Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Author

 Ted Kobus & Pamela Jones Harbour
Twitter
LinkedIn
RSS
E-Mail

Profile of Ted Kobus & Pamela Jones Harbour

BakerHostetler
News & Commentary Posts: 1

Ted Kobus focuses his practice in the areas of privacy, data security, and intellectual property. He advises clients, trade groups, and organizations regarding data security and privacy risks, including compliance, developing breach response strategies, defense of regulatory actions, and defense of class action litigation. He counsels clients involved in breaches involving domestic and international laws, as well as other regulations and requirements. Having led more than 500 data breach responses, he has respected relationships with regulators involved in privacy concerns as well as deep experience helping clients confront privacy issues during the compliance risk management stages. He is invested in his client relationships and approaches engagements practically and thoughtfully. Ted is national co-leader of BakerHostelter's Privacy and Data Protection team. He is ranked in "Chambers USA: America's Leading Lawyers for Business" and was one of only three attorneys named an MVP by Law360 for Privacy & Consumer Protection in 2013. He is a regular contributor to BakerHostetler's Data Privacy Monitor blog and regularly speaks at major industry events regarding data breach response, risk management, and litigation issues affecting privacy, including being the only private attorney to speak at the National Association of Attorneys General on data security issues.

 

Pamela Jones Harbour serves as co-leader of BakerHostetler's national Privacy and Data Protection team, with a practice focusing on the areas of privacy, data protection, and antitrust law. She is recognized for her knowledge in the evolving areas of competition and consumer protection law as they relate to privacy and data security issues. She served as a Federal Trade Commissioner for almost seven years and spent a decade with the New York State Attorney General's Office. Pamela was the 2010 recipient of the Electronic Privacy Information Center's "Champion of Freedom Award" for her defense of consumer privacy as an FTC Commissioner. While at the FTC, she was frequently a leading or solo dissenter in situations where she advocated to vigorously uphold the letter and spirit of the nation's antitrust and consumer protection laws.

Articles by Ted Kobus & Pamela Jones Harbour
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13453
PUBLISHED: 2019-07-17
Zipios before 0.1.7 does not properly handle certain malformed zip archives and can go into an infinite loop, causing a denial of service. This is related to zipheadio.h:readUint32() and zipfile.cpp:Zipfile::Zipfile().
CVE-2019-4211
PUBLISHED: 2019-07-17
IBM QRadar SIEM 7.2 and 7.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 159131.
CVE-2019-4430
PUBLISHED: 2019-07-17
IBM Maximo Asset Management 7.6 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 162887.
CVE-2018-1921
PUBLISHED: 2019-07-17
IBM Campaign 9.1.0, 9.1.2, 10.1, and 11.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 152857.
CVE-2018-2021
PUBLISHED: 2019-07-17
IBM QRadar SIEM 7.2 and 7.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 155345.