The video gaming company Sega says it brought down its online Sega Pass gaming because of unauthorized entry of its database, in which hackers obtained some members' e-mail addresses and encrypted passwords.
Hitch encouraged agencies to be proactive in combating virtual threats, and created an IT security operations center that brought together IT assurance and operations experts . "It makes assurance operational," he says.
It's not easy to read into LulzSec's motivation. They seem intolerant of those who know the rules but fail to follow them, such as IT security professionals who reuse passwords. They're brazen, and they're in it for the laughs.
Organizations are starting to adapt to cloud computing, but they're hesitant about placing their core assets in the online environment, according to results from the 2011 ISACA IT Risk/Reward Barometer.
Kundra joined the Obama administration in March 2009 as administrator for e-government and IT at OMB and given the additional title of chief information officer, the first person to officially hold that post.
"While securing energy, financial, health and other resources remain vital, the future of the innovation and the economy will depend on the success of Internet companies and ensuring that these companies are trusted and secure is essential," Commerce Secretary Gary Locke says.
Recent hacks have uncovered security vulnerabilities that should have been addressed years ago. "These attacks are going to escalate," says Josh Corman of The 451 Group. But organizations can implement basic steps to make the hackers' job harder.
"Overall, this draft is not balanced," Rep. Henry Waxman, D-Calif., said at a hearing on the measure "It gives businesses too many protections and consumers not enough. It preempts strong state laws and replaces them with a weak federal one."
Senate Sergeant at Arms confirms the attack occurred over the weekend and has ordered a review of all Senate computer sites. Hackers' cryptic message suggests they don't like military's intent to use force to combat cyberattacks.
Who's behind the International Monetary Fund breach? Some observers suggest the attack could have been waged by a government to access confidential information about the financial stability of certain global markets.