Not Just for Fun Anymore: Why Social Media Should Be included in CyberSecurity Measures

The Associated Press Twitter hack might have been the wake-up call that we needed. Social media is a wonderful thing. It’s fast, reaching a large and diverse audience in no time and it provides a platform for interaction between an agency/company/organization/individual and its constituents/customers/patrons/fans. But that speed and distance could prove risky if a tweetRead… Read more »

Profiling a Data Breach – Where Should You Spend Your Cybersecurity Resources?

In the 2014 budget request the White House sent to Congress one of the few areas to not get cut dramatically was cybersecurity. But before we pour resources into protecting our networks from cyberattacks it is important to know from where and from who these attacks are coming. That’s where the annual Verizon 2013 DataRead… Read more »

How Can We Protect Critical Infrastructure When We Can’t Even Prevent Message Board Hacking?

Lately we’ve had some experiences in our area with hacking of construction message boards. At first, I figured it must have been some programmers who figured out how to get into the computer system. But after seeing another report of it today, I searched for “how to hack a highway message board” and found thereRead… Read more »

What’s Lurking Beyond Your Firewall? 11 Types of Cyber Attacks (GAO Report Pt. 2)

In a previous post, “9 Sources of Cyber Threats Highlighted in GAO Report,” Pat Fiorenza discussed Table 1 of GAO’s report Cyber Security: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented, describing the various types of attacks that vulnerable users can fall victim to. In this blog, I willRead… Read more »

9 Sources of Cyber Threats Highlighted in GAO Report

Cyber attacks pose a significant threat to our nation. With the recent release of President Obama’s Executive Order, Improving Critical Infrastructure: Cybersecurity, and a companion policy directive for federal agencies, there has rightfully been an emphasis placed on cyber security. Although both pieces of information are steps in the right direction, they also are anRead… Read more »

Assessing the Nation’s Cybersecurity Strategy – 782% increase in cyber-attacks in 6 yrs.

The Government Accountability Office has looked at the growing number of cybersecurity threats facing our nation. And it’s no small number. The GAO says the increase in cyber attack reported to CERT in the last 6 years has grown by 782%. There were 5,500 incidents in 2006, last year there were 48,000. So what isRead… Read more »

DSB Report on Resilient Military Systems and the Cyber Threat

By Bob Gourley Bottom Line Up Front: After reviewing all available evidence and rigorously weighing threat information, a Task Force of the Defense Science Board (DSB) concludes that: the United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent. How does that makeRead… Read more »

In Review: President Obama’s Cybersecurity Executive Order

President Obama’s long awaited executive order on cyber security was released earlier this month. Along with the Executive Order, Improving Critical Infrastructure: Cybersecurity, the administration also released a companion policy directive for federal agencies. Although both documents are a step in the right direction for security efforts, legislative action by Congress remains essential to combatRead… Read more »

From Regulation to Collaboration – the Next Wave for Cybersecurity?

The President issued the Cybersecurity Executive Order during his State of the Union earlier this month. But some say the Executive Order doesn’t go far enough. “The Executive Order was unprecedented and very wanted, but it is inherently limited in what it can do. The Executive Order can only tell the entities that are partRead… Read more »