No More F.U.D. (Fear, Uncertainty, Doubt) about Cyber Threats
I’m fed up. Better yet, I’m “F.U.D.-ed” up. In every cybersecurity conference, in every threat report, in every blog and every bit of cybersecurity marketing literature I see one tiresome theme: “The bad guys are after us! It’s getting worse every day! How will we fix it? Can we fix it? There’s no magic bullet! The cyber sky is falling, run for your cyber life!” In other words, an unrelenting stream of– Fear, Uncertainty, and Doubt.
The White House Clears the Way for Sanctions Against Hackers
When it comes to cybersecurity, once again The White House means business.
Fed IT Security Hardens, but User Authentication Remains Weak
On February 27, FISMA presented its annual report to Congress. The report (compiled by the OMB) provides metrics on federal cybersecurity incidents, efforts to mitigate them, and progress in implementing cybersecurity policies and programs.
The good news is that there is progress to report, with nearly 70,000 information security issues reported in FY’ 2014, up 15% over the previous year – there is still work to be done.
As DoD Eyes Internet of Things for New Uses Cases, Security Concerns Remain
The “Internet of Things” isn’t exactly a new concept, Kevin Ashton coined the term the Internet of Things as far back as 1999. Now, 15 years later, the Department of Defense (DoD) is eager to exploit it.
What is the Internet of Things?
Achieve Cybersecurity Peace of Mind for your Agency – One Day Only!
There’s no getting away from the number one threat to the U.S this year – cybercrime.
So you may want to clear your calendar for the Symantec Government Symposium. This ever popular one-day event takes place on April 15, 2015, at the Walter E. Washington Convention Center in Washington, D.C.
Denial of Service Attacks Rise (“Internet of Things” Vulnerable)
With all the noise and hubbub around insider threats and data hacks, it’s easy to ignore that other threats persist. Most notably, denial-of-service (DDoS) attacks. DDoS occur when cyber criminals make a machine or network resource unavailable to its intended users.
How to Implement Continuous Monitoring and improve your Agency’s Security Posture
Security hazards are a fact of life and the public sector is a leading target for attacks. Despite progress and increased risk awareness, government hacks and security breaches are skyrocketing. There were almost 61,000 attacks on the federal government in 2013.