The massive initiative to deploy continuous monitoring at U.S. federal government agencies will be done in phases, with the initial rollout occurring over three years, the Department of Homeland Security's John Streufert says.
As the federal government ramps up deployment of continuous monitoring, agencies should significantly reduce the time to certify and accredit IT systems and detect vulnerabilities, says the Defense Department's Robert Carey.
An inspector general's audit of the Department of Veterans Affairs will highlight security control deficiencies in four key areas. Inconsistent enforcement of programs is a major concern.
Breach statistics for 2012 show DDoS attacks dramatically increased in all sectors, says Verizon's Dave Ostertag. "If your organization, company or agency has a presence on the Internet, you're a potential victim now."
Hacktivists' OpUSA distributed-denial-of-service attack against U.S. government and banking websites proved to be unsuccessful, experts say. But why was this attack a failure?
Anonymous says its OpUSA attack planned for May 7 aims to 'wipe' government and banking websites from the Internet. Security experts say the threat is real, but are U.S. organizations taking it seriously?
NIST's Ron Ross, a big NASCAR fan, likens new security controls guidance to the tools race-car builders use to prevent drivers from breaking their necks when crashing into a brick wall at 200 miles an hour.
Hacktivists' phase 3 DDoS attacks against U.S. financial services firms have entered their eighth week, and FS-ISAC spokesman Greg Garcia says concerns are mounting that a criminal element to the attacks could emerge.
The Federal Information Security Amendments Act would require agencies to continuously monitor their IT systems for cyberthreats and implement regular threat assessments.
U.S. banking institutions are reluctant to acknowledge - much less discuss - ongoing DDoS attacks. But in recent regulatory statements, the nation's largest banks are candid about DDoS and its impact.
Sensitive information contained in Securities and Exchange Commission computers are at risk of being publicly exposed because of lack of proper controls, according to audits by the SEC inspector general.
American Express confirms it was hit this week by a distributed-denial-of-service attack. The hacktivist group that has targeted banks in recent months claims credit for this latest high-profile attack.
Six leading U.S. banks were hit March 12 by distributed-denial-of-service attacks, says Carl Herberger of Radware, who claims the attacks are evolving and the bot behind them is growing.
Prolexic's CEO Scott Hammack says battling distributed-denial-of-service attacks has become part of everyday business. And during this in-depth interview, he explains why.
Hacktivists have formally launched their third wave of distributed-denial-of-service attacks on U.S. banking institutions, and their botnet is growing. How should institutions prepare to defend?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.