Cloud computing initiatives, network monitoring and risk management are driving network security operations. Meanwhile, federal agencies face record levels of threats yet still rely on manual processes and outdated point tools. Agency network security operations must be modernized to streamline network security...
Insider threats pose high risks to all enterprises. No organization, regardless of size, industry or region, is immune. With all the advantages that the digital age has brought us (and they are many) it has also brought a rise of highly damaging data breaches, from both internal and external sources.
Regardless of...
When Army intelligence specialist Chelsea Manning leaked classified documents to WikiLeaks in 2010, the federal government's security clearance process served as the main defense against malicious insiders. CERT's Randy Trzeciak explains how insider threat defenses have changed since then.
A report on passage by the House of Representatives of a bill aimed at toughening insider threat defenses at the Department of Homeland Security leads the latest edition of the ISMG Security Report. Also, analyzing the use of blockchain technology to secure healthcare data.
Legislation to tighten insider threat defenses at the U.S. Department of Homeland Security has passed the House of Representatives and goes to the Senate, which failed to consider a similar measure that passed the House in the last Congress.
This ISMG Security Report leads with comments from President Donald Trump that suggest the U.S. military will take the lead in defending civilian-owned critical infrastructure. Also, how insider defenses changed since Chelsea Manning's WikiLeaks data dump.
President Barack Obama has shortened the sentence of U.S. Army leaker Chelsea Manning, who passed classified documents to WikiLeaks. The move comes as the government grapples with the nuances of data leaks.
As fraudsters continually refine their techniques to steal banking customers' credentials, IBM fights back with new tools that use behavioral biometrics and cognitive fraud detection.
Satti Charles, a Financial Crime Prevention Strategist with IBM Security Trusteer, is enthusiastic about the new behavioral biometric...
Leading this latest edition of the ISMG Security Report: The growing momentum in Congress to establish a select committee to investigate breaches the American intelligence community has tied to the Kremlin to influence the U.S. presidential election.
As fraudsters continually refine their techniques to steal banking customers' credentials, IBM fights back with new tools that use behavioral biometrics and cognitive fraud detection. IBM's Brooke Satti Charles offers a preview.
Satti Charles, a Financial Crime Prevention Strategist with IBM Security Trusteer, is...
Ransomware is going to get personal. Password managers will be huge targets. And we will see the rise of a whole new exploit kit. These are among the 2017 security predictions from Malwarebytes Laboratories.
And because these attacks are going to continue to result in big headlines, cybersecurity is going to grow as...
Don't guess about your agency's data, network and mission security. Adopt the successful strategies used by other federal agencies to protect their most sensitive information. Network segmentation can minimize the risk of adversaries gaining access to your agency's networks and prevent them from stealing your critical...
Federal agencies face rising threats as more millennials enter the workforce. Almost two-thirds also use their personal devices for their work. More than 60% of millennials won't take a job without unrestricted access to their social media platforms and more than 40% use the same password for multiple devices and...
Privileged users can be an agency's riskiest employees, as many have access beyond their roles or responsibilities. Moreover, current security platforms often fail to provide the necessary context to show if an incident is caused by an insider. What is your agency doing to address potentially high-risk employees and...
The world is transforming, blending the physical and digital into an age of convergence. Is your agency prepared for the resulting security challenges? Drawing upon the deep resources of both Forcepoint Security Labs�� and Raytheon, the 2017 Forcepoint Security Predictions report investigates this new shift that blurs...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.