Today, standard operating procedure for security organizations dealing with increasing threats is bolting on increasingly sophisticated technologies: anti-virus, router ACL lists, firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), web reputation services, web application firewalls, Security Information Event Management (SIEM), anti-malware gateways, endpoint virtualization, etc.
It’s become a daily occurrence to learn of the latest breach when reading the news each day during your morning coffee. They are so frequent, and the volume of records breached so astronomical, that people are starting to get desensitized. This is both good and bad for information security professionals. On the positive side, there is no longer any issue convincing management that malware, hacking and breaches are serious issues.
One of the nation’s largest financial institutions, J.P. Morgan Chase & Co., is still reeling from a massive cyber-assault which compromised the personal information of millions of their customers.
Cyber-attacks continue to rear their ugly head as a major security threat to American infrastructure. Private- and public-sector entities alike are finding themselves victims of security breaches and data swipes. Hackers can come from anywhere – inside or outside the United States – and their goals can vary. Some are after state or industrial secrets, while others are after that valuable 21st-Century commodity, customer data. Still more hackers simply want to cause chaos, disrupting commerce and peoples’ lives for cheap thrills. But since cyber-attacks are launched against government
Last week, the Senate Select Committee on Intelligence passed legislation intended to help the U.S. Government and American companies thwart cybersecurity attacks, the Cyber Information Sharing Act (CISA). Should this legislation pass Congress and be signed into law, it would be a big step towards tightening our nation’s security online.
Recent reports from Capitol Hill suggest that the Senate is making progress on a bill to address our nation’s pressing cyber security concerns. Intelligence Committee Chair Dianne Feinstein (D-Calif.) and Ranking Member Saxby Chambliss (R-Ga.) have hammered out draft cybersecurity legislation, and are currently circulating it for comment from interested parties on and off the Hill.
Trust is at the epicenter of Cloud Computing and the single most powerful enabler for cloud migration, and probably even more compelling than promises of savings in CapEx and OpEx.
Old fashioned threat vectors merely scratch the surface.
In baseball, the change-up is a pitch that arrives much slower to the plate. The reduced speed coupled with a deceptive delivery style is intended to confuse the batter's timing. In similar style, low-and-slow threats are the slow-ball of Cyber Attacks.
Every form of traditional warfare has used a bag of age-old tactics and strategies.