article thumbnail

IDG Contributor Network: To improve information security, enterprises and government must share information

Network World

Information security is forever weaved into our daily lives. From the massive data breaches impacting Target, Yahoo and Anthem to IoT-powered DDoS attacks that take down substantial portions of the internet for extended periods of time, information security impacts everyone. The reality is providing protection in this kind of environment is so challenging that no single entity, whether it’s a company or a government agency, can accomplish this task alone.

article thumbnail

IDG Contributor Network: 3 new information security jobs for the digital enterprise

Network World

The responsibilities of information security are rapidly changing as enterprises digitize. In this new context, information security is expected to take a strategic role by helping business leaders understand the security implications of their digital strategies; support a quicker pace of technology exploitation and experimentation; and govern a larger, more varied project portfolio. Shift 1: Strategy over governance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sources of cyber intelligence from governments and academia

CTOvision

Cyber intelligence is a growing discipline in the cybersecurity community, providing important information for cyber defenders in enterprises large and small. This post reviews key sources of cyber intelligence provided free from governments and academia. What many do not realize, however, is that there are some fantastic sources of cyber threat information available for free from the government and academia. Striving to make cyber security understandable by people.

article thumbnail

E-Government: A Graduate Class

CIO Musings

One thing I am working on for this fall that I am very excited about is a class at VCU that is near and dear to me: E-Government. The class title is INFO 691 Topics in Information Systems – Digital Government This class is about using information and communication technologies to provide government services. Open data, social media, websites, APIs, collaboration & sharing networks. It has been 6 months since I posted anything to this blog.

article thumbnail

Symantec Government Symposium 11 March 2014 at the Renaissance Hotel Washington DC

CTOvision

By Bob Gourley DC seems to have a cyber security related event every week. All those factors together make the Symantec Government Symposium of 11 March 2014 one to pay attention to. Here are details from the invite: Don’t miss this exciting opportunity to join 1500 IT leaders and innovators on March 11 to collaborate and discuss the top issues in IT security and management. Learn how agencies are turning to BYOD to ensure security and ROI. Networking Break.

Symantec 261
article thumbnail

How OPM Could Have Avoided the Data Breach

CTOvision

Recently, a data breach at the Office of Personnel Management ( OPM ) demonstrated once again the vulnerability of data and how even when an organization has seemingly deployed the right tools, security holes can be exploited to gain access to highly sensitive information. This includes highly sensitive records about individuals with clearances and even information that could expose those living undercover. When the Federal Government Gets Hacked (dailysignal.com).

Firewall 286
article thumbnail

The Dick Jail Is 'Safe' Again, but Use at Your Own Risk

Gizmodo

Last October, security researchers warned that the Qiui Cellmate Chastity Cage had a serious security flaw that could allow hackers to turn a chastity device into a dick jail.

article thumbnail

Internet Two Seeks Chief Cyberinfrastructure Security Officer

CTOvision

Chief Cyberinfrastructure Security Officer. Position Summary: The Internet2 Chief Cyberinfrastructure Security Officer (CCSO) is the leader responsible for establishing the cyberinfrastructure security strategy and direction for Internet2′s global infrastructure programs. The CCSO provides leadership for the Internet2 cyber security program through strong working relationships and collaboration across the staff and community, including policy and operational areas.

Internet 292
article thumbnail

IDG Contributor Network: Information security priorities for Trump's administration

Network World

The first task should be shoring up government IT systems. There’s no reason to suspect they won’t continue to target political entities such as the Democratic National Committee or step up attacks on government agencies. Emphasize that information security applies to all agencies. Even secretaries whose agencies are not typically associated with either information security or IT need to be included.

article thumbnail

Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk

CTOvision

Available data suggest that 84% of corporations have malware on their networks. FBI Director James Comey consistently underscores the threat of cybercrime to corporate America by repeating what security professionals have long known: “there are two kinds of companies in the United States, those who know they have been hacked and those that don’t know they have been hacked.” Building a Culture of Security: Do all our employees understand their role in cyber security?

Insurance 401
article thumbnail

The Security Innovation Network Showcase: 3-4 Dec in DC

CTOvision

We have been long-term supporters of the Security Innovation Network (SINET) and believe this group plays an important role in being a catalyst for innovation around enterprise cyber security. This event helps highlight emerging technologies with potential dramatic positive impact on enterprise missions and also helps advance the exchange of ideas around mission needs and concepts of operation on enterprise cyber security. 7 hours Networking and Networking Reception.

Network 275
article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. An information security policy provides management direction and support for information security across the organization. Policies can be enforced by implementing security controls.

Policies 267
article thumbnail

Hybrid IT Governance: Automation is Key

Cloud Musings

In their almost rampant embrace of cost savings associated with public cloud, many are just now understanding the information technology governance challenge posed by vastly different traditional and cloud computing operational models. Challenges can also include security concerns, financial management changes and even dramatic cultural changes. 1) Specificity around security processes, business resilience and financial management are paramount.

article thumbnail

The Importance of an Online Encryption Policy

CTOvision

IBM’s latest Cyber Security Intelligence index report shows that: 1.5 There is a 12% year-to-year increase in security events to educate and inform organizations. There are 91,765,453 security events annually. It covers the systematic data management of the company and can also be referred to as information security policy standards when working in an on-premise, cloud, or a hybrid-computing environment. Government institutions.

Policies 283
article thumbnail

How Certifications Can Help You Land a Position | Hacking In to Cybersecurity

Linux Academy

The blogs will consist of introducing you to some techniques you can use to help to land a security position, as well as covering some concepts that anyone considering joining the career field should know about. Every day the bad guys get just a little stronger, adding more and more people and crafting more and more attacks that the Security industry just simply cannot keep up with. For individuals coming from outside the IT industry , I recommend Network+ in addition to Security+.

Course 60
article thumbnail

China Says NSA Is Hacking Top Military Research University

SecureWorld News

China's National Computer Virus Emergency Response Center (CVERC) recently made a statement accusing the United States National Security Agency (NSA) of repeatedly hacking the Northwestern Polytechnical University, a key public military research university located in Xi'an, China.

article thumbnail

Biden's COVID Plan Includes Billion$ For Cybersecurity

SecureWorld News

Because of this, the President-elect is calling upon Congress to modernize and secure federal IT and its networks. Build shared, secure services to drive transformational projects. Improving security monitoring and incident response activities. Government Coronavirus

article thumbnail

Fantastic or Frightening: FBI Accesses [Your?] Exchange Servers to Stop Attacks

SecureWorld News

government? Cybersecurity and Infrastructure Security Agency (CISA) announced discovery of Zero-Day exploits being used to attack Microsoft Exchange email servers. Featured FBI Network Security Original Content Microsoft U.S. Government

article thumbnail

IntelliDyne’s ITAC Published Top 10 Tech Trends In 2015 For Government Enterprise Infrastructure Management

CTOvision

IntelliDyne’s ITAC is a thought leadership council focused on promoting innovation in Enterprise Infrastructure Management and technology solutions in government, comprised of IntelliDyne senior technologists and enterprise architects. Insights include: IoT – Internet Of Things will become practical as government figures how to extend applications, solutions and analytics from the Gov Enterprise & Data Centers. By Katie Kennedy.

Trends 264
article thumbnail

China’s Cybersecurity Law Challenges Foreign Companies To Accelerate Their Digital Transformation

Forrester IT

On November 7, China's top legislature adopted a cybersecurity law to safeguard the sovereignty on cyberspace, national security, and the rights of citizens. The law has seven chapters that define specific regulations in various areas, such as network operational security (including key IT infrastructure), network information security, monitoring, alerting, and emergency situation handling as well as related legal responsibilities. security.

Company 287
article thumbnail

10 Security Quotes: Microsoft, CrowdStrike, SolarWinds, and FireEye Talk to Congress

SecureWorld News

However, SecureWorld has picked off 10 quotes that speak to the state of information security and the mindset of these leaders from corporate America. They operated clandestinely, using methods that counter security tools and forensic examination. Government Data Breach

article thumbnail

DoD Announces Third 'Hack the Pentagon' Bug Bounty Program

SecureWorld News

The program, first launched in 2016, aims to leverage the expertise of the private sector and commercial crowdsourcing best practices to enhance the information security of the DoD. These firms will host crowdsourced security activities on behalf of the DoD. The U.S.

article thumbnail

IDG Contributor Network: What enterprises should take away from the CIA leak

Network World

What hasn’t been discussed as much is what enterprises (and governments in one case) can learn from the WikiLeaks Vault 7 leak. Collectively, these development make practicing information security more complex than ever. The recent document leak detailing CIA spying campaigns and hacking techniques has fostered conversations and news stories on how to balance intelligence gathering with privacy, as well as discussions on the agency’s extensive spying capabilities.

article thumbnail

NASA Audit: Cyber Risk Skyrockets with 'Work from Home'

SecureWorld News

A new security audit reveals that cyber bad actors hit the National Aeronautics and Space Administration (NASA) with more than 6,000 attacks during the last four years. 6 key areas where NASA's information security is failing. Featured NASA Network Security Original Content

article thumbnail

Global Supply Chain Cyberattack Underway via IT Monitoring Software

SecureWorld News

The software updates for your IT management tools arrive automatically and contain legitimate changes—but hidden inside the update is malware that gives hackers secret access to your network. More than 300,000 organizations and governments around the world rely on a company called SolarWinds.

Malware 105
article thumbnail

Invincea Announces 54 New Enterprise Customers for Its Flagship Enterprise Solution, $8.1M in Advanced Research Contracts for Its Labs Division

CTOvision

Major Market Demand for Advanced Threat Protection Driving Rapid Platform Adoption and Expansion of Technology Ecosystem; Company Announces Integration With Palo Alto Networks’ Wildfire Platform. In the first quarter of 2014, the company’s advanced research division—Invincea Labs—secured $8.1M A security strategy that only reacts to attacks isn’t acceptable,” said Paul Calatayud, Chief Information Security Officer of Surescripts. “To By Bob Gourley.

article thumbnail

SINET Showcase 2015 Update

CTOvision

We have previously written about the very positive impact the Security Innovation Network (SINET) is having on the community. If you are an executive with industry or the federal government you should check your schedules and plan on attending and interacting with some of the nation's greatest technologies. security companies that are addressing industry and government’s most pressing needs and requirements. Deputy Chief Information Security Officer.

article thumbnail

Federal CISO’s define greatest challenges to authority

Network World

If you are a federal Chief Information Security Officers – or even if you are not, you face some serious trials just to do your difficult job. Federal agencies in particular lack clarity on how to ensure that their CISOs have adequate authority to effectively carry out their duties in the face of numerous challenges, a report out this week form the watchdogs at the Government Accountability Office stated.

Network 111
article thumbnail

- A Taxpayer Network Lock Out

Chief Seattle Greek Blog

Terry Childs, a network administrator for the City / County of San Francisco, was arrested last week on four counts of computer fraud. Childs apparently configured the City’s Cisco-based network so he along had the password(s) to control and manage that network. And – seven days after the arrest – the City’s Department of Telecommunications and Information Services is apparently still locked out of its network. government operations management of technology

article thumbnail

Microsoft: 'Cyberattacks Targeting Vaccine Makers Must Stop'

SecureWorld News

And according to a new post from Tom Burt, Microsoft Corporate Vice President for Customer Security & Trust, many recent attacks are nation-state backed and threaten the very vaccine and therapeutic research the world is hanging its hopes on: ".we’re

article thumbnail

Fed Tech Roundup September 30

CTOvision

Northrop Grumman to Feature Maritime Security Capabilities at Pacific 2015. Audit: Federal networks still vulnerable - The Hill. How will FITARA affect government mobility? Federal government awards Ben Franklin $1.7 Federal Information Security: Agencies Need to Correct Weaknesses and Fully Implement Security Programs, September 29, 2015.

Firewall 259
article thumbnail

Navigating the muddy waters of enterprise infosec

Network World

Executives at Booz Allen Hamilton learned the importance of information security the hard way back in 2011 when the hacker group Anonymous claimed that it had penetrated one of Booz Allen’s servers and had deleted 4GB of source code and released a list of more than 90,000 military email addresses and encrypted passwords.

article thumbnail

5G-enabled manufacturing: Realizing Industry 4.0

TM Forum

A two-year project with Ford Motor Company has shown how 5G, mobile private networks, multi-access edge computing (MEC), IoT (Internet of Things), big data, cloud, artificial intelligence will deliver Industry 4.0 Security by design. Securing the MPN was a key feature of this.

Industry 130
article thumbnail

Guidance Software Federal Summit 6 March 2014

CTOvision

The Guidance Software Federal Summit is a thought leadership forum designed exclusively for federal managers and leaders to learn how Government and industry leaders are achieving endpoint visibility across their entire IT ecosystems. The summit features presentations, panel discussions, and workshops on up-to-the-minute trends and issues faced by those in charge of sharing, analyzing, and defending government data through Enterprise Forensics, E-Discovery and Cybersecurity in the U.S.

Software 257
article thumbnail

Spotlight on Cybersecurity Leaders: Diego Maldonado

SecureWorld News

In the Secure World Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. I had an opportunity to join federal government as a computer specialist with varying roles that took on a life of their own within the technology field.

article thumbnail

Join Women in Cybersecurity This Week in Dallas

CTOvision

This event is designed as a forum for speakers and guests to exchange knowledge, experience, networking, and mentoring, with the ultimate goal of raising interest in the important, fascinating and lucrative field of cybersecurity. Since 2013, with support from various industry, government and academic partners, WiCyS has successfully worked to recruit, retain and advance women in cybersecurity. Heather Adkins, Founding member of the Google Security Team. Katie Kennedy.

article thumbnail

World's First Hybrid War in Ukraine Holds Important Cyber Lessons

SecureWorld News

He details the war aims of Russia, including destroying the Ukrainian government, society, population, and the country as a whole. Kathleen Moriarty, CTO, Center for Internet Security, talking about "Transforming Information Security for Businesses of All Sizes".

article thumbnail

Fears of election hacking spread in Europe

Network World

The French government will not allow internet voting in legislative elections to be held in June because of the "extremely elevated threat of cyberattacks." The move follows a recommendation from the French Network and Information Security Agency (ANSSI), it said Monday. France has followed the Netherlands in placing its faith in paper-based voting systems ahead of key elections later this year, following allegations that Russian hackers influenced last year's U.S.

Network 60
article thumbnail

Yahoo breach means hackers had three years to abuse user accounts

Network World

Security researchers are disturbed it took Yahoo three years to discover that details of over 1 billion user accounts had been stolen back in 2013. The stolen database may have even included information on email ids of U.S. government and military employees. “It It is extremely alarming that Yahoo didn’t know about this,” said Alex Holden, chief information security officer with Hold Security.

Network 79
article thumbnail

Cyberhacked – Again

Chief Seattle Greek Blog

In the face of continuing breaches, what are Governments to Do? The depressing news made headlines in Washington State and nationwide last week – the Washington State Courts systems had been hacked , and about 160,000 social security numbers and the information from a million driver’s licenses was potentially exposed to hackers. The State of Utah had the personal information (social security numbers, healthcare information, etc.)

article thumbnail

Jio showcases enablement of secure IoT over Blockchain platform

TM Forum

What: Developed an integrated suite for IoT platform with Blockchain in-house, giving massive IoT ecosystems a secure means of onboarding and delivering end-to-end use cases. A secure means of onboarding and delivering end-to-end services is critical. Who: Jio Platforms.

article thumbnail

Spotlight on Cybersecurity Leaders: Women in Cybersecurity Delaware Valley

SecureWorld News

In this installment, meet two of the leaders behind the WiCyS Delaware Valley affiliate, which is composed of women trailblazers from academia, government, and industry cybersecurity sectors. Featured Cybersecurity SecureWorld Security Leadership Original Content Women in STEM

article thumbnail

BlackBerry readies a more secure version of the Samsung Galaxy S7

Network World

Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel's smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform later this year. That means that organizations looking for smartphones offering government-grade security will be able to buy the Samsung Galaxy S7 or, soon, the S8 rather than the now-discontinued BlackBerry OS smartphones like the one Merkel uses.

Network 62