• Home
  • About CSA
    • Defense
    • Offense
    • FAQ
  • Learn
    • Getting Started in Cyber Security
    • Weekly Meetings (Zoom)
    • Past Meetings
    • Are you curious?
      Do you like Puzzles?
    • Capture the Flag (CTF)
  • News
  • Events
    • Calendar
    • Meetings
    • Competitions
      • NCL Competition
  • Join CSA
  • Contact
CSA: Cyber Security Association @ BYU-IdahoCSA: Cyber Security Association @ BYU-Idaho
  • Home
  • About CSA
    • Defense
    • Offense
    • FAQ
  • Learn
    • Getting Started in Cyber Security
    • Weekly Meetings (Zoom)
    • Past Meetings
    • Are you curious?
      Do you like Puzzles?
    • Capture the Flag (CTF)
  • News
  • Events
    • Calendar
    • Meetings
    • Competitions
      • NCL Competition
  • Join CSA
  • Contact

Security Opportunity “What’s really changed three years after Equifax breach?”

Security Opportunity “What’s really changed three years after Equifax breach?”

September 14, 2020 Posted by . .

Note from CSA Editor: Good Cyber Security specialists are REALLY needed. According to the article 40% of employers think their staff has failed to adapt. The KEY to a successful cyber security operations is an continual improvement program, which means you should always be learning, testing new things in a lab, and strengthening your defenses. The bigger the company, the more they are a target and the more they need someone like you.

Original Source – SC Magazine: https://www.scmagazine.com/home/security-news/whats-really-changed-three-years-after-equifax-breach/

“40 percent of security leaders in a recent study from Ostermann Research and Immersive Labs said they aren’t confident in their team of responders precisely because they feel security has failed to adapt to today’s threats.”

Are organizations better off today than they were three years ago when a devastating breach at Equifax exposed sensitive customer data and poor security practices in equal measure?

The consensus among experts is that companies still have a ways to go.

“Unfortunately, not much has changed,” said Greg Foss, senior threat researcher from VMware Carbon Black.

 

“Cyber crisis response, sadly, currently lags the threat landscape,” said Max Vetter, chief cyber officer at Immersive Labs. “This is because it is still far too static, stored in a folder..only updated and tested at infrequent intervals.”

Patch Management

Keep on patching. At its core, the attack on Equifax was “opportunistic and the result of a combination of vulnerabilities that often go unnoticed in many organizations that lack proper tooling and processes to prevent common but avoidable exposures such as default credentials and patch management,” said Foss.

Read the full article – here… https://www.scmagazine.com/home/security-news/whats-really-changed-three-years-after-equifax-breach/

Latest Updates

  • Join Us (Spring 2021)! May 18, 2021
  • Apple pays 20 year old white-hat hacker and his team $288,000 for 3 months of work. October 10, 2020
  • Security Opportunity “What’s really changed three years after Equifax breach?” September 14, 2020
  • HELP WANTED ‘We are outnumbered’ September 7, 2020
  • The Big Tesla Hack September 5, 2020

CSA Mission Statement

Our mission is to enhance student learning and professional growth by providing opportunities for students to better prepare themselves academically and professionally. We accomplish this through competitions, learning activities, special guest speakers, student and alumni networking, and providing groups to study for cyber security related certifications.
- CSA Presidency
Join Button

© 2018-2023 · BYU Idaho - Cyber Security Association