Publication: Government Info Security

First reported Apr 16 2014 - Updated Apr 17 2014 - 1 reports

Why Auditors' InfoSec Advice Is Ignored

GAO's Gregory WilshusenAs director of information security issues at the U.S. Government Accountability Office, Gregory Wilshusen dispenses advice to agencies to improve their security - recommendations that aren't always heeded.But Wilshusen understands ... [Published Government Info Security - Apr 16 2014]
First reported Apr 14 2014 - Updated Apr 15 2014 - 1 reports

Heartbleed Causes Breach in Canada

Revenue Agency Says Social Insurance Numbers CompromisedThe Canada Revenue Agency reports that 900 taxpayers had their Social Insurance numbers compromised in a breach stemming from a cyber-attacker exploiting the Heartbleed vulnerability in CRA syst ... [Published Government Info Security - Apr 14 2014]
First reported Apr 12 2014 - Updated Apr 12 2014 - 1 reports

Gartner Security & Risk Management Summit

- 26, 2014National Harbor, MDgartner.com/us/securityriskWith national assets in the crosshairs and the severity of potential disruptions growing, government agencies are under pressure to develop cohesive cybersecurity initiatives. To give you the new ... [Published Government Info Security - Apr 12 2014]
First reported Apr 08 2014 - Updated Apr 08 2014 - 1 reports

Application Security: Evolving Threats

Kunal Anand of Prevoty on Evolving ThreatsBy Information Security Media Group, April 8, 2014.Increasingly, organizations are seeing attacks migrate from the network to the application level. How can security leaders ensure they are prepared to handle ... [Published Government Info Security - Apr 08 2014]
First reported Apr 07 2014 - Updated Apr 07 2014 - 1 reports

Health IT Risk-Based Framework Proposed

Agencies' Recommendations Take into Account SecurityFederal regulators have released a long-awaited proposed framework for addressing safety risks involved in using healthcare information technology, including electronic health records and medical devices. ... [Published Government Info Security - Apr 07 2014]
First reported Apr 04 2014 - Updated Apr 04 2014 - 1 reports

Victim Tally in L.A. Breach Doubles

Stolen PCs Stored More Data Than Originally EstimatedThe estimate for the number of victims affected by a recent breach involving a vendor that provides patient billing and collection services to the Los Angeles County departments of health services and ... [Published Government Info Security - Apr 04 2014]
First reported Mar 28 2014 - Updated Mar 29 2014 - 1 reports

DoD Looks Within to Build Cyber Force

Retraining Military Personnel to Become Security SpecialistsDefense Secretary Chuck HagelPetty Officer First Class Chase Hardison is the future face of the cyberdefenders at the U.S. Cyber Command, the military organization charged with defending Defense ... [Published Government Info Security - Mar 28 2014]
First reported Mar 28 2014 - Updated Mar 28 2014 - 1 reports

Target Analysis: Could Have, Should Have

Senate Report Only Scratches the Surface on Mitigating RiskAn analysis of the Target breach prepared for a Senate committee offers about a dozen "could haves" - steps the retailer might have taken to prevent the breach that compromised 40 million credit ... [Published Government Info Security - Mar 28 2014]
First reported Mar 27 2014 - Updated Mar 27 2014 - 1 reports

U.S.-European Union Issue Cyber Accord

Cooperation on Data Protection, Promoting Online Human RightsPresident Obama with leaders of the European Union in Brussels. (EU)Although leaders of the European Union expressed their concerns about the National Security Agency's surveillance programs ... [Published Government Info Security - Mar 27 2014]
First reported Mar 27 2014 - Updated Mar 27 2014 - 1 reports

Report: VA Needs to Improve InfoSec

GAO Study Unveiled as House Committee Drafts VA InfoSec BillThe Department of Veterans Affairs has a list of long-standing information security issues that need to be addressed, including those related to the protection of veteran's health information, ... [Published Government Info Security - Mar 27 2014]
First reported Mar 27 2014 - Updated Mar 27 2014 - 1 reports

RSA Conference 2014

Break the Fraud LifecycleBy Information Security Media Group  |  March 14, 2014Fraudsters continually find new ways to attack, but too many organizations rely on old, unsuccessful methods to detect and prevent fraud. This is the premise, says David Mattos, ... [Published Government Info Security - Mar 27 2014]
First reported Mar 26 2014 - Updated Mar 26 2014 - 1 reports

Canadian Breach: Sorting Out the Cause

Lost Hard Drive Exposed Student Loan InformationA new report from the Office of the Privacy Commissioner of Canada says gaps in carrying out security policies led to the exposure of 583,000 records last year at Employment and Social Development Canada ... [Published Government Info Security - Mar 26 2014]

Quotes

"There are also rules on procurement that force acquisition to proceed at a glacial pace, some rules that make maintenance and upgrade difficult, and rules over access and configuration. The combination makes the job more difficult in some cases."
"Regrettably, the CRA has been notified by the Government of Canada's lead security agencies of a malicious breach of taxpayer data that occurred over a six-hour period" Commissioner Andrew Treusch says in a statement issued April 14
"The average hacker is both incredibly smart and predictably lazy," Anand says. "That means they're armed with automated tools and payloads. Essentially, those adversaries are using these weapons to look for the weakest points to target infrastructures to exploit. Historically, we've seen that applications have become the weakest point."
...FDA intends to focus its oversight on those health IT products that pose a greater risk to patients if they don't work as intended," Patel says. "Higher-risk medical device functions are already regulated by the FDA and would continue to be regulated by the FDA on any platform - for example, mobile."

More Content

All (22) | News (22) | Reports (0) | Blogs (0) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Why Auditors' InfoSec Advice Is Ignored [Published Government Info Security - Apr 16 2014]
Heartbleed Causes Breach in Canada [Published Government Info Security - Apr 14 2014]
Gartner Security & Risk Management Summit [Published Government Info Security - Apr 12 2014]
Application Security: Evolving Threats [Published Government Info Security - Apr 08 2014]
Health IT Risk-Based Framework Proposed [Published Government Info Security - Apr 07 2014]
Victim Tally in L.A. Breach Doubles [Published Government Info Security - Apr 04 2014]
DoD Looks Within to Build Cyber Force [Published Government Info Security - Mar 28 2014]
Target Analysis: Could Have, Should Have [Published Government Info Security - Mar 28 2014]
Report: VA Needs to Improve InfoSec [Published Government Info Security - Mar 27 2014]
U.S.-European Union Issue Cyber Accord [Published Government Info Security - Mar 27 2014]
RSA Conference 2014 [Published Government Info Security - Mar 27 2014]
Canadian Breach: Sorting Out the Cause [Published Government Info Security - Mar 26 2014]
Why Congress Can't Pass Cyber Law [Published Government Info Security - Mar 26 2014]
Report Outlines HIE Privacy Challenges [Published Government Info Security - Mar 26 2014]
FireEye Advanced Threat Report [Published Government Info Security - Mar 25 2014]
Palo Alto Networks to Acquire Cyvera [Published Government Info Security - Mar 24 2014]
LabMD vs. FTC: Legal Battle Continues [Published Government Info Security - Mar 24 2014]
Class Action Suit Filed in L.A. Breach [Published Government Info Security - Mar 19 2014]
On Deck: Healthcare Cyberthreat Updates [Published Government Info Security - Mar 13 2014]
New Arrests in $45 Million ATM Cash-Out [Published Government Info Security - Nov 21 2013]
Banks Skeptical About DDoS Ceasefire [Published Government Info Security - Jan 30 2013]
4 Banks Respond to DDoS Threats [Published Government Info Security - Dec 12 2012]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.