The increasing sophistication of cyberattacks and the emerging threat of ransomware are placing a new premium not only on high-level technical skills but on bold, effective leadership. “Each day, the cyber threat landscape changes, and our attackers are unrelenting,” said Rob Potter, vice president of the Americas for Symantec. […]

Ransomware attacks, which the FBI estimated could cost the United States $1 billion this year, have “become a real plague on the Internet,” according to Sen. Sheldon Whitehouse, D-R.I. As these attacks are becoming more sophisticated and destructive, the Senate Committee on the Judiciary addressed whether law enforcement has the right tools to foil them. […]

The sun could pose the largest digital security risk to U.S. critical infrastructure, according to witnesses at a House Oversight and Management Efficiency Subcommittee. “All critical infrastructure sectors are at risk from EMP [electromagnetic pulse],” said Brandon Wales at DHS. […]

A cyber vulnerability known to have existed as far back as October 2015 has led to a data breach at the General Services Administration’s 18F digital services organization, the GSA’s inspector general announced today. […]

Cyber espionage group Pawn Storm has launched further attacks on U.S. allies, Trend Micro reported. Pawn Storm last month targeted Germany for a second time, through an attack on the German Christian Democratic Union, Chancellor Angela Merkel’s political party. […]

The 2016 Symantec Government Symposium is coming up on Aug. 30, and its Cyber Awards deadline is June 1. The Cyber Awards recognize individuals who show excellence and leadership in government cybersecurity through individual contributions to programs that protect critical data and systems. […]

Content management company Box unveiled its Box for Government initiative, which brings together different product suites designed for government and enables agencies to work remotely, collaboratively, and with an assurance of security. Box for Government has already received a FedRAMP Provisional Authority to Operate (P-ATO) from the Defense Information Systems Agency. […]

There seems to be no middle ground in the Internet surveillance versus privacy dispute. The two sides found little to agree on at a debate hosted by the Hudson Institute. David Rivkin, a constitutional law attorney, said government surveillance “has to be indiscriminate. … We have to surveil more.” […]

Law enforcement reported an increase in ransomware attacks during 2015, and it looks like these attacks will continue throughout 2016. To deal with the rising threats, the FBI posted recommendations. “These criminals have evolved over time and now bypass the need for an individual to click on a link. They do this by seeding legitimate websites with malicious code, taking advantage of unpatched software on end-user computers,” said James Trainor, the FBI Cyber Division Assistant Director. […]

Cyber hygiene is essential for combating the modern, professional hacker, according to Symantec Security Response director of project management Kevin Haley. “When cyber criminals work in call centers, write documentation, and take the weekend off, you know it’s a profession,” he said. […]

cybersecurity

Connecticut, Illinois, Louisiana, Nevada, and Oregon will participate in a policy academy on developing and implementing comprehensive cybersecurity strategies, the National Governors Association announced. “Threats to our cybersecurity remain one of the most significant homeland security challenges facing the nation,” said Virginia Gov. Terry McAuliffe. […]

The new reality of elections in the United States is a return to paper ballots. They’re a semi-high-tech optical scan ballot that is first marked by the voter and then processed by an optical scanner to tabulate the votes. […]

Many cars on the road contain dangerous cybersecurity flaws, according to a Government Accountability Office (GAO) report that identified three major types of security flaws: direct access, short-range wireless, and long-range wireless. […]

MeriTalk Executive Editor Dan Verton discusses the theme of this year’s Akamai Government Forum—Safeguarding a Dynamic Government—with Akamai CEO Dr. Tom Leighton. During his keynote address, Leighton offered a unique look at the future of the Internet and security. […]

Speed and communication are key elements to effective threat intelligence in the government, according to panelists at the Akamai Government Forum. “It’s a team sport. We really need to work together,” said Renee Tarun of the NSA. […]

Consumers comprehensively think that more needs to be done to protect their data, according to a study published by Purple Insights on behalf of ACT the App Association. But do they trust government or tech companies more? […]

The National Association of State Chief Information Officers issued a “planning guide” to help states deal with a cyber disruption. Cyber disruption response planning is essential, the report said: “Ignore at your own peril.” […]

cyber threat

Cyber criminal attack groups have increased their skills, staff, and resources in the past year, making their capabilities close to those of nation-state attackers, according to Symantec’s 2016 Internet Security Threat Report . It provides an overview and analysis of the past year in global threat activity, including emerging trends in attacks, malicious code activity, phishing, and spam. […]

Internal Revenue Service cybersecurity is woefully inadequate, and Congress is to blame, according to Sen. Ron Wyden, D-Ore. “Congress has sat back and watched while criminals have come in and preyed on taxpayers,” Wyden said at a Senate Finance Committee hearing. […]

Secretary of Defense Ash Carter is considering recommendations for a major reorganization of the Defense Department that would make U.S. Cyber Command a full combatant command similar to the U.S. European Command or the U.S. Special Operations Command. […]

Cyber Command’s influence may not be as expansive as some think, according to its commander, Adm. Michael Rogers. “The Department of Defense is not resourced, nor is it tasked with defending every single computer structure in the U.S.,” he said. […]

HID security card readers have a potentially disastrous vulnerability in their access control panels, according to Steve Povolny, senior manager for TippingPoint DVLabs at Trend Micro. TippingPoint’s Zero Day Initiative team discovered the vulnerability, and warns that the system could present a real security threat, as many are located in hospitals, airports, and government offices. […]

The U.S. Small Business Administration is teaming up with major technology companies to form the Small Business Technology Coalition, which is designed to connect small businesses with technology platforms and training. The coalition will include Amazon, Box, Facebook, LegalZoom, Microsoft, Salesforce, and Zenefits. […]

Categories