The Latest Endpoint Security From Ziften May Have Prevented Ashley Madison Breach – Chuck Leaver

Written By Michael Vaughn And Presented By Chuck Leaver Ziften CEO


Life is Too Short to Not Execute Endpoint Security.


Ashley Madison’s tagline is “Life is short. Have an affair.” It appears security falls very short at the company, however, as millions of consumer records were blasted out for the whole world to see in a current breach. Publicly, there are only theories as to who exactly infiltrated the outrageous operation. It could have been an insider. Other possibilities, for example the notorious hacking group Impact Team, are declaring success over the red-lettered business. However exactly what is apparent is the publicly-published list of thirty two million user identities. Furthermore, CEO Noel Biderman lost his position, and the company is dealing with an insurmountable number of law suits.

It has actually been found that bots were communicating with users, and the number of users included only a small number of women. In a farcical style, the website still mentions it was a winner of a “Trusted Security Award” and offers total discretion for its users. Their claim of “Over 42,705,000 confidential members!” on the homepage is as disgraceful as the service itself. The taken list of users is so easily accessible that 3rd parties have actually currently produced interactive sites with the names and addresses of the exposed cheaters. Per Ashley Madison’s media page, they “right away implemented an extensive investigation using the top forensics specialists and other security professionals to identify the origin, nature, and impact of this occurrence.” If Ashley Madison had been more proactive in their techniques of endpoint security, they might have potentially been notified of the breach and stopped it before data might have been taken.

Advanced endpoint security and forensic applications – for example those offered by Ziften – could have possibly saved this organization from the embarrassment it has actually had to deal with. Not only could Ziften have informed security personnel of the suspect network events in the dead of night of an attack, but it might have prevented a range of actions on the database from being carried out, all while letting their security group sleep a little easier. Life is too short to let security problems keep you awake at night.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title="" rel=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>