New Data Sheds Light on What Can be Learned from Attacks Against Cloud Environments

2014 was a banner year for high-profile security breaches. The Sony hack, big box store data breaches, and the rumblings of problems at the federal government’s Office of Personnel Management all contributed to a problematic year for IT, business and government leaders.

Many of these breaches stemmed from inadequately protected on-premise systems, but what’s been going on with cloud security? For answers look no further than DLT partner, Alert Logic’s newly released 2015 Cloud Security Report.

How to “Contain” the Threat that’s Holding Back Government BYOD Programs

Bring Your Own Device (BYOD) programs are popping up across corporate America. Yet many in the U.S. government still eye this cost-saving strategy (less infrastructure = reduced IT footprint) with caution.

Security and liability are among the top concerns that are stalling widespread adoption with many government officials finding BYOD programs to be “more trouble than they’re worth” (Forrester).

FISMA Audit: Feds Still Extremely Vulnerable to Cyber Attack

A new report from the Government Accountability Office (GAO) released on September 29 highlights the challenges that 24 federal agencies still face when it comes to applying information security policies and practices, despite throwing billions of dollars at the problem.

"Federal agencies' information and systems remain at a high risk of unauthorized access, use, disclosure modification and disruption," Gregory Wilshusen, information security issues director at GAO, says in the report.

How the Ashley Madison Attack Impacted Government Agencies

The Ashley Madison attack has received a lot of attention in the past few months since the attack on the private Canadian firm, Avid Life Media who owns the affair website. So why is it of interest to federal agencies? A lot of email addresses revealed in the database were government email addresses and military email addresses. Although it doesn’t look good, just because these names and email addresses were released, doesn’t prove they were having an affair. Although there are reportedly a lot of .mil and .gov addresses that created accounts, it’s hard to say who was using it.

Feds Still Behind the Curve in BYOD – Security the #1 Concern

The growth of BYOD programs is exploding in the private sector. Indeed Gartner expects half of all companies to establish mandatory BYOD policies by 2017. After all, the economics make sense, according to Cisco, the predicted savings per employee amounts to a staggering $3,150.

So how is the federal government responding to the BYOD boom? Not well according to all reports.

4 Things DoD Has Learned from the OPM Data Breach

In the few months since the data breach at OPM was announced, IT leaders and agencies have been assessing and scrambling to manage the fall-out (with some even finding positives in the wake of the breach).

So where has all this introspection got us? This month, a discussion brought together military leaders to share some of the lessons learned at the DoD.

Writing for Federal Computer Week, Zach Noble, summarized some of the key takeaways:

How Agencies can Respond to Future Cyber Attacks with Incident Response

Data breaches. Not a day seems to pass by without concerns about new vulnerabilities, a successful hack, or a scramble to respond.

Without an incident response plan, the impact can be catastrophic as we’ve seen at OPM, IRS, and the list goes on. It makes the difference between a hacker simply getting in the front door without fruitful results and one that sneaks in, lays low for months and compromises or steals vast amounts of sensitive data. It also creates a huge PR headache and compromises employee trust.

Symantec Now Protecting More Than One Billion IoT Devices

The Internet of Things (IoT) just got a lot more secure. DLT partner, Symantec, announced in late August that it is securing more than one billion IoT devices – including everything from ATMs to vehicles to critical infrastructure.

The number of IoT devices is expected to reach 25 billion by 2020, and from a security perspective remain particularly vulnerable to attacks because of their always-on nature.