Multi-State Information Sharing and Analysis Center's new cybersecurity operation center near Albany, N.Y., should help state and local governments more effectively identify, prevent and mitigate cyber incidents, MS-ISAC founder Will Pelgrin says.
An (ISC)2 survey suggests that a Commission on Cybersecurity for the 44th Presidency paper backs a government-run board to oversee IT security certifications, a point disputed by the report's author. Where does the truth lie?
"The first question they are going to ask the external provider is: 'What kind of procedures will you follow for physically securing the servers, for assuring the authenticity of the log-in, for security of the data during transit to and from your site?'" IBM's Dave McQueeney says.
The evolution of IT security requires human ingenuity. Machines are fast but dumb, yet using human brainpower can help reject quickly harmful traffic aimed to damage critical IT systems, says Phyllis Schneck, McAfee CTO/public sector.
The possibility grows that hackers could take away control of the car from drivers as more automakers provide vehicle-to-vehicle and vehicle-to-infrastructure communications networks to third-party development.
The U.S. reliance on the magnetic stripe is having global consequences. European countries that have made the shift EMV say they are suffering from higher-than-ever incidents of ATM skimming because of the lingering mag stripe.
By exploiting high-risk vulnerabilities, hackers could attack public-facing computers to enter the websites and gain access to sensitive data, such as password, take control of a server and attack other computers on DOT's networks, DOT's IG says.