Publication: Government Info Security

First reported Sep 19 2014 - Updated Sep 19 2014 - 1 reports

Senate OK's Cyber Skills Shortage Bill

Senate Passes Cybersecurity Skills Shortage BillMeasure Aims to Boost IT Security Employment at DHSSen. Tom Carper sponsored the legislation.Legislation aimed to help the Department of Homeland Security recruit and retain cybersecurity professionals is ... [Published Government Info Security - Sep 19 2014]
First reported Sep 18 2014 - Updated Sep 18 2014 - 1 reports

HealthCare.gov Security Fixes Promised

CMS Administrator Pledges Completion by Nov. 15CMS Administrator Marilyn TavennerThe Centers for Medicare and Medicaid Services will carry out 28 recommendations made by a government watch-dog agency to improve the security of HealthCare.gov before the ... [Published Government Info Security - Sep 18 2014]
First reported Sep 18 2014 - Updated Sep 18 2014 - 1 reports

Apple iOS 8 Reboots Privacy, Security

Stronger Encryption Offered, But HealthKit DelayedApple has announced a raft of privacy and information security changes tied to the Sept. 18 release of its new iOS 8 mobile operating system.The changes include stronger encryption for more types of data ... [Published Government Info Security - Sep 18 2014]
First reported Sep 11 2014 - Updated Sep 11 2014 - 1 reports

Infographic: What You Need to Know About Backoff

POS Malware Linked to Remote-Access AttacksNew point-of-sale malware known as Backoff has been linked to numerous remote-access attacks, putting smaller merchants at greatest risk. The following infographic from DataBreachToday details what you need to ... [Published Government Info Security - Sep 11 2014]
First reported Sep 10 2014 - Updated Sep 11 2014 - 1 reports

5 Million Google Passwords Leaked

Stolen Credentials Surface on Russian Cybercrime ForumsGoogle users are being urged to change their passwords in the wake of 5 million stolen credentials surfacing on Russian cybercrime forums.Electronic-crime specialist Peter Kruse at CSIS Security Group ... [Published Government Info Security - Sep 10 2014]
First reported Sep 11 2014 - Updated Sep 11 2014 - 1 reports

Global APT Defense Summit New York 2014

Date: October 22, 2014Limited Seats Available - Register TodayAny organization that owns, protects or operates anything of value, it is a target for a cyber-based attack.These attacks, sometimes quick and simple, or lengthy, stealthy and sophisticated, ... [Published Government Info Security - Sep 11 2014]
First reported Sep 09 2014 - Updated Sep 10 2014 - 1 reports

Expectations Low for Cyber Legislation

Cybersecurity Measures Take Back Seat to Other IssuesCongress isn't ignoring cybersecurity as lawmakers return to Washington this week. But it's unlikely the House or Senate will vote on any significant cybersecurity legislation before they adjourn later ... [Published Government Info Security - Sep 09 2014]
First reported Sep 05 2014 - Updated Sep 05 2014 - 1 reports

HealthCare.gov Server Hacked

HHS: No Consumer Data Exposed in IntrusionHackers uploaded malware to a test server for the Obamacare insurance exchange website HealthCare.gov in July, federal officials confirm.The Department of Health and Human Services' Centers for Medicare and Medicaid ... [Published Government Info Security - Sep 05 2014]
First reported Sep 04 2014 - Updated Sep 04 2014 - 1 reports

7 Apple Breach Business Lessons

Why iCloud Hack Should Be Enterprise Wake-Up CallIs an iPhone or iPad, when tied to the Apple iCloud, secure enough for business use?That's one question now facing enterprise information security managers in the wake of the dumps of celebrities' nude ... [Published Government Info Security - Sep 04 2014]
First reported Aug 23 2014 - Updated Aug 23 2014 - 1 reports

1,000 Businesses Hit By POS Malware

DHSity Issues Updated Alert about 'Backoff' ThreatThe Secret Service now estimates that more than 1,000 U.S. businesses have had their systems infected by Backoff, a new point-of-sale malware that has been linked to numerous remote-access attacks (see ... [Published Government Info Security - Aug 23 2014]
First reported Aug 22 2014 - Updated Aug 22 2014 - 1 reports

Germany's Cybersecurity Law: EU Impact

Why Proposed Notification Law Could Shape European DebateThe German government is proposing a law that would require so-called critical infrastructure organizations to report any significant security incidents. Legal experts say the draft cybersecurity ... [Published Government Info Security - Aug 22 2014]
First reported Aug 21 2014 - Updated Aug 21 2014 - 1 reports

Twitter Chat with Gartner's Avivah Litan

Got a burning question about account takeover, retail POS fraud or big data analytics? Would you like to pose that question to one of the industry's foremost financial fraud experts?Join Information Security Media Group for an exclusive #ISMGprotalk Twitter ... [Published Government Info Security - Aug 21 2014]

Quotes

...co-founder and board member of the Center for Internet Security, who has researched the IT security skills shortage in and out of government. "It may make a little bit of difference at the margin but, ultimately, folks of quality are drawn in for reasons other than pay. They can make a lot more money in the private sector, and they always will be able to. So, I'm a little bit skeptical of the claims that pay authority in and of itself will make a difference."
"The weaknesses we identified can all be corrected and resolved immediately" Wilshusen testified. Those weaknesses created "unnecessary risk," he added
..."It's important to take a minute ... to note that this does not mean that the police can't get to your data," Zdziarski says. "What Apple has done here is create for themselves plausible deniability in what they will do for law enforcement."
"Many people expect Google or Apple to take care of you, but they mess up as well," Kjaersgaard says. "People should know that their data will be leaked in some way when they use a digital tool, so they need to take measures into their own hands to keep themselves protected."

More Content

All (21) | News (21) | Reports (0) | Blogs (0) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Senate OK's Cyber Skills Shortage Bill [Published Government Info Security - Sep 19 2014]
HealthCare.gov Security Fixes Promised [Published Government Info Security - Sep 18 2014]
Apple iOS 8 Reboots Privacy, Security [Published Government Info Security - Sep 18 2014]
Global APT Defense Summit New York 2014 [Published Government Info Security - Sep 11 2014]
Infographic: What You Need to Know About Backoff [Published Government Info Security - Sep 11 2014]
5 Million Google Passwords Leaked [Published Government Info Security - Sep 10 2014]
Expectations Low for Cyber Legislation [Published Government Info Security - Sep 09 2014]
HealthCare.gov Server Hacked [Published Government Info Security - Sep 05 2014]
7 Apple Breach Business Lessons [Published Government Info Security - Sep 04 2014]
1,000 Businesses Hit By POS Malware [Published Government Info Security - Aug 23 2014]
Germany's Cybersecurity Law: EU Impact [Published Government Info Security - Aug 22 2014]
Twitter Chat with Gartner's Avivah Litan [Published Government Info Security - Aug 21 2014]
Health Leaders Reply to Senate Query [Published Government Info Security - Aug 15 2014]
IAM and Improving the Customer Experien [Published Government Info Security - Aug 14 2014]
Why Global Internet Governance is Tough [Published Government Info Security - Jul 08 2014]
Internet Explorer Bug: Steps to Take [Published Government Info Security - Apr 29 2014]
Cybersecurity Drill: Lessons Learned [Published Government Info Security - Apr 21 2014]
Heartbleed Causes Breach in Canada [Published Government Info Security - Apr 14 2014]
New Arrests in $45 Million ATM Cash-Out [Published Government Info Security - Nov 21 2013]
Banks Skeptical About DDoS Ceasefire [Published Government Info Security - Jan 30 2013]
4 Banks Respond to DDoS Threats [Published Government Info Security - Dec 12 2012]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.