p>
<p class="wptl btm">
                    <span>Sponsored: </span><br />
                    <a href="http://go.theregister.com/tl/1391/-3629/go-beyond-apm-with-real-time-it-operations-analytics.pdf?td=wptl1391">Go beyond APM with real-time IT operations analytics</a>
                </p>
<p>Article source: TheReg <a href="http://go.theregister.com/feed/www.theregister.co.uk/2015/09/24/facebook_crypto_upped/">http://go.theregister.com/feed/www.theregister.co.uk/2015/09/24/facebook_crypto_upped/</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/24/facebooks-security-now-sexier-with-killer-curves/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>OPM breach included five times more stolen fingerprints</title>
		<link>http://techdiem.com/2015/09/23/opm-breach-included-five-times-more-stolen-fingerprints/</link>
		<comments>http://techdiem.com/2015/09/23/opm-breach-included-five-times-more-stolen-fingerprints/#comments</comments>
		<pubDate>Thu, 24 Sep 2015 04:43:28 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/23/opm-breach-included-five-times-more-stolen-fingerprints/</guid>
		<description><![CDATA[The Office of Personnel Management&#8217;s press secretary, Sam Schumach, announced this morning that the breach of OPM background investigation data [&#8230;]]]></description>
				<content:encoded><![CDATA[<figure class="intro-image image center full-width"><img src="/wp-content/plugins/RSSPoster_PRO/cache/42690_fingerprintcard.jpg" width="632" height="368" /><figcaption class="caption" /></figure>
<p><!-- cache hit 1431:single/related:d25dab4d62ca0c64b7634f836c27beb8 --><!-- empty -->
<p>The Office of Personnel Management&#8217;s press secretary, Sam Schumach, announced this morning that the breach of OPM background investigation data included approximately 5.6 million sets of fingerprints from federal employees, contractors, and other subjects of federal background checks. The new number, tied to the discovery of additional archived data that was stolen over the period of the breach, more than quintuples the amount of individuals whose fingerprint data was stolen. OPM&#8217;s previous estimate stood at 1.1 million. However, the new findings do not increase the overall number of people affected in the background investigation data breach from 21.5 million, Schumach said in <a href="https://www.opm.gov/news/releases/2015/09/cyber-statement-923/">an official statement</a>.</p>
<p>Those fingerprints were collected as part of the OPM&#8217;s background investigations at all levels of sensitivity—ranging from the &#8220;National Agency Check with Written Inquiries&#8221; (NACI) inquiries for federal employees with &#8220;moderate, low risk and non-sensitive positions&#8221; to the full field investigations required for more sensitive positions. Based on leaked statements from the Obama administration, the fingerprint data is now, at a minimum, in the hands of the foreign intelligence services of China. Just how that fingerprint data could be used, however, is not clear.</p>
<p>&#8220;Federal experts believe that, as of now, the ability to misuse fingerprint data is limited,&#8221; Schumach said. &#8220;However, this probability could change over time as technology evolves. Therefore, an interagency working group with expertise in this area—including the FBI, DHS, DOD, and other members of the Intelligence Community—will review the potential ways adversaries could misuse fingerprint data now and in the future&#8230;[and] also seek to develop potential ways to prevent such misuse. If, in the future, new means are developed to misuse the fingerprint data, the government will provide additional information to individuals whose fingerprints may have been stolen in this breach.&#8221;</p>
<p>Article source: ArsSec <a href="http://arstechnica.com/security/2015/09/opm-breach-included-five-times-more-stolen-fingerprints/">http://arstechnica.com/security/2015/09/opm-breach-included-five-times-more-stolen-fingerprints/</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/23/opm-breach-included-five-times-more-stolen-fingerprints/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Security wares like Kaspersky AV can make you more vulnerable to attacks</title>
		<link>http://techdiem.com/2015/09/23/security-wares-like-kaspersky-av-can-make-you-more-vulnerable-to-attacks/</link>
		<comments>http://techdiem.com/2015/09/23/security-wares-like-kaspersky-av-can-make-you-more-vulnerable-to-attacks/#comments</comments>
		<pubDate>Thu, 24 Sep 2015 04:43:27 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/23/security-wares-like-kaspersky-av-can-make-you-more-vulnerable-to-attacks/</guid>
		<description><![CDATA[Antivirus applications and other security software are supposed to make users more secure, but a growing body of research shows [&#8230;]]]></description>
				<content:encoded><![CDATA[<figure class="intro-image image center full-width"><img src="/wp-content/plugins/RSSPoster_PRO/cache/393ee_kaspersky-av-exploit-640x363.png" width="640" height="363" /><figcaption class="caption" /></figure>
<p><!-- cache hit 1431:single/related:2d635058afe131e358f152c6de5033cc --><!-- empty -->
<p>Antivirus applications and other security software are supposed to make users more secure, but a growing body of research shows that in some cases, they can open people to hacks they otherwise wouldn&#8217;t be vulnerable to.</p>
<p>The latest example is antivirus and security software from Kaspersky Lab. Tavis Ormandy, a member of Google&#8217;s Project Zero vulnerability research team, recently analyzed the widely used programs and quickly found a raft of easy-to-exploit bugs that made it possible to remotely execute malicious code on the underlying computers. Kaspersky has already fixed many of the bugs and is in the process of repairing the remaining ones. In a <a href="http://googleprojectzero.blogspot.com/2015/09/kaspersky-mo-unpackers-mo-problems.html">blog post published Tuesday</a>, he said it&#8217;s likely he&#8217;s not the only one to know of such game-over vulnerabilities.</p>
<p>&#8220;We have strong evidence that an active black market trade in antivirus exploits exists,&#8221; he wrote, referring to <a href="https://wikileaks.org/hackingteam/emails/emailid/71862">recent revelations</a> that hacked exploit seller Hacking Team sold weaponized attacks targeting antivirus software from Eset.</p>
<p>He continued: &#8220;Research shows that it’s an easily accessible attack surface that dramatically increases exposure to targeted attacks. For this reason, the vendors of security products have a responsibility to uphold the highest secure development standards possible to minimise the potential for harm caused by their software. Ignoring the question of efficacy, attempting to reduce one’s exposure to opportunistic malware should not result in an increased exposure to targeted attacks.&#8221;</p>
<p>As Ormandy suggested, the bugs he found in Kaspersky products would most likely be exploited in highly targeted attacks, such as those the National Security Agency might carry out against a terrorism suspect or spies pursuing an espionage campaign might carry out against the CEO of a large corporation. That means most people are probably better off running antivirus software than foregoing it, at least if their computers run Windows. Still, the results are concerning because they show that the very software we rely on to keep us safe in many cases makes us more vulnerable.</p>
<p>Kaspersky isn&#8217;t the only security software provider to introduce bugs in their products. Earlier this month, security researcher Kristian Erik Hermansen <a href="https://www.exploit-db.com/exploits/38090/">reported finding four vulnerabilities in the core product marketed by security firm FireEye</a>. One of them made it possible for attackers to retrieve sensitive password data stored on the server running the program. Ormandy has also uncovered serious vulnerabilities in AV software from <a href="https://lock.cmpxchg8b.com/sophailv2.pdf">Sophos</a> and <a href="http://googleprojectzero.blogspot.com/2015/06/analysis-and-exploitation-of-eset.html">Eset</a>.</p>
<p>In a statement, Kaspersky Lab officials wrote, &#8220;We would like to assure all our clients and customers that vulnerabilities publicly disclosed in a blogpost by Google Project Zero researcher, Mr. Tavis Ormandy, have already been fixed in all affected Kaspersky Lab products and solutions. Our specialists have no evidence that these vulnerabilities have been exploited in the wild.&#8221;</p>
<p>
<aside class="pullbox sidebar story-sidebar right">
<h3 class="further-reading"><span>Further Reading</span></h3>
<p><a href="http://arstechnica.com/security/2015/08/how-security-flaws-work-the-buffer-overflow/"><img src="/wp-content/plugins/RSSPoster_PRO/cache/393ee_buffer-overflow-300x100.jpg" /></a><br />
<h2><a href="http://arstechnica.com/security/2015/08/how-security-flaws-work-the-buffer-overflow/">How security flaws work: The buffer overflow</a></h2>
<p>Starting with the 1988 Morris Worm, this flaw has bitten everyone from Linux to Windows.</p>
</aside>
<p>The statement went on to say that Kaspersky Lab developers are making architectural changes to their products that will let them better resist exploit attempts. One change included the implementation of stack buffer overflow protection, which Ormandy referred to as &#8220;/GS&#8221; in his blog post. Other planned changes include the expansion of mitigations such as address space layout randomization and data execution prevention (for much more on these security measures see <a href="http://arstechnica.com/security/2015/08/how-security-flaws-work-the-buffer-overflow/"><em>How security flaws work: The buffer overflow</em></a> by Ars Technology Editor Peter Bright). Ormandy thanked Kaspersky Lab for its &#8220;record breaking response times&#8221; following his report.</p>
<p>Still, the message is clear. To perform, security software must acquire highly privileged access to the computers they protect, and all too often this sensitive position can be abused. Ormandy recommended that AV developers build security sandboxes into their products that isolate downloaded files from core parts of the computer operating system.</p>
<p>&#8220;The <a href="https://www.chromium.org/developers/design-documents/sandbox">chromium sandbox</a> is <a href="https://code.google.com/p/chromium/codesearch#chromium/src/sandbox/win/sq=package:chromium">open source</a> and used in multiple major products,&#8221; he wrote. &#8220;Don&#8217;t wait for the network worm that targets your product, or for targeted attacks against your users, add sandboxing to your development roadmap today.&#8221;</p>
<p>Article source: ArsSec <a href="http://arstechnica.com/security/2015/09/security-wares-like-kaspersky-av-can-make-you-more-vulnerable-to-attacks/">http://arstechnica.com/security/2015/09/security-wares-like-kaspersky-av-can-make-you-more-vulnerable-to-attacks/</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/23/security-wares-like-kaspersky-av-can-make-you-more-vulnerable-to-attacks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Gartner: Global Security Spending Rises Nearly 5% Despite &#8216;Commoditization&#8217;</title>
		<link>http://techdiem.com/2015/09/23/gartner-global-security-spending-rises-nearly-5-despite-commoditization/</link>
		<comments>http://techdiem.com/2015/09/23/gartner-global-security-spending-rises-nearly-5-despite-commoditization/#comments</comments>
		<pubDate>Thu, 24 Sep 2015 04:43:25 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/23/gartner-global-security-spending-rises-nearly-5-despite-commoditization/</guid>
		<description><![CDATA[Security market to hit $75.4 billion in 2015, but endpoint and consumer software segments slowing due to saturation. Security spending [&#8230;]]]></description>
				<content:encoded><![CDATA[<header /><span class="strong black">Security market to hit $75.4 billion in 2015, but endpoint and consumer software segments slowing due to saturation.</span>
<p class="">Security spending remains hot &#8212; to the tune of $75.4 billion worldwide this year &#8212; but signs of a slowdown are showing in certain segments such as endpoint and protection platforms and consumer products, according to new data from Gartner.</p>
<p>The security analyst firm estimates a 4.7% increase in security spending in 2015 over last year, an increase mainly driven by government projects, legislative pressures, and the long shadow of major data breaches around the globe. But Gartner warns that saturation of more mature and established security tools hampering overall growth.</p>
<p>Bigger security budgets are the reality for nearly half of the enterprises recently polled in the <a href="http://reports.informationweek.com/abstract/21/12550/Security/How-Enterprises-Are-Attacking-the-IT-Security-Challenge.html" target="_blank"><em>Dark Reading/InformationWeek</em> 2015 Strategic Security Survey</a>, with security accounting for anywhere from 1% to 10% of annual IT budgets at half of the organizations in the survey.</p>
<p>Gartner research analyst Elizabeth Kim says cloud, mobile computing, the Internet of Things, and advanced targeted attacks are driving security technology demand. Kim says these technologies are driving spending in newer generation products such as endpoint detection and remediation, threat intelligence, and cloud security offerings such as encryption. Even so, these newer product purchases aren&#8217;t enough to provide a sufficient bump to counter the flattening of the more mature and commoditized product sectors.</p>
<p>The firm expects the market to grow at a CAGR of 7.4% through 2019, with the hottest security sectors being testing, outsourcing, and identity access and management.</p>
<p>Meanwhile, the top four security products in most organizations are the same-old, same-old: firewalls (91%), spam filters (88%), antivirus (83%), and VPNs (81%), according to the <em>InformationWeek/Dark Reading</em> survey, with each down a percentage point or two from 2014.</p>
<p>Other findings by Gartner in its <a href="http://www.gartner.com/doc/3126418" target="_blank">&#8220;Forecast Analysis: Information Security, Worldwide, 2Q15 Update&#8221;</a>: </p>
<ul>
<li>Up to 20% increase in security product pricing will quell some purchasing, mainly in Europe due to US dollar appreciation;</li>
<li>Data loss prevention (DLP) product market will drop through 2019 due to commoditization and lower-cost solutions;</li>
<li>Less than 5% of companies with more than 500 employees will buy unified threat management (UTM) products for their satellite offices by 2019 &#8212; it&#8217;s now mainly a small- to midsized business product;</li>
<li>85% of network sandboxing functionality will be woven into network firewall and content security platforms by 2018.</li>
</ul>
<p>&#8220;There&#8217;s been a tremendous DLP adoption wave,&#8221; says Lawrence Pingree, research director and analyst for Gartner, who co-authored the report. &#8220;We&#8217;re seeing greater integration of DLP,&#8221; which accounts for the drop in the dedicated DLP space, he says. &#8220;We will still see DLP playing a role in the future.&#8221; </p>
<p><span class="italic">Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise &#8230; View Full Bio</span></p>
<p>Article source: Dark <a href="http://www.darkreading.com/endpoint/gartner-global-security-spending-rises-nearly-5--despite-commoditization-/d/d-id/1322313?_mc=RSS_DR_EDT">http://www.darkreading.com/endpoint/gartner-global-security-spending-rises-nearly-5--despite-commoditization-/d/d-id/1322313?_mc=RSS_DR_EDT</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/23/gartner-global-security-spending-rises-nearly-5-despite-commoditization/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cloud Security Visibility Gap Dogs Deployments</title>
		<link>http://techdiem.com/2015/09/23/cloud-security-visibility-gap-dogs-deployments/</link>
		<comments>http://techdiem.com/2015/09/23/cloud-security-visibility-gap-dogs-deployments/#comments</comments>
		<pubDate>Thu, 24 Sep 2015 04:43:24 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/23/cloud-security-visibility-gap-dogs-deployments/</guid>
		<description><![CDATA[SANS says visibility is the top cloud security concern. As enterprises increasingly weave a growing number of outside cloud providers [&#8230;]]]></description>
				<content:encoded><![CDATA[<header /><span class="strong black">SANS says visibility is the top cloud security concern.</span>
<p class="">As enterprises increasingly weave a growing number of outside cloud providers into the fabric of today&#8217;s IT infrastructure, visibility into cloud provider operations and security controls reigns as the number one cloud security concern, according to a <a href="https://www.cloudpassage.com/resources/gate/sans-survey-orchestrating-security-in-the-cloud" target="_blank">recent survey conducted by SANS Institute</a> on behalf of Cloud Passage.</p>
<p>In a report released today, SANS analyst David Shackleford says that the opacity of provider infrastructure management remains a huge point of contention among IT professionals, with 58 percent citing it as the biggest problem they have with cloud vendors.</p>
<p>&#8220;Regardless of the model used, the issues are the same: Lack of visibility, steep fees for vendor-provided security and lack of compliance support are respondents’ top three concerns with their public cloud services,&#8221; he writes, explaining that this is a concern whether organizations are using software as a service (SaaS), platform as a service (PaaS), or infrastructure as a service (IaaS) providers.</p>
<p>This nevertheless is doing nothing to dampen cloud adoption—81 percent of respondents say they expect to deploy a SaaS environment within the next year and well over half expect to deploy PaaS and IaaS.  </p>
<p>As organizations seek to square this visibility gap with accelerated deployments, the biggest security challenge they&#8217;ll face is in keeping the auditors at bay. Nearly three-quarters of respondents said that maintaining compliance across public, private and hybrid cloud environments has been a huge challenge related to their cloud model.</p>
<p>As cloud adoption continues to snowball, so does the amount of sensitive data in the cloud. Approximately 48 percent of respondents store or process employee records in the cloud and 40 percent store or process customers&#8217; personal information. And 20 percent of organization also use the cloud to store or process intellectual property, customer financial information, and health records.</p>
<p>All of this sensitive data puts a target squarely on the back of these cloud environments and that worries respondents. Approximately 40 percent say they&#8217;re concerned about unauthorized access to data by other tenants and 38 percent are concerned about shadow IT in the cloud. And circling back to the visibility concern, well over a third of organizations are worried that the public  cloud&#8217;s lack of consistent security controls that integrate with on-premises tools and security management make it difficult to keep tabs on data from end to end.</p>
<p>&#8220;A number of respondents also specifically mentioned the need for greater security automation, whereby security teams have access to tools and scripts that integrate with provider and SecaaS APIs to better secure and monitor their cloud assets,&#8221; Shackleford says. &#8220;Security teams are struggling to get enough visibility into cloud provider infrastructure, controls and processes through contracts and audit reports, and say the nature of organizations’ &#8216;defense in depth&#8217; security stack has to change as well.&#8221;</p>
<p><span class="italic">Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio</span></p>
<p>Article source: Dark <a href="http://www.darkreading.com/risk/cloud-security-visibility-gap-dogs-deployments/d/d-id/1322317?_mc=RSS_DR_EDT">http://www.darkreading.com/risk/cloud-security-visibility-gap-dogs-deployments/d/d-id/1322317?_mc=RSS_DR_EDT</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/23/cloud-security-visibility-gap-dogs-deployments/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Healthcare Organizations Twice As Likely To Experience Data Theft</title>
		<link>http://techdiem.com/2015/09/23/healthcare-organizations-twice-as-likely-to-experience-data-theft/</link>
		<comments>http://techdiem.com/2015/09/23/healthcare-organizations-twice-as-likely-to-experience-data-theft/#comments</comments>
		<pubDate>Thu, 24 Sep 2015 04:43:23 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/23/healthcare-organizations-twice-as-likely-to-experience-data-theft/</guid>
		<description><![CDATA[Bad guys very willing to invest in attacking medical data, but healthcare not very willing to invest in defending it. [&#8230;]]]></description>
				<content:encoded><![CDATA[<header /><span class="strong black">Bad guys very willing to invest in attacking medical data, but healthcare not very willing to invest in defending it. </span>
<p class="">Healthcare institutions are twice as likely to experience data theft than other sectors, and already see 3.4 times more security incidents, according to a study released today by Raytheon and Websense.</p>
<p>Why is healthcare so popular with attackers? Perhaps because the balance sheet tips in their favor. Medical records are very desirable on the black market, because medical records, themselves, may be a treasure trove of PII, financial information, and insurance numbers.</p>
<p>The exact figures vary, but while basic <a href="http://www.darkreading.com/analytics/healthcare-biggest-offender-in-10-years-of-data-breaches/d/d-id/1322292" target="_blank">PII may run for just $1</a> on the black market these days, Jim Trainor of the FBI Cybersecurity Division told CBS News in February that &#8220;PHI records can go from 20 say up to &#8212; we&#8217;ve even seen $60 or $70.&#8221; A new report released by BitSight today references a recent <a href="http://www.npr.org/sections/alltechconsidered/2015/02/13/385901377/the-black-market-for-stolen-health-care-data" target="_blank">report by NPR&#8217;s &#8220;All Things Considered&#8221;</a> which found a &#8220;value pack&#8221; of just 10 Medicare numbers that sold for about $4,700.</p>
<p>Yet, security measures that ensure those records stay confidential can inhibit patient care &#8212; or at least that&#8217;s how it seems to some medical professionals. Nurses and physicians fully understand the importance of data availability, but when patients&#8217; lives are on the line, data confidentiality takes a back seat.</p>
<p>According to the Raytheon Websense report, healthcare professionals &#8220;have an increased tendency to try and get around IT security policy in order to better serve their patients&#8221; and &#8220;up to 75 percent of hospital network traffic goes unmonitored by security solutions out of fear that improperly configured security measures or alarming false positives could dramatically increase the risk to patient health or well-being.&#8221; </p>
<p>&#8220;Outside of stock trading, I can&#8217;t think of another industry where you have to err on the side of openness,&#8221; says Bob Slocum, senior product marketing manager of data and endpoint security for Websense. Further, there is no other industry, he says, where an employee (like a doctor) can routinely trump a security policy.</p>
<p>The end result is that attackers are far more willing to invest in stealing medical records than healthcare institutions are willing to invest in protecting them from being stolen.</p>
<p>As the Raytheon Websense report references, the average healthcare organization only spends about 3 percent of its IT budget on security, even though HIMSS recommends they spend at least 10 percent. Bitsight reports that while healthcare has done a good job closing up those Heartbleed vulnerabilities (only 4.4 percent), it&#8217;s still wide open to FREAK (43.4 %) and POODLE (73.5 %).</p>
<p>Conversely, attackers will bring their best tools to bear. According to Raytheon and Websense, healthcare organizations are four times as likely to be hit with advanced malware &#8212; particularly the CryptoWall ransomware (450% likelier), Dyre Trojan (300% likelier), and stealthy Dropper (376% likelier), which opens backdoors and drops other assorted payloads.</p>
<p>Healthcare is also 14 times as likely to be hit by the Andromeda botnet &#8212; which has a particularly stealthy loader with anti-VM and anti-debug capabilities that can stay silent for months before it communicates with its command and control server, according to Raytheon and Websense.</p>
<p>Slocum says that he expected the numbers to be bad, and but not quite as &#8220;astronomically bad&#8221; as they were.</p>
<p>Plus, while outside attackers barrage them with malware, medical institutions also have malicious insiders to worry about. According to a <a href="http://www.darkreading.com/analytics/healthcare-biggest-offender-in-10-years-of-data-breaches/d/d-id/1322292" target="_blank">report released yesterday by Trend Micro</a>, healthcare has a larger insider leak problem than any other sector, attributing 17.5% of its breaches over the past 10 years to it. Insider leaks were the primary source of identity theft cases (44.2%) and healthcare was hit harder by identity theft than any other sector, accounting for 29.8% of cases.</p>
<p>The Bitsight report has declared healthcare the second-worst industry performer in data security, ahead of only education. According to Trend Micro, more than one-quarter (26.9%) of the data breaches reported in the past 10 years were in the healthcare sector.</p>
<p>And it isn&#8217;t only an American problem; as the Raytheon Websense report cites, the U.K.&#8217;s National Health Services has been fined £1 million for its data security transgressions.</p>
<p>Complexity contributes to the problem. Multiple hospitals, labs, imaging centers, and pharmacies in multiple locations share data and computing resources.</p>
<p>The complexity just increases as the early-adopting industry hooks more medical devices into the Internet of Things. As guests of <a href="http://www.darkreading.com/radio.asp?webinar_id=228" target="_blank">today&#8217;s Dark Reading Radio episode on &#8220;Fixing IoT Security</a>&#8221; remarked, one of the challenges of the IoT is installing software security updates &#8212; something that is infinitely more complicated when the device needing the update resides within a patient&#8217;s body.</p>
<p>Slocum says he takes the issue to heart, being a diabetic himself, but that medical device manufacturers he&#8217;s spoken to have been very proactive about security &#8212; not only by inviting ethical hackers to try to break into their devices, but by securing their other systems extra carefully, knowing that any sort of breach would damage their brand reputation and thus people&#8217;s trust in their devices.</p>
<p>Slocum says there&#8217;s some reason for optimism. He says that IT leaders in healthcare oganizations have been &#8220;beating the drum&#8221; and asking their CEOs for cybersecurity funding for years, to no avail; but since the Anthem breach, the conversation has changed.</p>
<p>&#8220;I believe they&#8217;re going to get more [money] and executive support,&#8221; he says. He recommends that they direct some of these funds to more unified solutions that can manage complex environments and to better end user awareness training.</p>
<p><span class="italic">Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad &#8230; View Full Bio</span></p>
<p>Article source: Dark <a href="http://www.darkreading.com/risk/healthcare-organizations-twice-as-likely-to-experience-data-theft/d/d-id/1322312?_mc=RSS_DR_EDT">http://www.darkreading.com/risk/healthcare-organizations-twice-as-likely-to-experience-data-theft/d/d-id/1322312?_mc=RSS_DR_EDT</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/23/healthcare-organizations-twice-as-likely-to-experience-data-theft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
