Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Honeystick Project? Zero Day? BYOD?
Tuesday - 12/18/2012, 9:56pm EST
Nobody can keep up the radical changes in computer security.
During the interview, Schumm discusses the changing concept of a virus being "in the wild."
Years ago, organizations would be able to list the number of malicious exploits; today, the number changes so fast it is impossible to list them.
Symantec has several centers for monitoring cyber-attacks, one is located in Herndon, Virginia.
Schumm talks about how Symantec merged with a company called RipTide to get an overview of how attacks were developing.
This overview enables security professionals at Symantec to develop heuristic methods of warning about activities.
Most federal IT professionals have heard of the old exploit where a few thumb drives were "lost" in a parking lot and employees would take them inside and plug them into a computer.
Schumm talks about a similar exploit called "honeystick."
Instead of "losing" thumb drives, Symantec "lost" smart phones that were loaded with apps and geographic tracking software.
Nobody has all the answers when it comes to security these days, it is always good to listen to a fresh perspective from a trusted vendor.