Here are the top cyber news and stories of the day.
- hōrd iPhone app aims to revolutionize contract visibility – “ hōrd gives users access to real-time contract activity, including the ability to follow new listings by agency, specific contracting officers and private-sector contract history and activity.” This data comes from FedBizOpps and USAspending.gov. This iwll allow iOS users to keep up to date on contracting opportunities. Via FedScoop, more here.
- IRS IT programs’ cost and schedule metrics unreliable, says GAO – “Metrics used by the Internal Revenue Service to ensure information technology programs meet cost and schedule estimates aren’t consistent, says an April 17 Government Accountability Office report (.pdf).” IRS had claimed that 60% of their programs were within 10% of their cost and time estimates, but that claim has been disproved. Via FierceGovernmentIT, more here.
- Insider Threats And Employee-Owned Devices Identified as the Greatest Risks In The State of Network Security 2013 Survey – “AlgoSec, the market leader for Network Security Policy Management, today announced the results of “The State of Network Security 2013: Attitudes and Opinions,” a survey of 179 information security and network operations professionals conducted during the RSA Conference in February 2013. Results from the survey reveal insider threats are the greatest concern and that permitting employees to connect their own devices to the network increases the risk of security breaches. Additionally, according to the survey findings, next-generation firewall adoption is on the rise, and poor change management processes are a major operations challenge, often resulting in network and application outages.” Via Dark Reading, more here.
- IT supply-chain security standard aims to prevent counterfeits, tampering – “the Open Group has published a technical security standard aimed at supply-chain safety.” This group hopes to offer an accreditation process for technology suppliers by the end of 2013. “It seeks to lay out best practices in design, sourcing, building, fulfillment and other facets of supply chain distribution, including for integrators.” Via NetworkWorld, more here.
- DHS’ focus in FY 2014: Cybersecurity and critical infrastructure – “The Department of Homeland Security will prioritize critical-infrastructure strength and resilience in the new fiscal year, Secretary Janet Napolitano told lawmakers on Capitol Hill when testifying on President Barack Obama’s FY 2014 budget request.” Napolitano outlined five overall budget priorities, which includes substantial partnerships with other agencies. Via FedScoop, more here.
- Complex Environment Increases Demand for Intel, Official Says
– ‘”The global security environment … presents increasingly complex challenges and a growing list of threats and adversaries,” Army Lt. Gen. Michael T. Flynn told the committee. “Demands on the United States intelligence system have skyrocketed in recent years, and these demands are only expected to increase.”‘ Via Defense.gov, more here.
Researchers find malware targeting online stock trading software – “Security researchers from Russian cybercrime investigations company Groub-IB have recently identified a new piece of malware designed to steal login credentials from specialized software used to trade stocks and other securities online.” This software targets various software on the Moscow Exchange (MICEX). This might be the first of numerous exchange atacks, because almost all trading is now done electronically. Via ComputerWorld, more here.
- Google Rolls Out Enterprise Improvements for Chrome – “Looking to make up lost market share in the browser arena, Google this week is polishing its Chrome with some new features meant to attract more business users. The features will make it easier to switch seamlessly between browser versions and customize their use of Chrome using cloud -based management .” While the enterprise browser market is dominated by Microsoft Internet Explorer, Google’s Chrome is hoping to get in the game. Via CIO Today, more here.
Leave a Reply
You must be logged in to post a comment.