Category Archives: Compliance

Startup To Launch New Brand Of SaaS For Post-Incident Response

This looks like a very handy new service:

A startup that will officially come out of stealth mode on Wednesday has built a software-as-a-service offering for organizations to handle the mostly manual processes involved in responding to a data loss breach.

The firm’s new SaaS offering encompasses event preparedness; data event analysis; liability assessment; and incident response workflow.

The only problem I see is their pricing scheme: 90-day free trial, then $450 per month and the customer selects a plan based on how many data loss incidents they expect each year.

How many companies can accurately (or honestly) predict an annual DLI rate?  I suppose if they are able to track how many they experience, they could trend and estimate.

But in that situation, I’d say they have pretty severe data control problems.

via Startup To Launch New Brand Of SaaS For Post-Incident Response – Dark Reading.

Summer Time Fraud » client k

client k weighs in on the benefits of job rotation and mandatory vacation to detect fraudulent employee activity:

“The profile of a typical fraudster
is a long serving, trusted employee,
who works long hours and
is reluctant to take their annual leave.
Without doubt,
one of the most simple and cost-effective
anti-fraud measures
is to ensure employees take
at least two consecutive weeks holiday.”

via Summer Time Fraud » client k.

Workarounds Issued For ‘Apache Killer’ Attack

“By sending specially crafted HTTP requests which include malformed range HTTP header, an attacker can disrupt the normal function of the web server, thus disallowing legitimate users to receive responses from the web server,” the team’s advisory says. “This issue affects all Apache software versions and a patch has not been released yet.”

You can bet this’ll appear on your next external PCI scan.

via Workarounds Issued For ‘Apache Killer’ Attack – Dark Reading.

Common vulnerabilities expose Sara Palin, Bill O’Reilly’s Paying Fans

So again: Palin’s AOL account was hacked because it used publicly-known answers for password-retrieval questions, a common/known exploit exposed users on O’Reilly’s site, and password-reuse by users exposed their other personal accounts.

On September 19, 2008, hackers from the Anonymous collective attacked the website of Fox News host Bill O’Reilly. The hackers found and immediately posted e-mail addresses, passwords, and physical addresses of 205 O’Reilly site members paying $5 a month to hear Bill’s wisdom. The next day, a distributed denial of service (DDoS) attack hit the site with 5,000 packets per second. That night, another attack flooded two O’Reilly servers with 1.5GB/s of data.


The attack itself wasn’t particularly clever, but it was effective.’s administrative interface was protected by a servlet that locked down access to all back-end material, but the site administrator made one small mistake: he once created a “New premium member report” showing a list of the most recent subscribers, and he created it in such a way that it bypassed the servlet. As later FBI interview notes show, this was “just an error”—but it made the new member report available outside the secure admin structure to someone who knew the location.


The attackers took the name at the top of the list, an account registered only one hour before, and used it to log into the O’Reilly site as a check of the data’s accuracy. The information was then posted to Wikileaks and discussed on 4chan. Three O’Reilly members who had used the same password on multiple other sites experienced additional fraudulent use of that information.

The article doesn’t differentiate whether the portion of Bill’s site that was hacked contained cardholder data, so I don’t know if this will be considered a breach meriting PCI DSS penalties.  But it’d be quite embarrassing for Bill if his site now has to post the  “We’ve been hacked!” banner.

via Exclusive: How the FBI investigates the hacktivities of Anonymous.

Pwnie Express :: Wired, wireless, and 3G pentesting dropboxes


I have a confession to make: I don’t have a Smartphone.  I think about getting one on occasion, but the reality is, I’m nearly always near a PC, either at home or at work, and can easily look up anything I want to look up, so the cost/benefit has never passed analysis.

But now, I just might have to get one of these:

Pwnie Express :: Wired, wireless, and 3G pentesting dropboxes.

AntiSec’s Dump Of Law Enforcement Data Includes Personal Data Of Thousands

Chaos-hackers grab what they can and throw it on the wall like a big bowl of spaghetti.  How do you stop it?

Feinman recommends that organizations take an inventory of the sensitive data they have and get rid of any data they don’t need. “We’re seeing more customers using our ‘shredder’ feature now,” he says. “If you aren’t going to use it, there’s no reason to keep it around.”

The best way to secure data is to purge what you don’t absolutely need.  It’s true for PCI DSS, and it’s true for everything else.

via AntiSec’s Dump Of Law Enforcement Data Includes Personal Data Of Thousands – Dark Reading.

Email security for Google Apps: Objectionable Content and Content Compliance features now available

Excellent – this could be quite valuable in certain organizations.

Objectionable Content and Content Compliance email security settings are now available directly in the Google Apps Control Panel. These new settings will allow admins to filter messages based on word lists or predefined sets of words, phrases, text patterns, or numerical patterns.

via Google Apps update alerts: Email security for Google Apps: Objectionable Content and Content Compliance features now available.

AWS cloud computing compliance paper details customer responsibilities

Something you should read if you store data with Amazon, or even if you don’t, because:

“They basically are telling you compliance is all up to you regardless of the regulation,” said Joe Granneman, an information security professional with experience in the heavily regulated industries of health care and financial services. “This makes a lot of sense because there is no good way for Amazon to guarantee compliance when it only provides the infrastructure. The customer connects the infrastructure together and builds on top of it, which Amazon cannot guarantee. This document drives home the fact that compliance is still up to the customer and not the IaaS provider.”

via AWS cloud computing compliance paper details customer responsibilities, and Amazon Web Services: Risk and Compliance.