6 Clues Left by Hackers that Can Help Agencies Defend Against Attacks
In the wake of the recent announcement of a massive data breach at the federal government’s Office of Personnel Management (OPM), blame was quickly laid at the door of state-sponsored Chinese hackers (although U.S. officials fell short of an all-out accusation).
While China denies any involvement, cybersecurity analysts suggest that the breach carried all the hallmarks of a state-sponsored attack, such as evidence of highly organized teams that focus on the same targets, often for years, and outside of regular hours.
10 Ways Government Agencies Can Get Ahead of Cyber Attackers, and Stay There
Earlier this spring, Symantec released its 2015 Internet Security Threat Report and as you can imagine the findings were pretty scary (if you don’t want to download the entire report, you can read the summary here).
How The IRS Data Breach Occurred
The IRS breach was exceedingly low-tech: it’s at the other end of the spectrum from the infamous and sophisticated Chinese hacking operations. This was just a bunch of bad actors who stole – or bought on the black market – personally identifiable information (PII) on a large number of American taxpayers. They accessed the IRS “Get Transcript” application, and provided answers (or educated guesses) in response to personal questions about their victims. This allowed them to access tax returns and other filings, facilitating lucrative identity thefts in the future.
The 6 Elements of a Government Insider Threat Program
Insider threats are a persistent problem for government agencies and it’s no longer an IT problem. According to DailyCaller.com, 21% of breaches can be traced back to security indiscretions by federal workers (although other source point to the number being as high as 50%).
So it’s no surprise that preventing and mitigating these threats was a hot topic at this year’s Symantec Government Symposium in Washington, D.C.
Solving the Identity Problem - Gov Experts Share Pearls of Wisdom
Why is identity such a complex problem to solve? That was the first question posed by moderator Nico Popp, Vice President of Information and Identity Protection with Symantec during a panel session on identity overload at the 2015 Symantec Government Symposium in Washington, D.C.
To better understand the identity problem, Popp suggests we think of identity as a triangle.
First, there is security.
How to Get CDM Right – Gov Leaders Offer Valuable Insights
As agencies get ready to roll out the DHS’ Continuous Diagnostics and Mitigation (CDM) Program, feedback from early implementations got audiences excited and reassured at the 2015 Symantec Government Symposium in Washington, D.C.
Ready for the Cloud? Get an Introduction to FedRAMP
The White House Clears the Way for Sanctions Against Hackers
When it comes to cybersecurity, once again The White House means business.
Piece Together the Government Tech Puzzle – 5 Online Trainings
Where can you learn about the latest tech trends in government, network with thousands of federal, state and local govies and earn up to 5 continuing professional education (CPE) credits?!?
Answer: Your desk!
DLT is proud to sponsor the fourth annual GovLoop Government Innovators Virtual Summit taking place on April 22nd from 10 AM – 5 PM ET.
Fed IT Security Hardens, but User Authentication Remains Weak
On February 27, FISMA presented its annual report to Congress. The report (compiled by the OMB) provides metrics on federal cybersecurity incidents, efforts to mitigate them, and progress in implementing cybersecurity policies and programs.
The good news is that there is progress to report, with nearly 70,000 information security issues reported in FY’ 2014, up 15% over the previous year – there is still work to be done.