identity management-min

A new report released today from One Identity found that Federal agencies lack basic elements of cyber hygiene. The study, conducted by Dimensional Research and sponsored by identity and access management (IAM) solutions provider One Identity found that “while agency leaders recognize IAM’s importance, the majority of agencies have yet to fully adopt recommended guidelines into their cybersecurity program and some even feel their current approach distracts from agency missions.”






[…]

Cyber America Connected Internet of things

As Federal agencies seek to incorporate an application programming interface (API) strategy into their IT modernization initiatives, a word of caution: make sure you have API-specific security integrated into your IT infrastructure.






[…]

Internet of Things IoT Data Architecture diagram

The Aspen Cybersecurity Group (ACG), which was formed last year by the Aspen Institute think tank to “translate pressing cybersecurity conversations into action,” has issued several policy recommendations to bolster the security of internet of things (IoT) devices including suggesting that device manufacturers invest more in building in better security, and that manufacturers be held accountable for the security of devices that they make.






[…]

chip hack cybersecurity cyber

The North Korean hackers known as Lazarus Group are now stealing from ATMs to the tune of tens of millions of dollars, according to research Symantec released Thursday.






[…]

Synack, a crowdsourced security testing firm, announced Thursday the launch of its Synack Veterans Cyber Program which will “recruit, empower, and deploy veterans in the cybersecurity industry.”






[…]

World globe trade

The Global Commission on the Stability of Cyberspace (GCSC)–a group formed last year to promote international stability by developing policy proposals and norms to guide responsible state and non-state behavior in cyberspace–on Thursday issued a set of six global norms that the group hopes will promote “the peaceful use of cyberspace.”






[…]

Kirstjen Nielsen DHS

Following President Trump’s proclamation of November as National Critical Infrastructure Security and Resilience Month, Secretary of Homeland Security Kirstjen M. Nielsen released a statement on Wednesday saying she and DHS are “committed to strengthening our efforts to protect and secure the infrastructure on which Americans rely, in close partnership with other Federal agencies, state, local, territorial and tribal governments, and the private sector.”






[…]

NIST

The National Cybersecurity Center of Excellence (NCCoE), a partnership of the National Institute of Standards and Technology (NIST) and the state of Maryland, is seeking public comment by Dec. 6 on a draft report (NISTIR 8219) detailing cybersecurity guidance aimed at the manufacturing sector that employs industrial control systems to monitor and control physical processes.






[…]

Cybersecurity cyber

A report from the Carnegie Endowment for International Peace released Wednesday found that “harnessing the full potential of cyber insurance will be imperative for preventing systemic cyber incidents of concern for governments and the private sector alike.”






[…]

DHS Homeland Security

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) announced today that it issued $1,272,320 of funding awards to develop new solutions to “improve the capability of organizations to understand and improve their cybersecurity control investment decisions.” The funding will be split between University of California, San Diego and University of Illinois, Chicago.






[…]

The demand for cybersecurity professionals is growing, according to data published Wednesday on CyberSeek, a free online resource from the National Institute of Standards and Technology (NIST), Burning Glass, and CompTIA.






[…]

Department of Homeland Security DHS

As Federal government agencies continue their methodical march to IT modernization spurred on by congressional and administration mandates, two senior Department of Homeland Security (DHS) IT officials emphasized today the importance of the needs of core agency missions in leading those efforts.






[…]

DCOI data center server room infrastructure hyperconverged cloud storage architecture

New guidance for the Data Center Optimization Initiative (DCOI) will likely include revised performance goals for agencies, revised metrics for energy metering and virtualization, and new metrics for under-utilized servers, availability, and old hardware, said Jake Wooley, IT sustainability program manager at the Department of Energy (DoE), during MeriTalk’s 2018 Data Center Brainstorm.






[…]

Iran

On Nov. 5, the United States implemented sanctions against Iran, which the Treasury Department described as the “largest ever single-day action targeting the Iranian regime.” While the sanctions were ostensibly targeting Iran’s growing nuclear program, the Foundation for Defense of Democracies (FDD), a think tank which vacillates between nonpartisan, hawkish, and neoconservative in terms of its political leanings, argued in a report released Tuesday that the United States should be concerned about the cybersecurity implications of the new sanctions.






[…]

election voting

Cybersecurity firm Morphisec said that 63 percent of 1,000 Americans that it surveyed in late October regarded the threat of “adversaries propagating misinformation on social networks” as a “more significant threat” to the U.S. midterm elections than possible cyber attacks against voting infrastructure.






[…]

The White House is looking to finalize its new Cloud Smart policy following the release of a draft at the end of September. Agencies and other stakeholders have been given just over a month to express how to make improvements to the new policy.






[…]

voting booth, election security

Wisconsin Gov. Scott Walker last Friday requested that Maj. Gen. Donald Dunbar, adjutant general of Wisconsin, put the state’s National Guard cyber response teams on standby ahead of the midterm elections.






[…]

elections, election security, voting