[Survey] Government Faces Credibility Test Over Cybersecurity Failings
Two years on from the massive Office of Personnel Management (OPM) data breach, current and former officials have concluded that the greatest fallout from the hack was not the loss of documents and personal identifiable information, but to the government’s reputation, reports NextGov.
Current State of Information Security | Part 2
Part 2 o2:
A few weeks ago, we looked at the current state of information security and implementations from the Ten Domain Model. Using this information, we can now look at where we need to be.
Due to the rapidly changing threat landscape two key requirements for information security are becoming increasingly critical. These requirements are automation and continuous monitoring.
1) Why Automation? Only automated approaches can scale and respond rapidly to large-scale incidents.
a. Preventative policy enforcement reduces risk:
i. overall number of security vulnerabilities
ii. the success of any particular attack technique.
b. Automated remediation systems have a positive impact on a large number of hosts with a relatively small time investment from computing staff.
2) Why continuous monitoring? A primary goal of continuous monitoring is, as much as is practicable, to apply automated remediation to security vulnerabilities that are found. That takes the need for human intervention out of the picture. Human intervention and the errors and delays that result from it are credited for many of the lapses in IT security.