An audit from the U.S. Energy Department's Inspector General finds that the agency is prone to making the same cybersecurity mistakes year-after-year. This includes exposing critical infrastructure, including nuclear facilities, to outside hacking and attacks.
Fraudulent social media brand pages are often used for phishing, malware, and other scams which negatively impact your customers and damage your brand reputation. How can organizations take action against these accounts?
Download this whitepaper and learn how to:
Identify fraudulent accounts;
Create an organized...
The FBI, Gartner, and many other security analysts cite social media as one of the fastest growing security threats. That is why it is important for security teams at organizations with a significant social media presence to gain an understanding of this new attack surface and develop a plan to protect the...
Little has been done to address the social media hacking problem despite continued headlines. Most organizations lack the protective countermeasures or the expertise to mitigate risk and respond to incidents. Few companies know how to re-gain control after an account compromise or how to prevent an attack in the first...
Social media account takeovers have become synonymous with embarrassing headlines that feature well-known companies and figures. If your organization has a prominent account, cyber attackers will see you as a ripe target.
Download this whitepaper and learn:
How these takeovers are possible;
Why the complexity of...
Cloud computing initiatives, network monitoring and risk management are driving network security operations. Meanwhile, federal agencies face record levels of threats yet still rely on manual processes and outdated point tools. Agency network security operations must be modernized to streamline network security...
Certification and accreditation (C&A) has been like alphabet soup. As it transitions to assessment and authorization (A&A), it's time to sort through the confusion and identify which terms and processes apply in any given situation.
This paper sorts through the confusion to identify which terms, approaches, and...
President Obama has tapped veteran CIO Tony Scott as the top government IT official whose responsibilities include overseeing agencies' compliance with FISMA, the law that governs federal government IT security.
The sponsor of Senate-approved FISMA reform, Tom Carper, says it's not a done deal because the House has a dispute over which committee - Homeland Security or Oversight and Governmental Reform - has jurisdiction over the legislation.
Put together, two IRS audits illustrate a major concern many security pros have about FISMA audits: They're checklists of whether organizations comply with regulations that require specific processes but do not determine if the processes are effective.
Recalling an up to 10-day delay in Homeland Security helping other agencies cope with the Heartbleed vulnerability, DHS's Phyllis Schneck champions FISMA reform legislation that would codify the department's role as guardian of civilian agency IT.
A Senate committee has approved legislation to reform the 12-year-old law that governs federal information security, plus two other cybersecurity-related bills. The full Senate will now consider the measures.
Legislation before the House to excise from federal law the requirement that NIST work with the NSA on cybersecurity standards wouldn't likely stop the two federal agencies from continuing to collaborate.