Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
HP report: Security officers should focus on more than network perimeter
Tuesday - 9/13/2011, 10:18am EDT
But they are also re-defining the network perimeter, making it harder to defend. Yet simply defending the IP addresses on your network misses the fastest-growing source of cyber attacks, according to the latest biannual report from Hewlett Packard.
That report shows that attacks against web applications, including e-government apps, rose 50 percent in the first half of 2011 compared to the same period last year.
Tom Reilly, vice president and general manager of HP Security, said security officers should focus two things besides just the network perimeter. They are: data showing what's going on throughout the network and what individual users are up to, such as opening links in phishing emails.
This story is part of Federal News Radio's daily Cybersecurity Update. For more cybersecurity news, click here.