{"id":32836,"date":"2017-08-03T10:44:29","date_gmt":"2017-08-03T14:44:29","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/hbo-hack-highlights-importance-of-encryption-data-governance-esecurity-planet.php"},"modified":"2017-08-03T10:44:29","modified_gmt":"2017-08-03T14:44:29","slug":"hbo-hack-highlights-importance-of-encryption-data-governance-esecurity-planet","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/hbo-hack-highlights-importance-of-encryption-data-governance-esecurity-planet.php","title":{"rendered":"HBO Hack Highlights Importance of Encryption, Data Governance &#8211; eSecurity Planet"},"content":{"rendered":"<p><p>ByJeff Goldman, Posted August 2, 2017      <\/p>\n<p>    1.5 TB of data, including unreleased episodes of upcoming    shows, was stolen and leaked online.  <\/p>\n<p>    Hackers recently claimed to have breached HBO's systems and    stolen 1.5 TB of data including upcoming episodes of    Ballers and Room 104, Entertainment    Weekly reports.  <\/p>\n<p>    In response, HBO stated that an incident had \"resulted in the    compromise of proprietary information,\" adding, \"We immediately    began investigating the incident and are working with law    enforcement and outside cyber security firms.\"  <\/p>\n<p>    In an email to employees, HBO chairman and CEO Richard Plepler    wrote, \"I can assure you that senior leadership and our    extraordinary technology team, along with outside experts, are    working round the clock to protect our collective interests.    The efforts across multiple departments have been nothing short    of herculean.\"  <\/p>\n<p>    Protecting Key Data  <\/p>\n<p>    AlertSec CEO Ebba Blitz    told eSecurity Planet by email that the breach should    serve as a clear reminder that hacking isn't limited to    financial, health and personal information.  <\/p>\n<p>    \"All information is vulnerable because some hackers are    motivated by the thrill of it,\" Blitz said. \"They steal because    they can, not because the information always has any real    long-term value. All data needs to be     protected with encryption.\"  <\/p>\n<p>    Gemalto CTO of data    protection Jason Hart said by email that broadcasters in    particular face a unique threat. \"Due to the nature of the    industry, hackers have the opportunity to access data as it is    transmitted between multiple data centers, and so they require    solutions to help encrypt their high value TV transmissions --    without interfering with the audience's viewing experience,\" he    said.  <\/p>\n<p>    \"HBO now joins a list of other Hollywood victims of crime such    as     Netflix and     Sony,\" Hart added. \"This incident is another reminder that    broadcasters must invest in fundamental security controls and    practices -- encryption, key management and     two-factor authentication -- to control access to highly    sought-after content and protect it in the event that a breach    takes place.\"  <\/p>\n<p>    Data Governance  <\/p>\n<p>    Richard Stiennon, chief strategy officer at Blancco Technology Group, said    the HBO breach is a great example of the importance of     data governance. \"Content producers and all the parties    involved in shooting, editing and post-production processing    and distribution should be on high alert,\" he said. \"They    should immediately review their data governance policies and    discover the weak links in protecting their content and shore    up their defenses. An information governance policy should take    into account where critical content resides at all times.\"  <\/p>\n<p>    Still, a recent     Thycotic survey of over 400 global business and security    executives found that four out of five companies don't know    where their sensitive data is located or how to secure it.  <\/p>\n<p>    And while 80 percent of data breaches involve stolen or weak    credentials, 60 percent of companies still don't adequately    protect privileged accounts. Two out of three companies don't    fully measure whether their disaster recovery will work as    planned, and four out of five never measure the success of    security training investments.  <\/p>\n<p>    \"It's really astonishing to ... see just how many people are    failing at measuring the effectiveness of their cyber security    and performance against best practices,\" Thycotic chief    security scientist Joseph Carson said in a     statement.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.esecurityplanet.com\/network-security\/hbo-hack-highlights-importance-of-encryption-data-governance.html\" title=\"HBO Hack Highlights Importance of Encryption, Data Governance - eSecurity Planet\">HBO Hack Highlights Importance of Encryption, Data Governance - eSecurity Planet<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> ByJeff Goldman, Posted August 2, 2017 1.5 TB of data, including unreleased episodes of upcoming shows, was stolen and leaked online. Hackers recently claimed to have breached HBO's systems and stolen 1.5 TB of data including upcoming episodes of Ballers and Room 104, Entertainment Weekly reports. In response, HBO stated that an incident had \"resulted in the compromise of proprietary information,\" adding, \"We immediately began investigating the incident and are working with law enforcement and outside cyber security firms.\" In an email to employees, HBO chairman and CEO Richard Plepler wrote, \"I can assure you that senior leadership and our extraordinary technology team, along with outside experts, are working round the clock to protect our collective interests. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-32836","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32836"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32836"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32836\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}