The Past, Present and Future of Network Access Control (NAC)
Network Access Control (NAC), ensures proper configuration and security posture on devices trying to access a network. It’s been around for a while, but acquired a bad reputation in its early days. I remember looking at some NAC solutions when they first hit the market, years ago, and they were expensive, clumsy, and more likely to keep out good folks than bad actors. However, that was then, and this is now. Let’s take a look at NAC today. First, I’ll review fundamental technologies and concepts.
Obama Proposes 35% Budget Increase and New CISO to Boost Cybersecurity
2015 was an unprecedented cyber security wake-up call to federal government agencies culminating in the catastrophic and long-undetected breach at the OPM, which compromised over 21 million background check records. The barrage of attacks has since been relentless culminating most recently with a Department of Justice breach which leaked contact information for thousands of FBI and Homeland Security personnel.
How the Feds Can Ensure Data Governance in the Age of the Internet of Everything
With the explosion of IoT sensors and devices, the data available to us is getting bigger and bigger. It’s a particular challenge facing federal agencies, especially in light of NARA’s Capstone compliance initiative, as well as an opportunity.
Anticipating a Breach – What to do Before, During, and After
Cyber breaches against government agencies seen almost an inevitability these days, it’s less of a question of “if”, but “when?”
So what should your agency do when a breach occurs? That’s the topic of a new whitepaper – Anticipating the Breach – from DLT partner, Symantec.
Could ISIS be the Next Big Cyber Threat to OPM?
Just as millions of federal workers and contractors received confirmation that their data had indeed been breached at OPM earlier this year, another threat is lurking.
The OPM’s new cybersecurity adviser, Clifton Triplett, says he expects ISIS may breach the agency’s systems too, reports NextGov.
Preparing for the Worst: Why an Incident Response Plan is just as important as a Prevention Plan
The advantage is firmly in the hands of the attackers right now. The number of easy to use tools available and the speed that new vulnerabilities are incorporated into these tools greatly outpaces the speed that most organizations can stay on top of the threats. No matter how many precautions you have taken, a breach, or incident will occur. Although there are many things you can do to minimize the risk of a breach, you should operate under the assumed breach mentality — you have already been breached, you might just not know it. What are you going to do now?
New 2015 Cloud Security Report Uncovers “Quite a Year”
2015 was a prolific year for cybercrime. In the public sector, OPM was the banner breach (full cost as yet unknown, but the feds are spending $133 million on credit monitoring alone). Meanwhile in the private sector, hacking cost the average American firm $15.4 million per year, with the more costly cybercrime carried out by malicious insiders, DDoS and web-based attacks.
How to Choose a Network Access Control Solution that is Right For Your Network
Traditional IT security has always focused on static, well-controlled IT environments. However, with the advent of BYOD policies and more and more mobile devices connecting to workplace networks, a new, more fluid paradigm has evolved. How does IT make the shift and take charge of these dynamic and very difficult to control environments?
Securing the US Government Federal Cloud
Over the last several years, great efforts have been made to implement the US Federal Government’s “Cloud First” strategic initiative to develop, promote, and streamline the “on ramp process” for Federal agencies to adopt and migrate to cloud architecture through Federal Risk and Authorization Management Program (FedRAMP).
The Cyber Talent Drought
Black hat hackers make more money than white hat hackers. A lot more. The 2015 Symantec Internet Security Threat report states that a hacker can sell a credit card number for about $50 on the black market. If you can steal 100,000 numbers in a few months, you stand to earn about $5 million. This money pales in comparison to what a bad actor can get for a purloined medical record: about $500 per record, according to the same report. Steal 100,000 of those, and you’ll get a whopping $50 mil