Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: J.J. Green
With so much gloom and doom about Cyber vulnerabilities, the Rand Corporation has some good news. In his book Cyberdeterrence and Cyber war, Martin Libicki puts it into perspective --suggesting Cyberspace has its own laws; for instance, it is easy to hide identities and difficult to predict or even understand battle damage, and attacks deplete themselves quickly. But the overall message is… cyber war is nothing so much as the manipulation of ambiguity.
Recently several large U.S. companies were hacked online and like other victims of similar attacks, they were not aware until well after the attack happened. In some cases it was months. Online security firm Mandiant says, often attacks are blamed on malware, but they say 46% of compromised machines have no malware on them. Mandiant says hackers can navigate through conventional safeguards easily leaving little or no trace.
Devices such as smartphones and tablets are being used more and more often for online shopping and the Center for Internet Security is warning that means the volume of attacks against them will increase as well. The "center" says every time you download an app, you open yourself to potential vulnerabilities. Their advice is to research those apps you plan to download to verify their legitimacy. Update all apps when notified and disable Bluetooth and Near Field Communications when not in use to reduce the risk of your data, such as a credit card number, being intercepted by a nearby device.
How do you shop securely online. The Center for Internet Security says you should "know your online merchants. Limit online shopping to merchants you know and trust. Only go to sites by directly typing the URL in the address bar. If you are unsure about a merchant, check with the Better Business Bureau or the Federal Trade Commission to ensure its legitimacy. Confirm the online seller's contact information in case you have questions or problems. Use a credit card, not a debit card. Credit cards are protected by the Fair Credit Billing Act and may reduce your liability if your information is used improperly.
How can you tell if your system has been compromised? Internet security firm Mandiant says there are numerous signs. Included are evidence of unauthorized use of valid accounts, trace evidence & partial files, command and control activity, known and unknown malware, suspicious network traffic, valid programs used for other purposes and files that have obviously been accessed by attackers. IT managers are reminded that threats can slip in undetected and lay dormant for long periods of time before striking.
The leaders of Ukraine's protest movement that's all but shut-down the government for more than two months say they will seek constitutional changes to weaken the president's powers. The changes are expected to be discussed in parliament as the country wades through a stalemate. Protesters are refusing to leave their encampment in downtown Kiev or vacate buildings they occupy, but they say they will abide by a truce they agreed to.
A U.S. Customs and Border Protection, Office of Air and Marine, flight crew put down a CBP unmanned aircraft system in the Pacific Ocean 20 miles southwest of San Diego, at about 1:15 a.m. PST Monday. While on patrol off the Southern California coast, the unmanned aircraft, a maritime variant of the Predator B, experienced a mechanical failure. The crew determined that the UAS would be unable to return to where it originated in Sierra Vista, Ariz., and put the aircraft down in the water. The cause of the failure is unknown. There were no injuries as a result of this emergency landing.
Department of Defense announced the deployment of M/V Cape Ray from Portsmouth, Va. M/V Cape Ray is the primary contribution of the Department of Defense toward international efforts to eliminate Syria's chemical weapons material program. Over the last several months, hundreds of government and contract personnel have worked tirelessly to prepare the vessel to neutralize Syrian chemical materials and precursors using proven hydrolysis technology. This achievement could not have been possible without these remarkable contributions.
The Pentagon says it's sending Iraq another installment of small arms and ammunition requested by Baghdad as it battles al-Qaida militants for control of Fallujah and other key cities in Anbar province. A Pentagon spokesman said Friday that Iraq will be receiving the extra arms and ammunition "very shortly." Army Col. Steve Warren declined to say whether Washington is considering using U.S. troops to train Iraqi forces.
The European Union is expected soon send up to 1,000 soldiers to help stabilize Central African Republic. It would be the EU's first major army operation in six years. Reuters says, "the intervention by the 28-nation bloc comes after a senior U.N. official warned on Thursday of the risk of genocide in Central African Republic without a more robust international response to communal bloodshed."