Cyber Security Govt

FACT SHEET: What does a $19B Cybersecurity National Action Plan get you?

The President’s new Cybersecurity National Action Plan (CNAP) is building upon lessons learned from cybersecurity trends, threats, and intrusions.  This plan directs the Federal Government to take new action now and establishes new programs to help foster long-term improvements in the cybersecurity approach across the Federal Government, the private sector, and our personal lives. Here are...

opg cropped

Hackers change chemical settings at water treatment plant

Hackers manipulated the programmable logic controllers that managed the amount of chemicals used to treat the water to make it safe to drink. NEW YORK — March 23, 2016 — Hackers breached a water company’s industrial control system and made changes to valve and flow control settings, Verizon revealed in its latest Data Breach...

PowerLine

First known hacker-caused power outage signals troubling escalation

Highly destructive malware creates “destructive events” at 3 Ukrainian substations. Highly destructive malware that infected at least three regional power authorities in Ukraine led to a power failure that left hundreds of thousands of homes without electricity last week, researchers said. The outage left about half of the homes in the Ivano-Frankivsk region of...

Cyber

Lack of Skills Still Hamper Ability to Deliver Cybersecurity

A recent survey found that a lack of required professional skills is still hampering companies’ ability to deliver cybersecurity to meet their evolving needs. The Cyber Security Job Trends Survey for 2016 said that of the 435 senior-level technology professionals who completed the survey, 68 percent affirmed that there is a global shortage of...

Networks

The state of cybersecurity: What 2016 will bring

By Gerard Bauer from:  SECURITY FEATURES With cybersecurity breaches dominating 2015’s headlines on a regular basis, it is clear that today’s organisations simply cannot defend against every threat. Savvy cybercriminals are continuing to find attack entry methods that bypass or defeat traditional security defences, so threats remain undetected until damage has been done. It’s...

It-Security

From IoT threats to forensics

Cybersecurity is not about to go away. Quite the opposite, with spending on defending IT systems estimated to balloon from $77bn this year to $170bn in 2020, according to MarketsandMarkets. That view is backed up by researchers at Indra’s Cybersecurity Operations Center, located in San Fernando de Henares, Madrid, who expect the security sector to...

Application-security-magic-quadrant-report-gartner-2015-free-download-read-leaders

Who are the leaders in the latest application security Gartner Magic Quadrant?

Highlights from the 2015 Gartner Magic Quadrant for application security testing By John P. Mello Jr. Aug 27, 2015 Gartner recently published its 2015 Gartner Magic Quadrant for Application Security Testing (AST) report, which analyzes security vendors’ static, dynamic, mobile, and interactive application testing capabilities. The report is based on analysis from 350 application-security-related...

Download

The insider versus the outsider: Who poses the biggest security risk?

by Chris Stoneff – VP of technical management at Lieberman Software – Wednesday, 19 August 2015. Today, many organizations are under continuous attack from nation-states or professional cyber criminals. One of the main focuses for IT security teams is stopping intruders from gaining access to assets on the corporate network. However, this strain on...

SMB

Virtualization doubles the cost of security breach

Virtualization doubles the cost of security breach By Maria Korolov |CSO | 24 Aug 15   When a security incident involves virtual machines in either a public or private cloud environment, the recovery costs double compared to that of a traditional environment, according to a new report from Kaspersky Lab. In a survey of...