Cybersecurity

Chain Links

Protecting and connecting Here are a few recent links of note on cybersecurity and disruptive technology: The Cyber Power Index by Booze Allen Hamilton. The G20 are ranked by their potency in cyber, determined by their legal and regulatory framework, economic and social context, technology infrastructure, and industry application. The United States is ranked secondRead… Read more »

Daily Dose: Justice Dept. Website Goes Down with Megaupload

After Megaupload was shut down this Thursday by Federal Authorities, anonymous hackers in turn attacked the Justice Department’s website. This is the second time in the past six months that a government website has been under significant attack. Initially officials claimed they were unaware of the attack, but by Thursday night it became clear thatRead… Read more »

2011 in Cybersecurity

2011 was a watershed year for cybersecurity, but it was evolutionary rather than revolutionary. Political hacking, industrial skullduggery, drones gone wild, and mobile malware all made 2011 a year, to borrow CrucialPoint amigo Matt Devost‘s phrase (since I’m already borrowing his image for the post graphic, why not?), to live cyberdangerously. The Rise of theRead… Read more »

Invincea Continues to Gain Momenturm

We’ve already covered how odds are your software applications aren’t secure. Threats and attack vectors seem to expand faster than solutions, and many solutions are employed sub-optimally due to poor updating, patching, and information management. And conventional tools can’t protect users against targeted attacks like spear phishing, which rely on flaws in judgement rather thanRead… Read more »

Only 18% of Software Apps Pass Security Tests

Over the past 18 months, almost 10,000 software applications from the government and private sector were submitted to Veracode’s online security testing platform for independent security auditing and 8 out of 10 failed to achieve an acceptable level of security on their first try. Veracode reached this conclusion by automatically checking submitted apps for overRead… Read more »

Mitigating Risk in the Use of Social Media

Most government employyees and agencies protect their computers by installing and updating reliable anti-virus software. Managers, IT staff and front-line workers understand the threats posed by malicious software, and they know that they have to take steps to counter that threat. But as more agencies take advantage of social media, new risks emerge that mayRead… Read more »

Are you a Gov IT Professional? Check out GovDefenders.com

Gov.Defenders.com just launched as a go-to resource for any government IT professional involved in cybserSecurity. It’s main feature is an on-line assessment of cybersecurity skills to determine whether you are a beginner, intermediate, or advanced, and it also has a broad variety of resources, ranging from “Cybersecurity for Dummies” to detailed technical papers on everyRead… Read more »

Preparing for the Fight

Originally posted on Govwin.com By Prem Iyer, Director of Information Security at Iron Bow Technologies Despite a reported reduction in the number of cyber attacks, major brands and government agencies across the globe have been the targets of increasingly sophisticated cyber attacks. A notorious hacker group, LulzSec, has recently infiltrated government Web sites belonging toRead… Read more »

Cybersecurity Has Become A Multi-Front War

Reports surfaced from Reuters last week that an old cyber menace, the agent.btz work, is still bedeviling Defense Department networks. The worm, which first appeared in 2008, is resilient, and it appears to create open doors on machines for surreptitious downloading of other types of malware, such as keyloggers. Couple the worm attack with otherRead… Read more »

I Haven’t Trusted My Toaster for 15 Years

Our Nation’s Greatest Strategic Thinkers Are Published at NDU Fifteen years ago three national security strategists published a paper which would resonate with a new crop of cyber practitioners in the Department of Defense, Intelligence and Law Enforcement Communities titled “Information Terrorism: Can You Trust Your Toaster?” This paper, by Matt Devost, Brian Houghton andRead… Read more »