Welcome to another edition of our Weekly Rewind – where we summarize all our posts from the last week. The top stories this week were 3) “Even Jedi Use Weak Passwords”, 2) “New Gov Threat Indicator Sharing Guidelines Released” and 1) “New Threat Intel Book”. If you missed anything or happened to be offline, we hope you find this summary post useful as a quick reference. A la Schneier … you can also use this rewind post to talk about the security stories in the news that we haven’t covered remote-access.
Even Jedi Use Weak Passwords: I came across this doozy in a book my kid is reading — “Jedi Apprentice: The Dark Rival.” In one scene Jedi Master Qui-Gon Jinn is trying to access a computer of some sort of his former Padawan, Xanatos. Of course the information he is trying to access requires a password and Qui-Gon was able to guess it on his first try — “Crion,” the name of Xanatos’ father. (continued here)
New Threat Intel Book: This forthcoming book, titled Intelligence-Driven Incident Response: Outwitting the Adversary, looks to be an interesting read to add to your wish list for anyone interested in getting into, or furthering their threat intel work. Kudos to Kyle Maxwell (@kylemaxwell) and Scott Roberts (@sroberts) for getting something like this out. Too bad the Cyber Kill Chain guys missed out on doing something like this years ago. (continued here)
New Gov Threat Indicator Sharing Guidelines Released: Fresh off the recent passing of the Cybersecurity (Information Sharing) Act of 2015, DHS and DOJ have issued guidance on the sharing cyber threats information. The first publication describes how non-federal entities should share indicators and countermeasures with federal entities in order to gain the legal protection granted by CISA. The second one addresses how the government should share with non-government entities. Both are pretty short reads weighing in at 21 pages each. (continued here)
Will Sharing Cyberthreat Information Help Defend the US?: The recent government release of information sharing guidelines reminded me of a post @taosecurity did a while back where he takes a stab answering this question. As usual in infosec … “it depends” is the answer. Still, it’s a great read to see how things have evolved over the past year from the original White House proposal to the recently released guidelines. (continued here)
Hope everyone had a wonderful week! Have a great weekend!