It's not enough to recover data after an incident; also essential is restoring the software needed to read the data, as Federal Emergency Management Agency has learned. The inspector general explains it all.
"Once you get over the idea that we don't have permanent world peace, and people may need to attack each other in particular circumstances ... then maybe there's a lot of good things to say about cyberweapons," says Peter Sommer of the London School of Economics' Information Systems and Innovation Group.
Homeland Security Secretary Janet Napolitano says the government will fully deploy the Einstein 2 threat detection system by year's end and will begin implementing in 2011 Einstein 3, with the aim to automatically detect and disrupt malicious cyber activity.
When a database breach occurs, consumer notification continues to be a public problem, and it's time for the federal government to step in, says Linda Foley, co-founder of the non-profit Identity Theft Resource Center.
The hospital that is treating Rep. Gabrielle Giffords, D-Ariz., and other victims of the Jan. 8 shooting incident in Tucson, Ariz., has fired three staff members for inappropriately accessing confidential medical records.
The hospital that is treating Rep. Gabrielle Giffords, D-Ariz., and other victims of the Jan. 8 shooting incident in Tucson, Ariz., deserves accolades not only for its care for the victims, but also for calling attention to an important privacy issue.
WikiLeaks founder Julian Assange has become akin to a "cyber messiah," Hemu Nigam says. And Assange's followers have proven: "If you turn your back on our messiah, we are going to take you down."
Ohio State University says unauthorized individuals accessed a server containing personal information of some 760,000 former and current faculty, staff, students and applicants, exposing names, Social Security numbers, dates of birth and addresses.
The recent WikiLeaks release of thousands of sensitive government documents puts security leaders on notice: The breach threat is real, and no organization is immune.
Hemu Nigam says WikiLeaks founder Julian Assange has become akin to a "cyber messiah" And Assange's followers have proven: "If you turn your back on our messiah, we are going to take you down."
"With the right people, process and technology, you could be able to put a system together that would greatly reduce the impact these types of attacks have," says cybersecurity expert Eric Cole, a SANS Institute faculty fellow.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.