Business, Cloud Computing, Cyber Security, Cybersecurity, Data Breach, Defense, E commerce, Finance, IT Security, Security, Technology

Agencies fall short of White House targets for cybersecurity

The White House continues to see an upward trend in new cybersecurity practices governmentwide, but the Obama administration is finding that not all agencies are living up to the cyber standards it set forth in last year’s cross-agency priority goals.

Published with the 2015 budget, the cross-agency priority (CAP) goals focus on longstanding and critical issues affecting agencies across the federal government. Cybersecurity — one of the first mentioned of the White House’s 15 CAP goals — is a mission-based goal to “[i]mprove awareness of security practices, vulnerabilities, and threats to the operating environment, by limiting access to only authorized users and implementing technologies and processes that reduce the risk from malicious activity,” according to a goal statement. It says the president views cybersecurity as “one of the most serious national security, public safety, and economic challenges we face as a nation.”

Read More

Advertisements
Standard
Business, Cloud Computing, Cyber Security, cyber security legislation, Defense, E commerce, Finance, IT Security, Security, Technology

Columbia looking into ways to increase cyber-security

Columbia is looking to bolster its cyber-security after a Christmas Eve attack shut down its website for nearly three days.

The Columbia Daily Tribune reports that the city website, gocolumbiamo.com, experienced a distributed denial of service attack beginning around 11 p.m. Dec. 24. The website was flooded with requests from multiple computers, and remained offline until around noon Dec. 27.

Read More

Standard
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Finance, Government, IT Security, Security, Technology

Golden Networking’s Cyber Security World Conference 2015 New York City to Strategize Sony’s Agenda Beyond North Korean Cyber Attack and The Interview

Cyber Security World Conference 2015 New York City

Cyber Security World Conference 2015 New York City

Headlines in recent weeks have been consumed with the news of a cyberattack that targeted Sony’s movie studio as it geared to release The Interview, film that describes a CIA attempt to assassinate North Korean leader Kim Jong- un.

The company now could face tens of millions of dollars in costs from the massive computer hack that hobbled its operations for days. Major costs include investigations into what happened, computer repairs or replacements, and steps to prevent a future attack. Lost productivity while operations were disrupted will add to the price tag.

The attack, believed to be the worst of its type on a company on U.S. soil, also hits Sony’s reputation for a perceived failure to safeguard information. Recently on October that U.S. President Barack Obama signed an executive order to strengthen security measures for federal credit cards, and urged banks and retailers to follow suit in an effort to combat cyber theft and identity fraud. Several major corporations would take steps to make their own systems more secure and offer more customer protections as well.

These recommendations came after many other large companies including Adobe Systems, Automated Data Processing, Citigroup, E*Trade Financial, Fidelity Investments, Home Depot, HSBC, JPMorgan Chase, Nasdaq OMX, Neiman Marcus, Target and Wal-mart had suffered high-profile cyber security breaches. It is not beyond the realm of possibilities to think that today the information of every American has already been compromised in any of these publicly disclosed attacks.

For instance, JPMorgan Chase, America’s largest bank with $2.39 trillion in assets, has revealed that about 76 million households and 7 million of small-business customers have been impacted by a cybersecurity attack in one of the most sweeping disclosed global breaches. Unknown attackers stole customers’ contact information, which included names, email addresses, phone numbers and addresses, affecting an amount equivalent to two-thirds of American households.

Cyber Security World Conference 2015 New York City (http://www.CyberSecurityWorldConference.com) will provide a platform for information security authorities and innovative service providers to distil their latest research for hundreds of senior executives focused on protecting enterprise and government valuable assets. Cyber security experts will discuss subjects such as protecting individuals and companies against cyber-attacks, biometrics as the future of security, risks brought by mobile computing, and protecting corporate and national infrastructure against foreign attacks.

Top-of-mind topics that Cyber Security World Conference 2015 will discuss include:

  • Cyber Security Megatrends Security Professionals can’t Ignore Today
  • Strengthening the Security of Industry-wide Technology Infrastructure
  • How Hackers Really Operate to Obtain Financial Data
  • Cyber Security and its Role in the Overall Security of the United States
  • Key Considerations about Security in the Internet of Things Age
  • Designing and Managing Effective Information Security Programs

Cyber Security World Conference 2015 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact Golden Networking by sending an email to information@goldennetworking.com.

Standard
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Finance, IT Security, Security, Technology

opic: IT Security in the Snowden Era Follow via: RSSEmail Alert Bluster, bravado and breaches: Today’s ‘terrorist’ players in cybersecurity

An emailed threat can send companies to their knees and propel individuals without so much as a parking ticket straight to a holding cell. The problem is, today’s puffed-up chest hacktivists know it, and Sony has borne the brunt.

For good or ill, technology has evolved and has become part of our daily lives in the West. With the correct skill set, a hacker can launch their political agenda onto the global stage by selecting targets based on maximum impact.

Our identities are no longer purely physical; instead, our digital footprint and behavior online is now connected to the world around us. Political movements can be organized online, ideas shared, and communication networks are more based more on digital networks than ever before.

Read More

Standard
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Finance, Government, IT Security, Security, Technology

U.S. tech firm to train staff on cyber security in Israel

The American technology firm UST Global plans to set up a development center in Israel that will train thousands of software people in cyber security, according to a video that Economy Minister Naftali Bennett posted to his Facebook page on Saturday night.

Bennett, who was in Washington to participate in the Saban Forum, met over the weekend with UST Global CEO Sajan Pillai, who appears in the video with him and confirms UST’s decision to launch its activity in Israel during the first quarter of next year.

Read More

Standard
Uncategorized

Leslie Caldwell: Justice Dept. to Form Team on Cybersecurity, Privacy

The Justice Department‘s criminal division will soon have a dedicated cybersecurity group that will give legal guidance on electronic surveillance cases and collaborate with U.S. lawmakers on cyber legislation, The Hill reported Thursday.

Cory Bennett writes that Assistant Attorney General Leslie Caldwell said the cyber unit will work with both industry and government to address cybersecurity and privacy concerns.

“Given the growing complexity and volume of cyberattacks, as well as the intricate rubric of laws and investigatory tools needed to thwart the attacks, the cybersecurity unit will play an important role in this field,” Caldwell told her audience during a recent event at Georgetown University.

She added that the new cybersecurity unit aims to use law enforcement tools to capture and prosecute cyber criminals while ensuring the privacy of the general public.

Read More

Standard
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, E commerce, Finance, Government, IT Security, Security, Technology

We are in a war with no boundaries, warns cyber security expert

ABU DHABI // Effective defence of the nation’s cyberspace must take into account the possibility that attackers are not just nations or shadowy groups, a security expert has warned.

“In cyberspace there are no national boundaries, and attackers needn’t be a country or organisation,” said William Hagestad, a researcher in cyber security intelligence at Red Dragon Rising Publishing in the US. “They can be anyone with a computer, mouse and keyboard and the will to do harm.”

Protecting the country from such attacks will be discussed at the three-day Cyber Defence and Network Security summit, starting today, when 100 industry experts from across the UAE, including the police and military, will gather.

Mr Hagestad, who will discuss international threats and how attackers have breached GCC security, said the forum’s main objective was to share information.

Read More

Standard