How Malware and Spam Groups Exploited the U.S. Election
Cybersecurity, or lack thereof, was a hallmark of the 2016 election season. With Clinton’s campaign chairman, John Podesta, being chief among the targets of cyber attackers. In March of this year, Podesta fell victim to the oldest trick in the book – phishing – which led to the subsequent hacking and Wikileaks-led disclosure of hundreds of thousands of emails.
Government File Sharing: 5 Steps to Reduce Data Leakage Risks
Data dissemination and file sharing between agencies and law enforcement authorities is a natural part of government business. But what happens when those files leave the security of domain-controlled network drives and content management systems?
10 Ways to Secure Big Data at Rest and In-Transit
Cloud computing has made collecting, storing, and processing data easier and cheaper than ever. Agencies are increasingly leveraging big data to drive actionable insights and improve cyber threat detection. Furthermore, more than 60% of agencies are using big data to reduce costs and operating expenses, writes Information Week.
Layered Security Strategies for the Health Sector: An ICIT Briefing
Our very own Chief Cybersecurity Technologist and Institute for Critical Infrastructure Technology (ICIT) fellow, Don Maclean, recently joined fellow fellows Robert Lord (Protenus), John Menkahart (Securonix), Dr. Ron Ross (NIST) and ICIT co-founder and senior fellow, Parham Eftekhari on Capitol Hill to discuss the risks and threats associated with cyber attacks on healthcare facilities.
4 Essential Components to Blocking Cyber Attacks
Nothing seems to surprise us anymore when it comes to cybersecurity. Attacks against government agencies and businesses are constantly in the headlines. Just last year, DLT partner, Symantec, discovered more than 430 million new unique pieces of malware across its Global Intelligence Network – that’s an increase of 35% over the previous year.
Big Data Analytics Can Thwart Cyber Threats – But Feds are Struggling
We all know that sifting through data is an overwhelming challenge for federal agencies. Various data types, stored across a range of disparate siloes, and a lack of resources to analyze the sheer amount of data, has long held up data analytics in government.
5 Cybersecurity Threat Trends to be Aware of in 2016
Last year, we reviewed threat reports from numerous companies and organizations. At the time, a couple of simple themes emerged: too many systems were unpatched, and phishing was a predominant means of intrusion. These themes are still present a year later, but some new trends have arisen to keep them company.
Symantec Government Symposium 2016: Let’s Fight Back with Actionable Intelligence
Last year, over 420 million malware variants were discovered, over half a billion personal information records were lost to breaches and one zero-day vulnerability was discovered each week.
It’s time to fight back!
Close the Gap between Threat Detection and Response with User and Entity Behavior Analytics
Could user and entity behavior analytics (UEBA) be the missing piece of the puzzle that security teams have been waiting for in their bid to outmaneuver threat actors?
6 Best Practices for Moving Beyond a Reactive, Point-Product Security Infrastructure
- Read more about 6 Best Practices for Moving Beyond a Reactive, Point-Product Security Infrastructure
Incident response (IR) teams are overwhelmed. Larger attack surfaces, state-sponsored cyber terrorism, and the industrialization of cyber crime all create fires and headaches for IR teams.