Cybersecurity

3 Lessons Learned for Successful Mobile Adoption

Mobile in government continues to be one of the most pertinent topics facing public sector administrators. The Pew Internet & American Life Project reports, “As of December 2012, 87% of American adults have a cell phone, and 45% have a smartphone. As of January 2013, 26% of American adults own an e-book reader, and 31%Read… Read more »

Have the Chinese Hacked our Weapons Systems? – Plus the DorobekINSIDER’s 7 Stories

On GovLoop Insights’ DorobekINSIDER: It was the the tweet heard around the country: “CAPTURED!!! The hunt is over. The search is done. The terror is over. And justice has won. Suspect in custody.” Meet the man behind the Twitter field Deputy Daley. Click here for the full recap. The SEVEN stories that impact your lifeRead… Read more »

Grant Thornton-TechAmerica Survey: Budget, Human Capital Top Agency CIO Concerns

Budget and human capital are the top two areas of concern within the federal chief information officer community as CIOs grapple with sequestration cuts and other budget reductions, according to a TechAmerica-commissioned survey. Grant Thornton helped the trade association conduct the survey and also spoke with other top IT officials at agencies, large programs andRead… Read more »

In Review: Symantec’s Annual Government Internet Security Threat Report (GISTR)

Cyberespionage and targeted attacks are on the rise-by 42%, according to Symantec’s annual Government Internet Security Threat Report (GISTR) report. This latest finding and others were published in Symantec’s annual Government Internet Security Threat Report (GISTR) report, which takes a year of security intelligence and knowledge collected from Symantec’s Global Intelligence Network. The report providesRead… Read more »

Are Big Data and Cybersecurity a Perfect Match? Plus Your Weekend Reads!

We all know by now that cyberspace is the next frontier and that attacks are getting more sophisticated and effective. But the key to keeping your network may be big data. Teradata and Ponemon Institute have looked at the results in their report: Big Data Analytics in Cyber Defense. Sam Harris the Director of EnterpriseRead… Read more »

Not Just for Fun Anymore: Why Social Media Should Be included in CyberSecurity Measures

The Associated Press Twitter hack might have been the wake-up call that we needed. Social media is a wonderful thing. It’s fast, reaching a large and diverse audience in no time and it provides a platform for interaction between an agency/company/organization/individual and its constituents/customers/patrons/fans. But that speed and distance could prove risky if a tweetRead… Read more »

Profiling a Data Breach – Where Should You Spend Your Cybersecurity Resources?

In the 2014 budget request the White House sent to Congress one of the few areas to not get cut dramatically was cybersecurity. But before we pour resources into protecting our networks from cyberattacks it is important to know from where and from who these attacks are coming. That’s where the annual Verizon 2013 DataRead… Read more »

How Can We Protect Critical Infrastructure When We Can’t Even Prevent Message Board Hacking?

Lately we’ve had some experiences in our area with hacking of construction message boards. At first, I figured it must have been some programmers who figured out how to get into the computer system. But after seeing another report of it today, I searched for “how to hack a highway message board” and found thereRead… Read more »

What’s Lurking Beyond Your Firewall? 11 Types of Cyber Attacks (GAO Report Pt. 2)

In a previous post, “9 Sources of Cyber Threats Highlighted in GAO Report,” Pat Fiorenza discussed Table 1 of GAO’s report Cyber Security: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented, describing the various types of attacks that vulnerable users can fall victim to. In this blog, I willRead… Read more »