Cyber incidents are escalating in frequency, duration, and complexity, and the Securities and Exchange Commission (SEC) is planning to issue new cybersecurity disclosure rules, which are needed to help prevent “Information failure.”
The infamous Tommy-gun toting John Dillinger was once asked why he robbed banks. He responded, “Because that’s where the money is.” That simple logic is similar to the thinking of government leaders, like DHS Secretary Jeh Johnson, who are looking to California as a vault holding a priceless commodity—a high-tech workforce.
In Security Debrief’s sixth annual April Fools coverage, we’ve collected stories the rest of the media somehow missed…
By Gary Warner
Vincent R. Stewart, Lieutenant General, U.S. Marine Corps was promoted into the position of Director of the Defense Intelligence Agency. General Stewart represents the first time we have a true cyber warrior at the helm of the DIA. On February 3, 2015, Lt. General Stewart delivered his first Worldwide Threat Assessment to the Senate Armed Services Committee. So what did our new DIA Cyber Warrior leader have to say about Cyber threats?
By most objective measures, 2014 was not a good year for the Department of Homeland Security. As we enter 2015, I sense there is a slight bit of subjective optimism that, under the leadership of DHS Secretary Jeh Johnson, things are getting better. Here are the opportunities (and potential challenges) for the Department in 2015.
Twelve years ago last week, President Bush signed the act creating the Department of Homeland Security. It came into formal existence on March 1, 2003. Anniversaries are days to reflect on broader issues, and it is a good time to reflect on what has occurred since DHS was created – and what that means for the Department’s current and future missions and challenges.
By David Z. Bodenheimer
The U.S. federal government’s acquisition rules and buying practices have a direct impact upon major segments of the U.S. and global marketplaces. Cybersecurity Executive Order 13636 and Presidential Policy Directive 21 both recognize that the federal acquisition process must be addressed as part of the overall federal strategy for enhancing cybersecurity. It is time to harmonize the cyber acquisition regulations.
Increasing adoption of cyber insurance products and frequent cyber-related initiatives across the insurance and risk world has been incredibly positive. Yet, many companies that are not consumer-facing are struggling with the insurability of their increased exposure. The insurance industry needs to embrace this evolving reality.
The oddly named cyber vulnerability, Heartbleed, is everywhere in the tech news. Even non-tech security types recognize the seriousness of this issue. What is the bumper sticker version of Heartbleed, and what does it teach us? While the Open Source aspects of the Internet yield incredible innovations, they also open up vulnerabilities.