STE WILLIAMS

Smut site fingered as ‘source’ of a million US net neutrality comments

Shmoocon An analysis of comments submitted to the United States Federal Communications Commission’s consultation on the future of the nation’s net neutrality rules has shown the whole process of public comments was fatally flawed.

Speaking at the Shmoocon hacking conference in Washington DC, Leah Figueroa, lead data engineer at data analytics biz Gravwell, detailed how analysing net neutrality comments showed massive anomalies.

In particular, Figueroa spotted that over a million messages were sent by commenters using P*rnHub.com email addresses. Given that the super-smut site only has 55 employees, and doesn’t hand out email accounts to netizens, either each staffer sent in 18,000 comments, or people were sending in volumes of rants using faked addresses.

And it’s most likely the latter because the FCC did not verify whether or not someone writing in really owned the email address they provided. The whole thing shows that it was possible for people to spam the regulator with thousands upon thousands of comments, making it look as though there was huge support for or against the network neutrality protections.

Paul Winchell and dummy

Net neutrality comments close: Let the BS begin!

READ MORE

“As of July 2017 P*rnHub had only 55 employees, which means either they sent all out over 18,000 submissions per person or there was something unusual going on,” she said.

Figueroa analysed submissions from over 22 million comments to the FCC and found a lot of odd behavior. Over a thousand came from [email protected] for example, and that address is linked to an Indian GitHub repository.

At the heart of the matter is the fact that the FCC allowed batch submissions of comments on its net neutrality proposals without verifying email addresses. Figueroa said plenty of these looked looked inauthentic. Hundreds of thousands of comments were submitted at exactly midnight on four separate days in July – hardly normal behavior.

The majority of these batch submissions were anti-net neutrality, and if you strip them out only about 17 per cent of the comments actually came from likely-to-be-people logging on to the FCC’s website and filing a personal message.

Even after the batch-submitted comments were removed the pattern of comments still looks suspect. Many appeared to have come from bots and the timing of submissions didn’t always sync with the US times you’d expect. Such submissions were also typically in ALL CAPS, rather than conventional text.

After removal of the oddly-sourced-or-worded comments, the vast majority of the comments submitted directly to the FCC’s website supported net neutrality.

However, in the end it didn’t matter that much, because the Republican members of the FCC decided that comments wouldn’t influence their decision. Commissioner Michael O’Rielly argued that the agency didn’t have to take comments into account when it made its decision on strictly party-political lines.

New York Attorney General Eric Schneiderman has said he is investigating the comments process on the grounds that some of his constituents may have suffered from identity theft. However, the FCC has backtracked on an earlier promise to cooperate and is now stonewalling any investigation.

American democracy – ain’t it great? ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/22/smut_site_fingered_for_fraud_after_a_million_net_neutrality_comments_get_sent/

Smut site fingered as ‘source’ of a million US net neutrality comments

Shmoocon An analysis of comments submitted to the United States Federal Communications Commission’s consultation on the future of the nation’s net neutrality rules has shown the whole process of public comments was fatally flawed.

Speaking at the Shmoocon hacking conference in Washington DC, Leah Figueroa, lead data engineer at data analytics biz Gravwell, detailed how analysing net neutrality comments showed massive anomalies.

In particular, Figueroa spotted that over a million messages were sent by commenters using P*rnHub.com email addresses. Given that the super-smut site only has 55 employees, and doesn’t hand out email accounts to netizens, either each staffer sent in 18,000 comments, or people were sending in volumes of rants using faked addresses.

And it’s most likely the latter because the FCC did not verify whether or not someone writing in really owned the email address they provided. The whole thing shows that it was possible for people to spam the regulator with thousands upon thousands of comments, making it look as though there was huge support for or against the network neutrality protections.

Paul Winchell and dummy

Net neutrality comments close: Let the BS begin!

READ MORE

“As of July 2017 P*rnHub had only 55 employees, which means either they sent all out over 18,000 submissions per person or there was something unusual going on,” she said.

Figueroa analysed submissions from over 22 million comments to the FCC and found a lot of odd behavior. Over a thousand came from [email protected] for example, and that address is linked to an Indian GitHub repository.

At the heart of the matter is the fact that the FCC allowed batch submissions of comments on its net neutrality proposals without verifying email addresses. Figueroa said plenty of these looked looked inauthentic. Hundreds of thousands of comments were submitted at exactly midnight on four separate days in July – hardly normal behavior.

The majority of these batch submissions were anti-net neutrality, and if you strip them out only about 17 per cent of the comments actually came from likely-to-be-people logging on to the FCC’s website and filing a personal message.

Even after the batch-submitted comments were removed the pattern of comments still looks suspect. Many appeared to have come from bots and the timing of submissions didn’t always sync with the US times you’d expect. Such submissions were also typically in ALL CAPS, rather than conventional text.

After removal of the oddly-sourced-or-worded comments, the vast majority of the comments submitted directly to the FCC’s website supported net neutrality.

However, in the end it didn’t matter that much, because the Republican members of the FCC decided that comments wouldn’t influence their decision. Commissioner Michael O’Rielly argued that the agency didn’t have to take comments into account when it made its decision on strictly party-political lines.

New York Attorney General Eric Schneiderman has said he is investigating the comments process on the grounds that some of his constituents may have suffered from identity theft. However, the FCC has backtracked on an earlier promise to cooperate and is now stonewalling any investigation.

American democracy – ain’t it great? ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/22/smut_site_fingered_for_fraud_after_a_million_net_neutrality_comments_get_sent/

Smut site fingered as ‘source’ of a million US net neutrality comments

Shmoocon An analysis of comments submitted to the United States Federal Communications Commission’s consultation on the future of the nation’s net neutrality rules has shown the whole process of public comments was fatally flawed.

Speaking at the Shmoocon hacking conference in Washington DC, Leah Figueroa, lead data engineer at data analytics biz Gravwell, detailed how analysing net neutrality comments showed massive anomalies.

In particular, Figueroa spotted that over a million messages were sent by commenters using P*rnHub.com email addresses. Given that the super-smut site only has 55 employees, and doesn’t hand out email accounts to netizens, either each staffer sent in 18,000 comments, or people were sending in volumes of rants using faked addresses.

And it’s most likely the latter because the FCC did not verify whether or not someone writing in really owned the email address they provided. The whole thing shows that it was possible for people to spam the regulator with thousands upon thousands of comments, making it look as though there was huge support for or against the network neutrality protections.

Paul Winchell and dummy

Net neutrality comments close: Let the BS begin!

READ MORE

“As of July 2017 P*rnHub had only 55 employees, which means either they sent all out over 18,000 submissions per person or there was something unusual going on,” she said.

Figueroa analysed submissions from over 22 million comments to the FCC and found a lot of odd behavior. Over a thousand came from [email protected] for example, and that address is linked to an Indian GitHub repository.

At the heart of the matter is the fact that the FCC allowed batch submissions of comments on its net neutrality proposals without verifying email addresses. Figueroa said plenty of these looked looked inauthentic. Hundreds of thousands of comments were submitted at exactly midnight on four separate days in July – hardly normal behavior.

The majority of these batch submissions were anti-net neutrality, and if you strip them out only about 17 per cent of the comments actually came from likely-to-be-people logging on to the FCC’s website and filing a personal message.

Even after the batch-submitted comments were removed the pattern of comments still looks suspect. Many appeared to have come from bots and the timing of submissions didn’t always sync with the US times you’d expect. Such submissions were also typically in ALL CAPS, rather than conventional text.

After removal of the oddly-sourced-or-worded comments, the vast majority of the comments submitted directly to the FCC’s website supported net neutrality.

However, in the end it didn’t matter that much, because the Republican members of the FCC decided that comments wouldn’t influence their decision. Commissioner Michael O’Rielly argued that the agency didn’t have to take comments into account when it made its decision on strictly party-political lines.

New York Attorney General Eric Schneiderman has said he is investigating the comments process on the grounds that some of his constituents may have suffered from identity theft. However, the FCC has backtracked on an earlier promise to cooperate and is now stonewalling any investigation.

American democracy – ain’t it great? ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/22/smut_site_fingered_for_fraud_after_a_million_net_neutrality_comments_get_sent/

9 Steps to More-Effective Organizational Security

Too often security is seen as a barrier, but it’s the only way to help protect the enterprise from threats. Here are tips on how to strengthen your framework.

Having a robust and well-defined organizational security framework — one that focuses on both information technology and security — is crucial for fulfilling business requirements. Too often security can be viewed as a barrier, but ultimately, it’s the only way to help protect the enterprise from threats and avoid a data compromise.

Here are nine helpful ways to build out your framework:

1. Take a risk-based approach. It’s important to take a risk-based approach, especially with employees. Take time to identify which employees, from the top all the way down, represent the greatest risk if a compromise were to occur. Not every employee is created equal when it comes to risk. Some employees have domain administrative credentials across the whole enterprise. Others are the data custodians of critical information and have a surplus of sensitive trade secrets to maintain. You can make the necessary adjustments later, but determining where the most risk resides should always be one of the first things done in an organization.

2. Provide incentives for good behavior. Another important step, developing a security awareness program, can often feel like an effort in futility. Simply communicating what’s expected of an employee from a security perspective or foisting a campaign on users isn’t always effective. Organizations commonly deploy one-size-fits-all approaches that rarely succeed in altering employee behavior over time. These types of campaigns don’t need to go away — they likely never will — but they should give incentives to participants and reward good behavior. Users shouldn’t get shamed for accidentally clicking on a phishing link. Instead, they should feel like they play a pivotal role in strengthening the organizational control of a company.

3. Incorporate technology. That doesn’t mean it’s not good to take some decision-making work away from employees. If you’re relying on an employee to do the right thing all the time, you’re going to fail eventually. Some see security as a burden on a user, but it doesn’t have to be like that. Technology, the more transparent and seamless the better, can help take the guesswork out of situations. Having a well-balanced security strategy paired with those technologies should be the goal of every enterprise.

4. Stop and think. Employees should learn to adopt a stop-and-think mindset. If an employee receives a phishing email, she should pause and ask herself “Is this something I should be doing?” before clicking through. The routine should become habitual, almost instinctive over time. An employee can be the last link in the security chain, but if that person clicks on something malicious, that chain is broken and has opened up the enterprise to a possible breach.

5. Assign a leader. Depending on the size of a business, it could prove beneficial to assign a security leader to each segment across the organization. The leader can confer with other leaders and collaborate on pressing security issues. Every time users have a question — about a potentially malicious link or any other issue — they should be able to ask someone about it quickly. Without a leader, someone dedicated to answering questions, users could be tempted to click on that link, something that could lead to bad decision-making behavior down the line.

6. Get other departments involved. Organizational security doesn’t need to be confined solely to the IT department. It’s important to leverage resources you have internally. The marketing department can even play a role. One of the main goals across an organization should be to build a security brand within the company. Tapping into the marketing department, a group of individuals that knows how to position itself, what reaches people, and how to measure it, can be enormously helpful.

7. Set up policies. Some of these suggestions may sound esoteric, but at the end of the day, employees still need to answer to something. That’s why policies need to be set up and enacted. If you don’t hold employees accountable for their actions — what sites users can browse to, what they’re allowed to do on their machine, etc. — all of this will be for naught.

8. Refer to published frameworks. When it comes to published IT management frameworks, there are some great guides already on the books. The National Institute of Standards and Technology (NIST) has some guidance. Control Objectives for Information and Related Technologies, or COBIT, an auditing/compliance framework, can also help outline governance and management practices. Not everything may make sense for your company or your organization, but developing your own policies on the fly is never a great idea. Align with industry best practices; after all, they’re considered best practices for a reason.

9. Take your time. There’s no reason to rush. This isn’t something that happens overnight. It can sometimes take years for a company to deploy a successful security awareness campaign. Corporations too often take a tactical approach while rolling out campaigns when they should be more realistic. Take a strategic approach and plan over the course of several years, not months.

Related Content:

 

Tim Bandos, CISSP, CISA, is Senior Director of Cybersecurity at Digital Guardian. He has more than 15 years of experience in cybersecurity, with expertise in internal controls, incident response, and threat intelligence. Prior to joining Digital Guardian in January 2016, Tim … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/9-steps-to-more-effective-organizational-security/a/d-id/1330827?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

9 Steps to More-Effective Organizational Security

Too often security is seen as a barrier, but it’s the only way to help protect the enterprise from threats. Here are tips on how to strengthen your framework.

Having a robust and well-defined organizational security framework — one that focuses on both information technology and security — is crucial for fulfilling business requirements. Too often security can be viewed as a barrier, but ultimately, it’s the only way to help protect the enterprise from threats and avoid a data compromise.

Here are nine helpful ways to build out your framework:

1. Take a risk-based approach. It’s important to take a risk-based approach, especially with employees. Take time to identify which employees, from the top all the way down, represent the greatest risk if a compromise were to occur. Not every employee is created equal when it comes to risk. Some employees have domain administrative credentials across the whole enterprise. Others are the data custodians of critical information and have a surplus of sensitive trade secrets to maintain. You can make the necessary adjustments later, but determining where the most risk resides should always be one of the first things done in an organization.

2. Provide incentives for good behavior. Another important step, developing a security awareness program, can often feel like an effort in futility. Simply communicating what’s expected of an employee from a security perspective or foisting a campaign on users isn’t always effective. Organizations commonly deploy one-size-fits-all approaches that rarely succeed in altering employee behavior over time. These types of campaigns don’t need to go away — they likely never will — but they should give incentives to participants and reward good behavior. Users shouldn’t get shamed for accidentally clicking on a phishing link. Instead, they should feel like they play a pivotal role in strengthening the organizational control of a company.

3. Incorporate technology. That doesn’t mean it’s not good to take some decision-making work away from employees. If you’re relying on an employee to do the right thing all the time, you’re going to fail eventually. Some see security as a burden on a user, but it doesn’t have to be like that. Technology, the more transparent and seamless the better, can help take the guesswork out of situations. Having a well-balanced security strategy paired with those technologies should be the goal of every enterprise.

4. Stop and think. Employees should learn to adopt a stop-and-think mindset. If an employee receives a phishing email, she should pause and ask herself “Is this something I should be doing?” before clicking through. The routine should become habitual, almost instinctive over time. An employee can be the last link in the security chain, but if that person clicks on something malicious, that chain is broken and has opened up the enterprise to a possible breach.

5. Assign a leader. Depending on the size of a business, it could prove beneficial to assign a security leader to each segment across the organization. The leader can confer with other leaders and collaborate on pressing security issues. Every time users have a question — about a potentially malicious link or any other issue — they should be able to ask someone about it quickly. Without a leader, someone dedicated to answering questions, users could be tempted to click on that link, something that could lead to bad decision-making behavior down the line.

6. Get other departments involved. Organizational security doesn’t need to be confined solely to the IT department. It’s important to leverage resources you have internally. The marketing department can even play a role. One of the main goals across an organization should be to build a security brand within the company. Tapping into the marketing department, a group of individuals that knows how to position itself, what reaches people, and how to measure it, can be enormously helpful.

7. Set up policies. Some of these suggestions may sound esoteric, but at the end of the day, employees still need to answer to something. That’s why policies need to be set up and enacted. If you don’t hold employees accountable for their actions — what sites users can browse to, what they’re allowed to do on their machine, etc. — all of this will be for naught.

8. Refer to published frameworks. When it comes to published IT management frameworks, there are some great guides already on the books. The National Institute of Standards and Technology (NIST) has some guidance. Control Objectives for Information and Related Technologies, or COBIT, an auditing/compliance framework, can also help outline governance and management practices. Not everything may make sense for your company or your organization, but developing your own policies on the fly is never a great idea. Align with industry best practices; after all, they’re considered best practices for a reason.

9. Take your time. There’s no reason to rush. This isn’t something that happens overnight. It can sometimes take years for a company to deploy a successful security awareness campaign. Corporations too often take a tactical approach while rolling out campaigns when they should be more realistic. Take a strategic approach and plan over the course of several years, not months.

Related Content:

 

Tim Bandos, CISSP, CISA, is Senior Director of Cybersecurity at Digital Guardian. He has more than 15 years of experience in cybersecurity, with expertise in internal controls, incident response, and threat intelligence. Prior to joining Digital Guardian in January 2016, Tim … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/9-steps-to-more-effective-organizational-security/a/d-id/1330827?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

9 Steps to More-Effective Organizational Security

Too often security is seen as a barrier, but it’s the only way to help protect the enterprise from threats. Here are tips on how to strengthen your framework.

Having a robust and well-defined organizational security framework — one that focuses on both information technology and security — is crucial for fulfilling business requirements. Too often security can be viewed as a barrier, but ultimately, it’s the only way to help protect the enterprise from threats and avoid a data compromise.

Here are nine helpful ways to build out your framework:

1. Take a risk-based approach. It’s important to take a risk-based approach, especially with employees. Take time to identify which employees, from the top all the way down, represent the greatest risk if a compromise were to occur. Not every employee is created equal when it comes to risk. Some employees have domain administrative credentials across the whole enterprise. Others are the data custodians of critical information and have a surplus of sensitive trade secrets to maintain. You can make the necessary adjustments later, but determining where the most risk resides should always be one of the first things done in an organization.

2. Provide incentives for good behavior. Another important step, developing a security awareness program, can often feel like an effort in futility. Simply communicating what’s expected of an employee from a security perspective or foisting a campaign on users isn’t always effective. Organizations commonly deploy one-size-fits-all approaches that rarely succeed in altering employee behavior over time. These types of campaigns don’t need to go away — they likely never will — but they should give incentives to participants and reward good behavior. Users shouldn’t get shamed for accidentally clicking on a phishing link. Instead, they should feel like they play a pivotal role in strengthening the organizational control of a company.

3. Incorporate technology. That doesn’t mean it’s not good to take some decision-making work away from employees. If you’re relying on an employee to do the right thing all the time, you’re going to fail eventually. Some see security as a burden on a user, but it doesn’t have to be like that. Technology, the more transparent and seamless the better, can help take the guesswork out of situations. Having a well-balanced security strategy paired with those technologies should be the goal of every enterprise.

4. Stop and think. Employees should learn to adopt a stop-and-think mindset. If an employee receives a phishing email, she should pause and ask herself “Is this something I should be doing?” before clicking through. The routine should become habitual, almost instinctive over time. An employee can be the last link in the security chain, but if that person clicks on something malicious, that chain is broken and has opened up the enterprise to a possible breach.

5. Assign a leader. Depending on the size of a business, it could prove beneficial to assign a security leader to each segment across the organization. The leader can confer with other leaders and collaborate on pressing security issues. Every time users have a question — about a potentially malicious link or any other issue — they should be able to ask someone about it quickly. Without a leader, someone dedicated to answering questions, users could be tempted to click on that link, something that could lead to bad decision-making behavior down the line.

6. Get other departments involved. Organizational security doesn’t need to be confined solely to the IT department. It’s important to leverage resources you have internally. The marketing department can even play a role. One of the main goals across an organization should be to build a security brand within the company. Tapping into the marketing department, a group of individuals that knows how to position itself, what reaches people, and how to measure it, can be enormously helpful.

7. Set up policies. Some of these suggestions may sound esoteric, but at the end of the day, employees still need to answer to something. That’s why policies need to be set up and enacted. If you don’t hold employees accountable for their actions — what sites users can browse to, what they’re allowed to do on their machine, etc. — all of this will be for naught.

8. Refer to published frameworks. When it comes to published IT management frameworks, there are some great guides already on the books. The National Institute of Standards and Technology (NIST) has some guidance. Control Objectives for Information and Related Technologies, or COBIT, an auditing/compliance framework, can also help outline governance and management practices. Not everything may make sense for your company or your organization, but developing your own policies on the fly is never a great idea. Align with industry best practices; after all, they’re considered best practices for a reason.

9. Take your time. There’s no reason to rush. This isn’t something that happens overnight. It can sometimes take years for a company to deploy a successful security awareness campaign. Corporations too often take a tactical approach while rolling out campaigns when they should be more realistic. Take a strategic approach and plan over the course of several years, not months.

Related Content:

 

Tim Bandos, CISSP, CISA, is Senior Director of Cybersecurity at Digital Guardian. He has more than 15 years of experience in cybersecurity, with expertise in internal controls, incident response, and threat intelligence. Prior to joining Digital Guardian in January 2016, Tim … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/9-steps-to-more-effective-organizational-security/a/d-id/1330827?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

9 Steps to More-Effective Organizational Security

Too often security is seen as a barrier, but it’s the only way to help protect the enterprise from threats. Here are tips on how to strengthen your framework.

Having a robust and well-defined organizational security framework — one that focuses on both information technology and security — is crucial for fulfilling business requirements. Too often security can be viewed as a barrier, but ultimately, it’s the only way to help protect the enterprise from threats and avoid a data compromise.

Here are nine helpful ways to build out your framework:

1. Take a risk-based approach. It’s important to take a risk-based approach, especially with employees. Take time to identify which employees, from the top all the way down, represent the greatest risk if a compromise were to occur. Not every employee is created equal when it comes to risk. Some employees have domain administrative credentials across the whole enterprise. Others are the data custodians of critical information and have a surplus of sensitive trade secrets to maintain. You can make the necessary adjustments later, but determining where the most risk resides should always be one of the first things done in an organization.

2. Provide incentives for good behavior. Another important step, developing a security awareness program, can often feel like an effort in futility. Simply communicating what’s expected of an employee from a security perspective or foisting a campaign on users isn’t always effective. Organizations commonly deploy one-size-fits-all approaches that rarely succeed in altering employee behavior over time. These types of campaigns don’t need to go away — they likely never will — but they should give incentives to participants and reward good behavior. Users shouldn’t get shamed for accidentally clicking on a phishing link. Instead, they should feel like they play a pivotal role in strengthening the organizational control of a company.

3. Incorporate technology. That doesn’t mean it’s not good to take some decision-making work away from employees. If you’re relying on an employee to do the right thing all the time, you’re going to fail eventually. Some see security as a burden on a user, but it doesn’t have to be like that. Technology, the more transparent and seamless the better, can help take the guesswork out of situations. Having a well-balanced security strategy paired with those technologies should be the goal of every enterprise.

4. Stop and think. Employees should learn to adopt a stop-and-think mindset. If an employee receives a phishing email, she should pause and ask herself “Is this something I should be doing?” before clicking through. The routine should become habitual, almost instinctive over time. An employee can be the last link in the security chain, but if that person clicks on something malicious, that chain is broken and has opened up the enterprise to a possible breach.

5. Assign a leader. Depending on the size of a business, it could prove beneficial to assign a security leader to each segment across the organization. The leader can confer with other leaders and collaborate on pressing security issues. Every time users have a question — about a potentially malicious link or any other issue — they should be able to ask someone about it quickly. Without a leader, someone dedicated to answering questions, users could be tempted to click on that link, something that could lead to bad decision-making behavior down the line.

6. Get other departments involved. Organizational security doesn’t need to be confined solely to the IT department. It’s important to leverage resources you have internally. The marketing department can even play a role. One of the main goals across an organization should be to build a security brand within the company. Tapping into the marketing department, a group of individuals that knows how to position itself, what reaches people, and how to measure it, can be enormously helpful.

7. Set up policies. Some of these suggestions may sound esoteric, but at the end of the day, employees still need to answer to something. That’s why policies need to be set up and enacted. If you don’t hold employees accountable for their actions — what sites users can browse to, what they’re allowed to do on their machine, etc. — all of this will be for naught.

8. Refer to published frameworks. When it comes to published IT management frameworks, there are some great guides already on the books. The National Institute of Standards and Technology (NIST) has some guidance. Control Objectives for Information and Related Technologies, or COBIT, an auditing/compliance framework, can also help outline governance and management practices. Not everything may make sense for your company or your organization, but developing your own policies on the fly is never a great idea. Align with industry best practices; after all, they’re considered best practices for a reason.

9. Take your time. There’s no reason to rush. This isn’t something that happens overnight. It can sometimes take years for a company to deploy a successful security awareness campaign. Corporations too often take a tactical approach while rolling out campaigns when they should be more realistic. Take a strategic approach and plan over the course of several years, not months.

Related Content:

 

Tim Bandos, CISSP, CISA, is Senior Director of Cybersecurity at Digital Guardian. He has more than 15 years of experience in cybersecurity, with expertise in internal controls, incident response, and threat intelligence. Prior to joining Digital Guardian in January 2016, Tim … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/9-steps-to-more-effective-organizational-security/a/d-id/1330827?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Facebook Launches ‘Secure the Internet Grants’ Program

The new initiative encourages universities, non-profits, and NGOs to submit applied research proposals for new security defense technologies that can be used in practice.

Facebook today opened its “Secure the Internet Grants” program and issued an invitation for university researchers and faculty, non-profits, and NGOs to submit applied research proposals to be considered.

In his keynote at Black Hat USA 2017, Facebook chief security officer Alex Stamos announced the company would invest up to $1 million in defense research to fight threats people face each day including password reuse, phishing attempts, and other common forms of cybercrime.

Secure the Internet Grants are part of this investment. The goal is to drive development of new security tech that can be applied in practice, rather than purely for research purposes. Applicants can now submit two-page grant proposals on these focus areas: abuse detection and reporting, anti-phishing, post password authentication, privacy preserving technologies, security in emerging markets, and user safety.

The deadline is March 30, 2018 and winners will be announced at Black Hat USA this year.

Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/facebook-launches-secure-the-internet-grants-program/d/d-id/1330865?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Facebook Launches ‘Secure the Internet Grants’ Program

The new initiative encourages universities, non-profits, and NGOs to submit applied research proposals for new security defense technologies that can be used in practice.

Facebook today opened its “Secure the Internet Grants” program and issued an invitation for university researchers and faculty, non-profits, and NGOs to submit applied research proposals to be considered.

In his keynote at Black Hat USA 2017, Facebook chief security officer Alex Stamos announced the company would invest up to $1 million in defense research to fight threats people face each day including password reuse, phishing attempts, and other common forms of cybercrime.

Secure the Internet Grants are part of this investment. The goal is to drive development of new security tech that can be applied in practice, rather than purely for research purposes. Applicants can now submit two-page grant proposals on these focus areas: abuse detection and reporting, anti-phishing, post password authentication, privacy preserving technologies, security in emerging markets, and user safety.

The deadline is March 30, 2018 and winners will be announced at Black Hat USA this year.

Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/facebook-launches-secure-the-internet-grants-program/d/d-id/1330865?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Facebook Launches ‘Secure the Internet Grants’ Program

The new initiative encourages universities, non-profits, and NGOs to submit applied research proposals for new security defense technologies that can be used in practice.

Facebook today opened its “Secure the Internet Grants” program and issued an invitation for university researchers and faculty, non-profits, and NGOs to submit applied research proposals to be considered.

In his keynote at Black Hat USA 2017, Facebook chief security officer Alex Stamos announced the company would invest up to $1 million in defense research to fight threats people face each day including password reuse, phishing attempts, and other common forms of cybercrime.

Secure the Internet Grants are part of this investment. The goal is to drive development of new security tech that can be applied in practice, rather than purely for research purposes. Applicants can now submit two-page grant proposals on these focus areas: abuse detection and reporting, anti-phishing, post password authentication, privacy preserving technologies, security in emerging markets, and user safety.

The deadline is March 30, 2018 and winners will be announced at Black Hat USA this year.

Read more details here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/endpoint/facebook-launches-secure-the-internet-grants-program/d/d-id/1330865?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple