Posts Tagged ‘department of homeland security’

Tech Tuesday: Department Of Homeland Security Advises Against Using …

Wednesday, April 30th, 2014


Tech Tuesday: Department Of Homeland Security Advises Against Using Internet Explorer
-

Tuesday, Apr 29, 2014


Shaq Mocks Disabled Man
-

Tuesday, Apr 29, 2014


Star Wars: Episode VII Cast Announced
-

Tuesday, Apr 29, 2014


Fuel Prices Fall
-

Tuesday, Apr 29, 2014


Most of Lake Wales Businesses Stolen Equipment Located
-

Monday, Apr 28, 2014


Lakeland Police Department is Seeking Information on Suspects in a Scheme to Defraud a Financial Institution
-

Monday, Apr 28, 2014


Cooking On The Ridge: Lemon Yogurt Cake
-

Monday, Apr 28, 2014


Video: Tornado Rips Through Arkansas Sunday
-

Monday, Apr 28, 2014


Lake Wales Haines City Men Killed In Davenport Accident Overnight
-

Saturday, Apr 26, 2014


Fun Friday = Safe Friday : Distracted Driving
-

Friday, Apr 25, 2014


Don’t Forget to Purge Your Pills Shred Your Stuff This Saturday
-

Friday, Apr 25, 2014


PCSO Undercover Detectives Arrest Wauchula Man for Lewd Activity during Mosaic Peace River Park
-

Friday, Apr 25, 2014


Vehicles Stolen During Business Burglary
-

Friday, Apr 25, 2014


LWPD Ask Drivers To Avoid Hwy 27 Near Mall – Hwy 27
Partially Opened
-

Friday, Apr 25, 2014


Update: Winter Haven Fire Still Causing Road Closure On Cypress Gardens Blvd.
-

Thursday, Apr 24, 2014


Truck Flipped over in Front of Home Depot and Wendy’s on Hwy 27 North
-

Wednesday, Apr 23, 2014


Lakeland Man Arrested in Road Rage Incident
-

Wednesday, Apr 23, 2014


Lake Wales Sr. FFA Fishing Tournament
-

Wednesday, Apr 23, 2014


Wacky Wednesday – 16-Year-Old Survives Unharmed Stowed Away In Wheel Well Of California To Hawaii Flight, Say FBI Officials
-

Wednesday, Apr 23, 2014


Mother Daughter Injured In Rifle Range Rd. Accident
-

Tuesday, Apr 22, 2014

Article source: http://dailyridge.com/headlines-now/2014/04/29/department-of-homeland-security-advises-against-using-internet-explorer/

Energy Pipeline: Cyber attacks strike oil, gas, only as most as retail

Wednesday, April 2nd, 2014

Recent cyber attacks on sell giants such as Target and Neiman-Marcus have been good documented.

The open is utterly wakeful that a new era of malware is causing massacre with U.S. businesses as hackers find to take private financial information.

What a open competence not be wakeful of is customarily how dear and widespread a attacks are.

Cyber crime altogether is costing U.S. businesses $114 billion a year, with another $250 billion mislaid since of stolen egghead property, says a tip National Security Agency official.

Gen. Keith Alexander, executive of a National Security Agency and conduct of a U.S. Cyber Command, says that retailers aren’t a customarily victims. He says that appetite companies — including a oil and gas attention — were targeted in 41 percent of a antagonistic software-attack cases reported to a Department of Homeland Security in 2012.

While these attacks are flourishing and apropos some-more sophisticated, a U.S. has been holding stairs to conduct this off by building tighter confidence and operative some-more closely with unfamiliar officials. To that end, President Barack Obama has sealed an executive sequence to urge cyber confidence for vicious infrastructure, such as a oil and gas industry.

Have those efforts been effective?

Some would contend yes, since there have been no publicly announced cyber attacks by a oil gas attention recently.

But they would be wrong.

Most cyber hacking incidents involving a oil and gas attention are not being reported due to confidence reasons, contend many confidence experts. Therefore, as it seems all is well, customarily a conflicting is true.

That positively appears to be a box in Colorado.

Officials from several oil and gas companies handling in Colorado and Weld County kindly refused to criticism on a problem and how they were addressing it. Those who did were discreet in their comments.

“Unfortunately, we’ve motionless not to answer your questions in good fact for accurately a reason you’re essay a article,” pronounced James Masters, a investment family manager for Bonanza Creek Energy, Inc. “Cyber attacks are consistent and ever-increasing in their sophistication opposite all businesses in all sectors. The hazard is unequivocally serious.

“We have a gifted group of IT professionals that are operative tough to keep a systems protected from conflict and perplexing to stay forward of a hackers. we wish we know a privacy to criticism any further.”

Masters’ regard is real. Cyber attacks could, in theory, means disruptions and outages, do probable repairs to pipelines, refineries and drilling platforms, and bluster attention control systems.

Certainly a attention doesn’t wish to publicize what it’s doing to forestall cyber attacks and inspire hackers to “beat their security.”

No one understands that improved than those on a front line who are perplexing to assistance strengthen a oil and gas industry’s resources and exclusive information.

Ray Hutchins, a boss of Denver-based Denver Cyber Security, says cyber attacks are going on opposite a nation and in Colorado. He pronounced vast oil companies with copiousness of resources have been sensitively going about their business of tightening their security.

Small companies? Not so much, he says.

“My regard is that many of these (smaller) companies are defunct during a wheel,” he said. “You customarily don’t hear from them until after a fact. Very few of them are pro-active.”

There are several reasons since this occurs, Hutchins said.

“It costs income to do this and stockholders wish to see ROI (return on investment),” he said. “And, many companies simply have their IT guys do a work. But, they’re not cyber specialists. They’re network specialists. They can customarily yield patchwork insurance during best.

“The problem with that is, in a box of cyber attacks, we are perplexing to strengthen a climax jewels, to keep a bad guys out. Many people can’t see that.”

Another problem for all sizes of oil and gas companies is a sophistication and stealthiness with that cyber attacks occur.

Hutchins pronounced an advanced, determined conflict competence go on for 3 to 4 months before it’s detected. He combined that, in some cases, it competence never be detected.

“These guys have a lot of ways into a network,” he said. “If they’re doing it right, we competence never know they were there. And, worse, they competence leave a doorway open so they can get behind in another time.”

Cyber conflict history

The appearance of cyber attacks opposite businesses and attention appears to have begun with a Slammer worm in 2003.

However, many experts trust that a origination of a Stuxnet worm in Jul 2010 was a start of vicious attacks on automation systems. It was privately designed to conflict Siemens products. It could download exclusive routine information, make changes to proof in programmable proof controllers (PLCs), and disappear though a trace.

The dictated aim of Stuxnet was a uranium improvement centrifuges in Iran’s chief armaments program. Once a worm had control of a automation system, it reconfigured a centrifuge expostulate controllers and caused a apparatus to destroy itself.

In a U.S., several companies were putrescent by Stuxnet and had their PLCs reconfigured. However, a repairs was slight, causing customarily a few labor issues and shutdowns. Eventually, module rags and anti-virus module were grown to hindrance Stuxnet.

But that customarily non-stop a doorway for other malware.

According to McAfee, a inhabitant cyber confidence firm, Night Dragon was launched in 2008 by China-based hackers to take trusted information from 5 vital Western appetite companies. The hacking continued into early 2011.

Later in 2011, another new malware named Duqu surfaced. It used a lot of a same source formula as Stuxnet. Unlike Stuxnet, that was an information thief, Duqu collected comprehension information and resources from industrial infrastructure and complement manufacturers, privately supportive information like oil margin bids and supervisory control and information merger (SCADA) operations information from appetite and petrochemical companies.

Later that month, Symantec reported that a cyber conflict had been destined during 25 companies concerned in a make of chemicals and modernized materials. Symantec officials pronounced “the purpose of a attacks appears to be industrial espionage, collecting egghead skill for rival advantage.”

While confidence experts determine that cyber attacks on a oil and gas attention will expected outcome in customarily a handful of earthy problems, a attacks will continue since a mechanism systems concerned are not invulnerable. The attacks also will infer dear as pivotal information is lost.

What’s being done?

President Obama’s executive sequence was a start, an vicious step to urge cyber confidence for vicious infrastructure, such as a oil and gas industry.

According to a 2013 news by a Council on Foreign Relations, a sequence educated a Department of Homeland Security, a Department of Justice, and a executive of inhabitant comprehension to share information with operators of privately-owned, vicious inhabitant infrastructure, including oil and gas producers.

The news also says a sequence stretched a Enhanced Cybersecurity Services, a module that shares cybersecurity hazard information with invulnerability contractors and vicious infrastructure companies.

Meanwhile, a oil and gas industry, while not creation a large understanding publicly about what it knows is a “big deal,” is encircling a wagons, so to speak.

It is operative with a Department of Homeland Security, a NSA and several other sovereign agencies.

It is also operative within itself.

A good instance is a two-day convention that took place Mar 26-27 in Houston to plead how oil and gas companies could strengthen their operations.

The seminar, Cyber Security Management for Oil and Gas, was presented by Infocast, a association that produces dozens of seminars for a oil and gas attention any year.

“The discussion was designed to move together cyber confidence experts opposite a oil and gas arena, to yield attendees with frontline believe to successfully grasp and conduct some-more secure systems in a rapidly-changing confidence environment,” pronounced Kathleen Breedyk, a eventuality engineer for Infocast. “The brew of presentations, panels and opportunities for QA (gives) attendees a possibility to review records with their peers and get a latest in best practices — essential to ensuring minimal risk and gripping operations using smoothly.”

Is a attention relocating quick enough, though?

“Not really,” Hutchins added. “So far, a notice (of a problem) is changing. People are articulate about it … though it’s a delayed thing.

“But, it’s in all a best seductiveness to do what we can to strengthen this industry.”



Join a Conversation
View and supplement comments »

A Facebook comment is required

Article source: http://www.greeleytribune.com/news/business/10355602-113/cyber-oil-attacks-security

Homeland Security during risk of mechanism breach

Thursday, December 5th, 2013

Created to guarantee a nation, a Department of Homeland Security is instead carrying problem ensuring a possess computers are stable from hacking and cybersecurity breaches, a new news says.

Agency plans, policies and systems aren’t being updated to simulate a many new threats, a potentially harmful misstep in a ever-evolving universe of online confidence where new threats can cocktail adult overnight, pronounced a agency’s examiner general.

Some DHS cybersecurity discipline date behind to 2008, and “baseline confidence pattern settings are not being implemented for all systems,” investigators said.

In addition, 47 systems are being used but “authority to operate” certificates that safeguard a many present confidence protocols are in place. Of those, 17 are systems that hoop personal tip data.

“This news shows vital gaps in DHS‘ possess cybersecurity, including some of a many simple protections that would be apparent to any 13-year-old with a laptop,” pronounced Sen. Tom Coburn of Oklahoma, a tip Republican on a Homeland Security and Governmental Affairs Committee.

“DHS doesn’t use clever authentication,” he said. “It relies on superannuated program that’s full of holes. Its components don’t news confidence incidents when they should. They don’t keep lane of weaknesses when they’re found, and they don’t repair them in time to make a difference.”

The series of cybersecurity incidents during DHS has risen 17 percent over a past year, information shows, and attacks by some-more modernized antagonistic program have risen 134 percent given 2010.

While a dialect has done many improvements recently, a IG said, many weaknesses remain, including information stored outward DHS firewalls.

The group doesn’t lane what information is being stored in open clouds, inspectors said. Plus, DHS has 67 outmost Internet connectors that could be intensity gateways for hackers to get in.

The astringency of confidence breaches depends on a inlet of a information compromised, pronounced Paul Rosenzweig, a homeland confidence researcher during a Heritage Foundation, a regressive consider tank.

“If it’s a complement that contains all of yours and cave moody information, afterwards I’m a small some-more endangered than if it’s a complement they use to buy H2O bottles for a [airport] screeners,” pronounced Mr. Rosenzweig, a former DHS official.

What’s maybe some-more troubling, he said, is a government’s inability to get a possess affairs in sequence and a justification of a problems sovereign agencies have in procuring IT services and equipment.

“We have not managed to compare a means of purchasing mechanism cybersecurity systems to a dynamic, ever-changing sourroundings that is a cyberspace,” Mr. Rosenzweig said.

Officials during Homeland Security pronounced they are operative to seaside adult a agency’s vulnerabilities.

“DHS has also taken actions to residence a administration’s cybersecurity priorities, that enclosed doing of devoted Internet connections, continual monitoring of a department’s information systems and information that support a DHS mission,” a response from a group said.

Article source: http://www.washingtontimes.com/news/2013/dec/4/homeland-security-at-risk-of-computer-breach/?utm_source=RSS_Feed&utm_medium=RSS

Inver Hills Community College looking for some cyber confidence aces

Sunday, November 3rd, 2013

Inver Hills Community College is looking for a few cyber aces.

The Dakota County college with a nationally regarded mechanism networking record and confidence module is one of a handful of schools hosting a array of cyber-security competitions.

Inver Hills is one of about 15 schools opposite a republic designated by a U.S. Department of Homeland Security as a core of value for cyber confidence training. Minnesota is one of 6 states participating in a Cyber Aces contest.

The Minnesota Cyber Aces foe only began with 110 participants from schools around a state. The margin will be narrowed via a array of tests that cap in head-to-head “net wars.”

When it wraps adult after this propagandize year, tip performers will be invited to an chosen cyber-security training module Inver Hills skeleton to launch in a tumble of 2014.

Kevin Gyolai, a college’s vanguard of STEM, brief for science, technology, engineering and math, pronounced a foe was devised to assistance accommodate a “truly unimaginable high demand” for cyber-security professionals.

“Really, what this is is workforce development,” Gyolai said.

Ben Franske, a highbrow of information technology, pronounced as multitude becomes some-more reliant on computers and a Internet, cyber confidence has turn a flourishing concentration of his students’ studies.

“Security is now partial of everyone’s job,” Franske said.

Franske believes Inver Hills was famous by a Department of Homeland Security since cyber confidence has prolonged been an constituent partial of a college’s IT training. “It has always been baked into a degree.”

That repute helps attract students like Chris Blake of Farmington, who says computing has “always been my passion.”

Blake is participating in Cyber Aces since he believes it offers him real-world, hands-on experiences.

“Hands-on is a best,” Blake said. “It gives people proclivity to keep learning.”

At a finish of a Cyber Aces competition, Gyolai hopes to have dual dozen students enroll in a college’s new Cyber Aces Academy.

Once students finish a modernized certification, they will be competent for high-level computer-security jobs in supervision or business.

Christopher Magan can be reached during 651-228-5557. Follow him during twitter.com/cmaganPiPress.

Article source: http://www.twincities.com/education/ci_24437250/inver-hills-community-college-looking-some-cyber-security

National Cyber Security Month

Wednesday, October 2nd, 2013

October outlines National Cyber Security Awareness month.  The Department of Homeland Security is lifting recognition by enchanting and educating everybody who uses digital technology, either it is during home or during work, to strengthen themselves, their businesses and a country.

 What can we do to be cyber secure?

Set clever passwords, and don’t share them with anyone.  Passwords should enclose top and reduce box letters, numbers and black and should be significantly opposite from prior passwords.

Make certain your mechanism (including a handling system, browser, and other vicious software) are optimized by installing unchanging updates.  You should also run slight pathogen scans on your system.

Use remoteness settings to equivocate pity information for all to see.  Better yet, don’t post a lot of personal information about yourself.

Be discreet about what we accept or review online.  There are many scammers out there perplexing to get your personal information.  They will poise as someone we trust by emailing, job or texting you.  They might know some information about we and wish we to determine it.  They might know zero and go phishing to try and get your personal information.

Remember, if it sounds too good to be true, it substantially is.

Find out some-more ways to stay protected online.

Related Posts:

Article source: http://www.bbb.org/blog/2013/10/national-cyber-security-month/

US mechanism confidence "experts" destroy mice

Wednesday, July 10th, 2013


US mechanism confidence experts destroy mice -

Security experts operative for a US supervision dialect believed that a best proceed to stop a pathogen infecting their complement was to destroy printers, cameras, keyboards, and mice.

The Economic Development Administration (EDA) is an group in a Department of Commerce that promotes mercantile expansion in regions of a US pang delayed growth, low employment, and other mercantile problems.  Clearly it is a arrange of place that does not cruise preparation an option.

In Dec 2011, a Department of Homeland Security warned a dialect that there was a probable malware infection in a systems.  All ideally normal, and many outfits would have finished a pathogen sweep.

The EDA instead adopted a arrange of response not seen given a days of a bubonic plague. It cut a systems off from a rest of a world, disabling a craving e-mail complement and withdrawal a informal offices no proceed of accessing mainly hold databases.

Then it paid for outward confidence contractors to demeanour for malware and yield assurances that not usually were EDA’s systems clean, though also that they were unyielding opposite malware.

The executive found viruses on 6 systems that were private with a pathogen checker, though of march it could not be guaranteed that a complement would never have a pathogen again.

According to Ars Technicathe EDA’s CIO, fearing that a group was underneath conflict from a nation-state, insisted instead on a process of earthy drop of mechanism equipment.

He systematic a drop of uninfected PCs printers, cameras, keyboards, and even mice. The drop usually stopped since a group ran out of income to compensate for destroying a hardware.

The CIO’s final proceed to a sincerely simple pathogen was a slap in a face to a taxpayer. The cost of this occurrence was $2.7 million: $823,000 went to a confidence executive for a review and advice, $1,061,000 for a merger of proxy infrastructure, $4,300 to destroy, $170,500 in IT equipment, and $688,000 paid to contractors to support in a expansion of a long-term response. It took a year for full recovery.

Ironically an review of a failure suggested that a EDA’s systems were so badly managed that a pathogen was a slightest of a worries. Things were so bad that if a Chinese hacker unequivocally had wanted to find out a agencies’ doings for bad regions, they would not have indispensable malware to do it. 

Article source: http://news.techeye.net/security/us-computer-security-experts-destroy-mice

Cyber-attacks opposite US companies on a rise

Monday, May 13th, 2013

A new call of cyber-attacks is distinguished American corporations, prompting
warnings from sovereign officials, including a deceptive one released final week
by a Department of Homeland Security. This time, officials say, the
attackers’ aim is not espionage though sabotage, and a source seems to be
somewhere in a Middle East.

The targets have essentially been energy
companies, and a attacks seemed to be probes, looking for ways to
seize control of their estimate systems. The attacks are continuing,
officials said. But dual comparison administration officials pronounced Sunday that
they were still not certain accurately where a attacks were entrance from,
or either they were state-sponsored or a work of hackers or
criminals.

“We are endangered by these intrusions, and we are
trying to make certain they don’t lead to something many bigger, as they
did in a Saudi case,” pronounced one comparison American official. He was
referring to a assertive conflict final summer that influenced 30,000
computers during Saudi Aramco, one of a world’s largest oil producers.
After extensive investigations, American officials resolved that Iran had
been behind a Saudi Aramco attack.

Another central pronounced that
in a new call of attacks, “most all we have seen is entrance from
a Middle East,” though he did not contend either Iran, or another country,
appeared to be a source.

Last week’s warning was surprising because
many attacks opposite American companies – generally those entrance from
China – have been attempts to obtain trusted information, steal
trade secrets and benefit rival advantage. By contrast, a new
attacks find to destroy information or to manipulate industrial machine and
take over or close down a networks that broach appetite or run
industrial processes.

That kind of conflict is many some-more like the
Stuxnet worm that a United States and Israel personally used against
Iran’s arch improvement plants several years ago, to delayed Iran’s
progress toward a arch weapons capability. When that growth program
began, President Barack Obama, among other officials, voiced worry
that a contingent find could prompt retaliatory attacks.

Two
senior officials who have been briefed on a new intrusions contend they
were directed mostly during a executive systems of about 10 major
American appetite firms, that they would not name. That is identical to
what happened to Saudi Aramco, where a mechanism pathogen wiped information from
office computers, though never succeeded in creation a jump to the
industrial control systems that run oil production.

The Washington
Post initial reported a confidence warning on Friday. Over a weekend
the Obama administration described what had led to a warning. Those
officials began describing a activity as “probes that advise someone
is looking during how to take control of these systems.”

According to
one U.S. official, Homeland Security officials motionless to recover the
warning once they saw how deeply intruders had managed to penetrate
corporate systems, including one that deals with chemical processes. In
the past, a supervision spasmodic approached particular companies it
believed were underneath threat. Last week’s warning “is an bid to make
sure that a volume and timeliness of a information improves,” in
line with a new executive sequence sealed by a president, one senior
official said.

The warning was released by an group called
ICS-Cert, that monitors attacks on mechanism systems that run industrial
processes. It pronounced a supervision was “highly endangered about hostility
opposite vicious infrastructure organizations,” and enclosed a couple to a
prior warning about Shamoon, a pathogen used in a Saudi Aramco
attack final year. It also hinted that sovereign investigations were under
way, referring to indications “that counter vigilant extends beyond
intellectual skill to embody use of cyber to interrupt business and
control systems.”

At Saudi Aramco, a pathogen transposed association data
on thousands of computers with an picture of a blazing American flag. The
conflict stirred a invulnerability secretary during a time, Leon E. Panetta, to
warn of an imminent “cyber 9/11″ if a United States did not respond
more well to attacks. American officials have given resolved the
conflict and a successive one during RasGas, a Qatari appetite company, were
the work of Iranian hackers. Israeli officials, who follow Iran closely,
pronounced in interviews this month that they suspicion a attacks were the
work of Iran’s new “cyber-corps,” orderly after a cyber-attacks that
affected their arch facilities.

Saudi Aramco pronounced that while
the enemy had attempted to dig a oil prolongation systems,
they had unsuccessful since a association confirmed a subdivision between
employees’ executive computers and a computers used to control
and guard production. RasGas pronounced a conflict on a computers had
failed for a same reason.

But there are no transparent standards for
computer security, and a Homeland Security warning final week urged
companies to take stairs many mechanism professionals already advise. The
suggestions were for “things many everybody should be doing on an
everyday basis,” pronounced Dan McWhorter, a handling executive of threat
intelligence during Mandiant Corp. His association conducted a investigate this year
that identified a specific section of a Chinese army as a source of a
number of attacks on American businesses and supervision organizations.
“These are all threats people have been saying entrance for some time,” he
said.

(Also see: Cybersecurity organisation Mandiant goes viral after China hacking report)

Still, a warning underscored that many of a likely
targets in a United States, including cellphone networks and electric
utility grids, are in private rather than supervision hands. “The
challenge will be handling a nation’s descent and defensive
capabilities,” pronounced Evan D. Wolff, a partner during Hunton Williams,
who runs a firm’s homeland confidence use and focuses on
cyber-issues. “Unlike required weapons, this will need a very
broad rendezvous opposite a private sector.”

For a final four
years, a Department of Homeland Security has pronounced it needs to expand
its cyber-security force by as many as 600 hacking specialists to keep
pace with a rising series of threats. But in a final 4 months, the
dialect has been grappling with an exodus of tip officials,
including Jane Holl Lute, a agency’s emissary secretary; Mark
Weatherford, a department’s tip cyber-security official; Michael
Locatis, a partner secretary for cyber-security; and Richard Spires,
the agency’s arch information officer, all of whom resigned.

© 2013, The New York Times News Service

Article source: http://gadgets.ndtv.com/internet/news/cyber-attacks-against-us-corporations-on-the-rise-366407

Former DHS Deputy Under Secretary for Cybersecurity Mark Weatherford Joins … – SYS

Thursday, April 25th, 2013

<![CDATA[

]]>

Coalfire announced
currently that Mark Weatherford, a former tip cybersecurity central at
a Department of Homeland Security, has assimilated a Coalfire Advisory
Board. With decades of cybersecurity experience, Weatherford has vast
believe of a cybersecurity hazard space and vicious infrastructure
protection.

“One of a biggest threats to organizations, open or private, is a
cyberattack,” pronounced Rick Dakin, CEO of Coalfire. “We are propitious to have
Mark fasten a Advisory Board and move his discernment and believe to
a clients, partners and attention associates. Mark has been a Coalfire
client, a devoted confidant to a organisation and an successful suspicion leader
during a tip levels in a industry. We demeanour brazen to his personification an
constituent purpose as partial of a care group relocating forward.”

Weatherford has hold a series of tip IT confidence posts. Before joining
a Department of Homeland Security, he served as clamp boss and
arch confidence officer during a North American Electric Reliability
Corporation. Prior to this position, he was allocated by Governor Arnold
Schwarzenegger to offer as California’s initial Chief Information Security
Officer, and he was also allocated by dual unbroken governors to the
position of Chief Information Security Officer for a State of Colorado.

Weatherford was recently named a Principal in a Chertoff Group, a
tellurian confidence advisory organisation that provides consulting, risk management
and partnership and merger advisory services.

About Coalfire

Coalfire is a leading, eccentric information record Governance,
Risk and Compliance (IT GRC) organisation that provides IT audit, risk
comment and correspondence government solutions. Founded in 2001,
Coalfire has offices in Dallas, Denver, Los Angeles, New York, San
Francisco, Seattle and Washington D.C. and completes thousands of
projects annually in retail, financial services, healthcare, government
and utilities. Coalfire’s solutions are blending to mandate under
rising information remoteness legislation, a PCI DSS, GLBA, FFIEC,
HIPAA/HITECH, HITRUST, NERC CIP, Sarbanes-Oxley, FISMA and FedRAMP. For
some-more information, revisit www.coalfire.com.

Article source: http://www.sys-con.com/node/2631435

Government Watch: County joins Homeland Security module to accelerate …

Wednesday, April 17th, 2013

April 16, 2013

Government Watch: County joins Homeland Security module to accelerate mechanism security


By NewsPress Staff



Stillwater NewsPress
The Stillwater News Press


Tue Apr 16, 2013, 06:00 AM CDT

STILLWATER, Okla. —
Payne County commissioners assimilated a Department of Homeland Security module to accelerate mechanism confidence during a Payne County building and administration building. The plan monitors a mechanism systems for hackers. When a penetrate conflict is detected, a confidence group tries to lessen a affects online. If it can’t, a group is sent to Stillwater.

The county also supposed a $100 concession from Campbell and Associates for highway construction on Yost and Sangre roads.

It also authorized 4 permits to concede tube crossings adjacent to or underneath roads.







Text Only
| Photo Reprints


Copyright
2013
Stillwater NewsPress. All rights
reserved. This element might not be published, broadcast,
rewritten or redistributed.

Article source: http://www.stwnewspress.com/local/x1915233395/Government-Watch-County-joins-Homeland-Security-program-to-bolster-computer-security

Luring Young Web Warriors Is Priority. It’s Also a Game.

Wednesday, March 27th, 2013

“They called my relatives and told my father we was hacking their computers,” Mr. Jaska, 17 years old, recalled. He was grounded and got detention. And he is usually a form a Department of Homeland Security is looking for.

The secretary of that agency, Janet Napolitano, knows she has a problem that will usually worsen. Foreign hackers have been aggressive her agency’s mechanism systems. They have also been bustling perplexing to siphon a nation’s resources and take profitable trade secrets. And they have begun probing a nation’s infrastructure — a energy grid, and H2O and travel systems.

So she needs her possess hackers — 600, a organisation estimates. But intensity recruits with a right skills have too mostly been streamer for business, and those who do select supervision work mostly go to a National Security Agency, where they work on descent digital strategies. At Homeland Security, a importance is on gripping hackers out, or personification defense.

“We have to uncover them how cold and sparkling this is,” pronounced Ed Skoudis, one of a nation’s tip mechanism confidence trainers. “And we have to uncover them that requesting these skills to a open zone is important.”

One answer? Start young, and make it a game, even a contest.

This month, Mr. Jaska and his classmate Collin Berman took tip spots during a Virginia Governor’s Cup Cyber Challenge, a undoubted smackdown of hacking for high propagandize students that was a brainchild of Alan Paller, a confidence expert, and others in a field.

With troops exercises like NetWars, a competition, a initial in a series, had some-more a feel of a video game. Mr. Paller helped emanate Cyber Aces, a nonprofit organisation that was horde of a competition, to assistance Homeland Security, and likens a agency’s need for hackers to a necessity of warrior pilots during World War II.

The office calls for a certain nonconformist attitude. “I like to mangle things,” Mr. Berman, 18, said. “I always wish to know, ‘How can we change this so it does something else?’ ”

It’s a distant opposite office — and a higher-minded one, cordial hackers will contend — than simply defacing Web sites.

“You wish people who ask: How do things work? But a really best ones spin it around,” pronounced Mr. Paller, executive of investigate during the SANS Institute, a mechanism confidence training organization.

It’s no fluke that a thought of regulating competitions came, in part, from China, where a People’s Liberation Army runs hurdles each open to brand a subsequent era of digital warriors.

Tan Dailin, a connoisseur student, won several of a events in 2005. Soon following he put his skills to work and was held violation into a Pentagon’s network and promulgation reams of papers behind to servers in China.

“We have no module like that in a United States — nothing,” Mr. Paller said. “No one is even training this in schools. If we don’t solve this problem, we’re in trouble.”

At Northern Virginia’s acclaimed Thomas Jefferson High School for Science and Technology, that both Mr. Jaska and Mr. Berman attend, there are 5 mechanism scholarship teachers, though nothing focused on security.

When 8 students voiced seductiveness in starting a confidence club, they had to convince a Raytheon worker to accommodate with them once a week. (One thought for a name, a Hacking Club, didn’t last.

“We don’t wish people who are going to go around defacing sites,” Mr. Berman said. They recently rebranded from a Cybersecurity Club to a Computer Security Club. The organisation forsaken a “Cyber” since “it sounds like you’re perplexing to be cold though you’re not,” simplified Mr. Jaska.)

Mr. Jaska and Mr. Berman listened about a Virginia foe by their school. To qualify, they had to brand bad passwords and purify adult confidence settings — a prolonged approach from a Caps Lock program.

Some 700 students from 110 Virginia high schools applied, though usually 40, including Mr. Jaska and Mr. Berman, done a cut.

So, 3 weeks ago, a span trafficked to a Governor’s Cup Cyber Challenge during George Mason University.

There, they found something they frequency confront in high propagandize — a abounding village of like-minded teenagers, a best and brightest of a rarely specialized task.

Article source: http://www.nytimes.com/2013/03/25/technology/united-states-wants-to-attract-hackers-to-public-sector.html?pagewanted=all