Given that the heart of our nation's infrastructure runs on SCADA, how do we make these systems more secure?
It’s been said that speed kills. But in cyber warfare, speed heals. That’s because with today’s advanced cyber attacks, you need to move faster than the attackers to minimize damage.
Two years removed from the announcement of the attack, we can now take a look at the lessons we learned from the OPM data breach.
Watch this FedScoop video interview of IT security expert Philip Lieberman to find out how federal government agencies can redesign their networks for better resilience against cyber attacks.
Cyber intruders now use in-country assets to mask their location, making attribution challenging. If the state actor has a grudge that they want to air, then they will use their own addresses to get their message across to the company and government.
Last month the big focus in cybersecurity was the agreement reached between China and the United States. It’s correct to call it historic, but it would be far from correct to call it complete. There’s simply too much that the deal leaves out.
The problem is, cyber defense technologies that traditionally protected us from attack are often no longer able to do so. Firewalls, anti-malware tools and the like cannot block zero day attacks that haven’t previously been identified. Zero days can slip past conventional perimeter security tools undetected, and then wreak havoc inside the network.
On the surface, last week’s data breach at the US Office of Personnel Management (OPM) might seem like just another cyber attack, like those which affected Target, Home Depot and many others. However, the ramifications of the OPM breach, allegedly perpetrated by Chinese hackers, are potentially more sinister.
69 percent of respondents said they’re not using their IT security products to their full potential. Among this group, 71 percent believe this is putting their company, and possibly customers and partners, at risk.
At this week’s RSA Conference we’re showing the latest release of our adaptive privilege management platform. We’re demonstrating how to remove excess local accounts and administrative memberships, provide local escalation, and create a moving target for cyber attackers that significantly limits the amount of time they have in your environment.