Defining essential federal information systems, such as those at the Department of Health and Human Services, to keep operating during a partial government shutdown could prove more complex than defining essential federal workers not to furlough.
Defining essential federal information systems to keep operating during a partial government shutdown could prove more complex than defining essential federal workers not to furlough.
Privacy Attorney Lisa Sotto says the Epsilon e-mail breach is a warning about the state of data security employed by some third-party service providers. Strong contracts related to security practices must be the norm, not the exception.
"We really need to speak the language of business and focus less on the language of IT, and that involves risk management" Iowa CISO Jeff Franklin says. "You really need to target those resources to your most critical systems."
"A security breach of one of these systems or projects could have a severe to catastrophic adverse effect on NASA operations, assets or personnel," an inspector general's IT audit says.
Cybersecurity threats are growing exponentially, but preparedness varies by country, says Philip Victor of the International Multilateral Partnership Against Cyber Threats, located in Malaysia.
This kind of problem happens to everybody, says Marcus Ranum, CSO of Tenable Network Security, in response to the widely publicized breach at RSA. And maybe hes right. Perhaps this kind of problem does happen to everyone. But should it?
Phishing represented more than half of the 107,439 cyber incidents compiled by the U.S.-CERT for fiscal year 2010 from federal, state and local governments, commercial enterprises, American citizens and foreign CERT teams.
Skimming remains the top threat to ATMs worldwide, but certain regions are also seeing a rise in logical security breaches - malware - according to Chuck Somers, VP of ATM Security and Systems with Diebold, the global ATM supplier.
The American National Standards Institute is teaming up with the Shared Assessments Program to create a report offering healthcare information breach prevention tips.
Chief information security officers must gain buy-in from every business unit for a risk management framework, says Jim Murphy of Caritas Christi Health Care System.
RSA executives haven't been commenting publicly since the security solutions vendor revealed last week it had been victimized by a sophisticated cyberattack aimed at its SecurID two-factor authentication product. But weeks before the hack, I spoke with RSA Chief Technology Officer Bret Hartman about advanced...
"This is not a record of success; whatever we are doing is not working," says James Lewis of the Center for Strategic and International Studies. "As a nation, despite all the talk, we are still not serious about cybersecurity."
Key U.S. IT networks remain vulnerable to attack, undermining confidence in the nation's IT systems and the information collection and sharing process, Homeland Security Deputy Undersecretary Philip Reitinger and other officials say.
When the business demands the latest tools and technologies, saying "no" is not a viable option. "Clearly, these are disruptive things, but they also are extremely valuable," says Simon Godfrey, Director, Security Solutions at CA Technologies UK.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.