Cloud Computing, Cyber Security, IT Security, Security, Technology

HID Global shares top secure identity trends for 2015

HID Global, a worldwide leader in secure identity solutions, issued its outlook on technology trends for 2015, as well as other anticipated developments across key vertical industries in the secure identity marketplace.

The annual assessment is intended to help organizations understand and take advantage of the latest advances to improve security, convenience and the user experience.

“This past year laid the foundation for what we expect to be an exciting 2015 for our customers and partners as they continue to benefit from the flexibility, adaptability and new capabilities made possible with award-winning Seos® technology,” said Dr. Selva Selvaratnam, senior vice president and chief technology officer with HID Global.

“Whether it’s moving campus IDs onto smartphones, centralizing identity management to protect everything from the door to data to cloud-based applications, or securing electronic medical prescriptions and ATM transactions, we will see the transformation of our customers’ experience using secure identities during the coming year, and beyond.”

Read More

Cyber Security World Conference 2015 New York City, July 10, brings together information security experts and senior executives focused on protecting today’s enterprises from internal and external cyber attacks; the list of firms just keeps growing: Adobe, ADP, Citigroup, E*Trade, Fidelity, Home Depot, HSBC, JPMorgan Chase, Nasdaq, Neiman Marcus, Target and Wal-mart. Our experts will discuss strategies to strengthen corporate defenses, the cybersecurity framework, risks brought by mobile computing, lessons for the boardroom and protecting national infrastructure against foreign attacks. More information at http://cybersecurityworldconference.com.

Advertisements
Standard
Uncategorized

Avatier CEO Forecasts Top 2015 Identity Management Trends

Avatier Corp., the leader of cutting edge identity management, released predictions by CEO Nelson Cicchitto that will have the most impact in the market. In his blog, “2015 Identity Management and IT Security Predictions,” Cicchitto makes the point that 2015 will focus on the age of identity management authentication. Emphasizing the significant increase in breaches in 2014 and the changing landscape of security, he notes, “In 2015, every industry becomes a target, every identity vulnerability and every app a potential host.” He stresses that as the Enterprise of Things (EoT) unfolds, enterprise information security will continue to shift from passwords and access, to authentication and automation. More information on each prediction can be found in the blog. They include:

Prediction: Enterprise security will revolve around the expansion in cloud computing, BYOD in the workplace, and the Internet of Things (IoT).

The megatrends of cloud computing, social computing, mobile computing and big data, what Gartner calls the “Nexus of Forces,” must be harnessed for enterprises to flourish in the era. The migration to SaaS platforms and cloud computing, physical access control single card solutions, virtual facilities, and BYOD in the workplace will place new and expanded emphasis on information security. Where legacy identity management relied on passwords, roles, and a limited number of systems, EoT operations assume multi-factor authentication, organizational fluidity, and near limitless applications as the norm. New solutions will appear in the marketplace, which will be smarter, faster, and in some instances, self-aware.

Prediction: Agencies and enterprises prepared for government sponsored cyber attacks will prevail in heavily targeted industries.

Read More

Cyber Security World Conference 2015 New York City, July 10, brings together information security experts and senior executives focused on protecting today’s enterprises from internal and external cyber attacks; the list of firms just keeps growing: Adobe, ADP, Citigroup, E*Trade, Fidelity, Home Depot, HSBC, JPMorgan Chase, Nasdaq, Neiman Marcus, Target and Wal-mart. Our experts will discuss strategies to strengthen corporate defenses, the cybersecurity framework, risks brought by mobile computing, lessons for the boardroom and protecting national infrastructure against foreign attacks. More information at http://cybersecurityworldconference.com.

Standard
Cloud Computing, Cyber Security, IT Security, Security, Technology

How I Learned to Start Worrying and Fear the Commoditization of Threat Intelligence

As any film adaptation of a Pynchon book is apt to be, it came across as noisy, otherworldly confusing, intermittently meaningful and more like some kind of aimless Ludovico technique than a movie. And that’s not a bad thing. It’s really all you can ultimately achieve when you try to make a movie out of one of his novels.

Good try, Paul Thomas Anderson. Good try.

As I sat there watching, thoughts from my day job kept nagging at me as if the movie had actually stirred up something in my subconscious.

Specifically, I kept thinking about the trend lately around so much cyber threat intelligence from so many solutions providers delivering feeds from so many similar sources. And, altogether more bothersome, how so many of the providers lately are partnering up with one another to offer access to so many of each others’ threat intelligence feeds inside their own platforms. In my head, I kept seeing one of those photos of a person with the same photo of the same exact person dressed the same exact way hanging on the wall behind them and another photo….well, you get it.

Suddenly the movie started making more sense to me than the threat intelligence market. Then it hit me.

Read More

Cyber Security World Conference 2015 New York City, July 10, brings together information security experts and senior executives focused on protecting today’s enterprises from internal and external cyber attacks; the list of firms just keeps growing: Adobe, ADP, Citigroup, E*Trade, Fidelity, Home Depot, HSBC, JPMorgan Chase, Nasdaq, Neiman Marcus, Target and Wal-mart. Our experts will discuss strategies to strengthen corporate defenses, the cybersecurity framework, risks brought by mobile computing, lessons for the boardroom and protecting national infrastructure against foreign attacks. More information at http://cybersecurityworldconference.com.

Standard
Cloud Computing, Cyber Security, IT Security, Security, Technology

A new era in DoD cyber defense begins

The Defense Information Systems Agency will launch a new cyber defense organization this week. The Joint Task Force-DoD Information Networks will officially hit initial operating capability on Thursday.

The new cyber organization, JTF-DoDIN, is part of the broader DISA reorganization that went into effect Jan. 12.

Initially, DISA wanted to open both the new cyber office and launch the reorganization by Dec. 31. But it needed an extra two weeks to finalize the changes.

For DISA, the reorganization is centered on making the agency more responsive to its customer needs by becoming more agile and adaptable.

But it’s the JTF-DoDIN that likely will have the more immediate impact.

The new cyber organization will take over the operations or defensive work from the U.S. Cyber Command. The Defense Department created the U.S. Cyber Command in 2010 with a goal of overseeing cyber as a unified or sub unified command.

But over time, DoD has faced an increasingly constant stream of cyber threats and the need for policy and strategy has grown exponentially. So, DoD leaders decided to let the U.S. Cyber Command focus on strategy and have someone else take over the defensive operations. And DISA was the obvious choice.

Read More

Cyber Security World Conference 2015 New York City, July 10, brings together information security experts and senior executives focused on protecting today’s enterprises from internal and external cyber attacks; the list of firms just keeps growing: Adobe, ADP, Citigroup, E*Trade, Fidelity, Home Depot, HSBC, JPMorgan Chase, Nasdaq, Neiman Marcus, Target and Wal-mart. Our experts will discuss strategies to strengthen corporate defenses, the cybersecurity framework, risks brought by mobile computing, lessons for the boardroom and protecting national infrastructure against foreign attacks. More information at http://cybersecurityworldconference.com.

 

Standard
Cloud Computing, Cyber Security, IT Security, Security, Technology

Obama’s proposed data breach notification law bodes well for businesses

Earlier this week, President Barack Obama said he wants Congress to pass legislation that would create a new federal standard for data breach notification. Under the Personal Data Notification and Protection Act, companies would be required to inform customers within 30 days if their personal information had been compromised as the result of a breach. Rather than having to navigate various state laws, the president said this new legislation would create a single standard for organizations to follow.

While the president’s announcement should come as little surprise to most companies given the amount of attention that large-scale data breaches, such as the recent hack of Sony Pictures, have garnered over the past several years, some believe that this newly proposed law would actually be of greater benefit to businesses than consumers.

obama cybersecurity photo 54b9574c1481f

“There are 47 different state data breach notification pieces of legislation and that’s a problem for organizations because if they operate in more than one state – and many companies do – they end up having to pick one and sort of make that their common denominator. It would be a lot more efficient for businesses and organizations all around if there was just a single federal standard that we could all comply with,” said Dave Frymier, CISO at IT services provider Unisys. “If you look at these different pieces of legislation, they define a breach differently and the safe harbor provisions for encryption and the definitions of encryption are different from one law to the next, so if this was all standardized across the states, it would be a benefit to all of the organizations that are trying to comply with these 47 patchwork breach notification laws.”

Read More

Standard
Cloud Computing, Cyber Security, IT Security, Security, Technology

New Year, New Threats: Electronic Health Record Cyberattacks

Cyberattacks are clearly on the minds of President Barack Obama, Islamic State jihadists, Sony Pictures execs and the CBS producers who are launching a new show this spring called CSI: Cyber. On Jan. 13, Obama announced plans to reboot and strengthen U.S. cybersecurity laws in the wake of the Sony Pictures hack and the one on the Pentagon’s Central Command Twitter account from sympathizers of the Islamic State. Whether a real attack or depicted in television and films like Blackhat, this flood of cyberattacks means that hackers are relentless and more sophisticated than ever before.

Cybersecurity lock

I’m not a fear monger by trade but want to sound the alarm that there is another cyber-risk that is looming and warrants attention of our emergency management community and government: electronic health records. The American Recovery and Reinvestment Act of 2009 authorized the Centers for Medicare and Medicaid Services to award billions in incentive payments to health professionals (hospitals, long-term care agencies, primary care, etc.) to demonstrate the meaningful use of a certified electronic health record (EHR) system.

Read More

Standard
Cloud Computing, Cyber Security, IT Security, Security, Technology

US, UK to stage joint cyber ‘war games’ to ramp up cyberdefenses

The United States and the U.K. will stage cyber “war games” together, starting this year, to boost both countries’ resistance to cyberattacks, Britain’s government said Thursday.

The two Western powers have also agreed to launch a joint “cyber cell” to share information on cyberthreats, as both countries seek to ramp up their cyberdefenses in the wake of alarming attacks. The FBI and the National Security Agency will be involved, along with Britain’s GCHQ and MI5 intelligence and security agencies.

President Barack Obama and British Prime Minister David Cameron were to announce the new programs as part of their meeting at the White House on Friday.

“This is about pooling our effort so we stay one step ahead of those who seek to attack us,” Cameron said ahead of the meeting.

Read More

Standard