Jun
30

A security checklist for SCADA systems in the cloud

From: GCN

By Patrick D. Howard, (ISC)2 Government Advisory Council Executive Writers Bureau

Given the critical nature of operations that supervisory control and data acquisition (SCADA) systems manage, an article containing the words “cloud,” “SCADA” and “vulnerabilities” together should raise the hair on the necks of information security professionals.

Traditionally, SCADA applications used to control critical infrastructure have been hosted within an organization’s IT infrastructure and have relied on the protection offered inside the infrastructure perimeter. In some cases, organizations have “air gapped” their SCADA applications from the broader network and particularly from the Internet.

Read Complete Article

Jun
25

GAO: Recent Data Breaches llustrate Need for Strong Controls across Federal Agencies

Editor’s Note: The following is from GAO’s Testimony before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, Committee on Homeland Security, House of Representatives. The complete Tesimony may be found here. The following is an excerpt.

From: GAO

Statement of Gregory C. Wilshusen, Director, Information Security Issues

Our final report is expected to be released later this year, and our preliminary observations include the following:

Jun
24

FSGG Subcommittee Hearing: OPM Information Technology Spending & Data Security

From: United States Senate Committee on Appropriations

Tuesday, June 23, 2015

FINANCIAL SERVICES AND GENERAL GOVERNMENT SUBCOMMITTEE (John Boozman, Chairman)

Hearing to review information technology spending and data security at the U.S. Office of Personnel Management

Witnesses:

Ms. Katherine Archuleta, Director, U.S. Office of Personnel Management

Mr. Michael Esser, Assistant Inspector General – Audits, U.S. Office of Personnel Management

Mr. Richard Spires, Chief Executive Officer, Resilient Network Systems, Inc.

Webcasts:

FSGG Subcommittee Hearing: OPM Information Technology Spending & Data Security

Chairman Boozman Opening Statement

OPM Director Archuleta Testimony

Jun
23

The importance of education in solving today’s corporate security issue

From: Australian Broadcasting Corporation

By Anthony Stitt

When it comes to security, the long-standing saying that education is the great equaliser often tends to be put on the back burner. Organisations focus on technology rather than addressing a common root cause – people. While security issues cannot be addressed without technology, organisations also need to consider how education can address the people problem.

***

Jun
22

“EPIC” fail—how OPM hackers tapped the mother lode of espionage data

From: ars technica

Two separate “penetrations” exposed 14 million people’s personal info.

by

***

While OPM instituted continuous monitoring of some systems using security information and event management (SIEM) tools, those tools covered only 80 percent of OPM’s systems according to a fiscal year 2014 audit by OPM’s Internal Office of the Inspector General (OIG) audit team. And as of October 2014, monitoring didn’t yet include contractor-operated systems, according to the same organizational oversight.

Jun
17

Why You Might Want To Encrypt Your Syslogs Now

From: IT Jungle

by Alex Woodie

Every day millions of IBM i server events are packaged up in the syslog standard and sent offsite for safekeeping and analysis. In many cases, the syslog files are sent in plain text across the wire because, hey, they’re just boring old log files, and what could anybody ever do with those, right? Wrong, says IBM i security software company Raz-Lee Security.

Syslogs are a bread-and-butter data format for IT professionals around the world. Just about every device in the data center uses the syslog format to transmit data about what it’s done. All sorts of IT activities are documented in syslog, from debugging applications and general systems management to real-time network alerts and security auditing.

Jun
12

Report: Hack of government employee records discovered by product demo

From: ars technica

Security tools vendor found breach, active over a year, at OPM during sales pitch.

by

As officials of the Obama administration announced that millions of sensitive records associated with current and past federal employees and contractors had been exposed by a long-running infiltration of the networks and systems of the Office of Personnel Management on June 4, they claimed the breach had been found during a government effort to correct problems with OPM’s security. An OPM statement on the attack said that the agency discovered the breach as it had “undertaken an aggressive effort to update its cybersecurity posture.” And a DHS spokesperson told Ars that “interagency partners” were helping the OPM improve its network monitoring “through which OPM detected new malicious activity affecting its information technology systems and data in April 2015.”

Jun
12

Intelligence Surveillance and Reconnaissance (ISR) – Enabling Technologies (ET)

From: FedBizOpps.Gov

Solicitation Number: BAA-HNJJ-15-0001
Agency: Department of the Air Force
Office: Air Force Materiel Command
Location: AFLCMC – Hanscom

Synopsis:

Added: Jun 10, 2015 2:12 pm

The objective of the Air Force Command Control Communications Intelligence & Network (C3I&N) Special Programs Division is to acquire, develop, and integrate advanced intelligence, cyber, and classified solutions for the Air Force, Department of Defense, and National Agencies. The Division champions the nation’s most sensitive C3I&N and Battle Management (BM) capabilities, and develops acquisition transition paths to support warfighting requirements.

Jun
10

The Biggest Cyber Threat Is Inside Your Company

From: CFO

Data theft by insiders is rampant but usually not discovered until after they’ve left.

***

All these cyber threats are real and need to be addressed — but there’s a threat closer to home that too often gets ignored and that continually drives information security experts to distraction.

***

Jun
09

Five ways SCADA security should be improved

From: Information Age

Given the challenges of SCADA systems, what can be done to improve the security of critical infrastructure?

by Chloe Green

SCADA attacks are on the rise, according to the 2015 Dell Security Annual Threat Report released this week. The report found that in 2014 the number of attacks on Supervisory Control and Data Acquisition (SCADA) systems doubled compared to the previous year. Most of these attacks occurred in Finland, the United Kingdom, and the United States, probably due to the fact that in these countries SCADA systems are more likely to be connected to the Internet.

Older posts «