UnixGuy said: Some govermnets mandate that if you get breached you need to disclose it to your customers, this puts a lot of pressure on companies specially in early stage when it's not very clearly what has been breached
paul78 said:@UnixGuy - I recall that you are in Australia. I'm curious about what infosec people think about your new Notifiable Data Breaches law which went into effect this year. This amendment is tied to privacy whereas in the US, disclosure laws are typically tied to data which may result in consumer financial impact - except for the ones in states like California.
jcundiff said: marriott (starwood)was a sql inject according to darkweb chatter going back to 2014, and was wide open in 2014 with ato and loyalty fraud, I am guessing they implemented fraud protections and failed to realize it was a symptom of, not the breach.marriott is going to try to play "the it happened before we bought them' card but it went on for 2 years after they bought them. Sounds to me like Marriott didnt do proper due diligence during their M&A and are going to pay for it now.Senators are rumbling about tougher laws, so this maybe the one that does it, but I doubt it
UnixGuy said: Well it's been alarming. Companies here are all recruiting and trying to build "Cyber" or "Security" Capabilities...everyone wants to be ready to disclose for any breaches. Even international companies with Australian presence have to disclose in case of any breach. PageUp coped it this year, everyone company that used PageUp at some people had to send an email notice, it was chaotic.
..., just a failure of basic security hygiene
jcundiff said: And as far as 3rd party, my assessment from what I have seen is no, just a failure of basic security hygiene
cyberguypr said: just a failure of basic security hygiene jcundiff said: ..., just a failure of basic security hygiene One of the reasons why I am numb to these breaches. Very little is going on here from a technical perspective, if anything. Many times I read a good post-mortem it all comes down to some stupid basic thing someone did like not patching well-known vulns, exposing AWS buckets, publicly exposing ports/services, using default credentials, failing at OWASP top 10 stuff, etc. Rant over.
paul78 said: jcundiff said: And as far as 3rd party, my assessment from what I have seen is no, just a failure of basic security hygiene It'll be interesting to see how this plays out with Starwood. Your comment about darkweb chatter interested me so I just looked. Doesn't look good for Starwood. I'm gonna grab my popcorn and see how that plays out once some of that stuff starts to show up in the media. Not sure if anyone read the Reuter's exclusive yesterday that cited anonymous sources about the ongoing investigation - but this struck me as sadly amusing - "Identifying the culprit is further complicated by the fact that investigators suspect multiple hacking groups may have simultaneously been inside Starwood’s computer networks since 2014, said one of the sources."