Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Honeystick Project? Zero Day? BYOD?
Tuesday - 12/18/2012, 9:56pm EST
Nobody can keep up the radical changes in computer security.
During the interview, Schumm discusses the changing concept of a virus being "in the wild."
Years ago, organizations would be able to list the number of malicious exploits; today, the number changes so fast it is impossible to list them.
Symantec has several centers for monitoring cyber-attacks, one is located in Herndon, Virginia.
Schumm talks about how Symantec merged with a company called RipTide to get an overview of how attacks were developing.
This overview enables security professionals at Symantec to develop heuristic methods of warning about activities.
Most federal IT professionals have heard of the old exploit where a few thumb drives were "lost" in a parking lot and employees would take them inside and plug them into a computer.
Schumm talks about a similar exploit called "honeystick."
Instead of "losing" thumb drives, Symantec "lost" smart phones that were loaded with apps and geographic tracking software.
Nobody has all the answers when it comes to security these days, it is always good to listen to a fresh perspective from a trusted vendor.