No More F.U.D. (Fear, Uncertainty, Doubt) about Cyber Threats

I’m fed up. Better yet, I’m “F.U.D.-ed” up.  In every cybersecurity conference, in every threat report, in every blog and every bit of cybersecurity marketing literature I see one tiresome theme:  “The bad guys are after us!  It’s getting worse every day!  How will we fix it?  Can we fix it?  There’s no magic bullet! The cyber sky is falling, run for your cyber life!”  In other words, an unrelenting stream of– Fear, Uncertainty, and Doubt.

New: Your Guide to Government's Critical Cyberthreats!

Data leaks, data breaches, blah, blah, blah. Sometimes the attention-grabbing headlines just sound like too much noise.

What’s lacking in most of today’s reporting is the real truth about how government agencies are hacked and what agencies are doing to counter those attacks. Those are the details that can help agencies improve their defenses to face future challenges.

One Year from the OPM Breach: How the Federal Cybersecurity Landscape is Changing

It’s been nearly one year since the Office of Personnel Management (OPM) first noticed that it had been the target of the largest ever cybersecurity attacks on the U.S. government. That was April 2015 (it wasn’t until June 2015 that OPM actually disclosed the breach).

OPM aside, 2015 was a challenging year for the U.S. government’s cyber defenses – 67,000 system intrusions were detected and a record $12.5 billion was spent defending itself against attack.

IT Modernization a Top Threat to Federal IT Security

DLT partner, SolarWinds recently announced the results of its third annual Federal Cybersecurity Survey, which explores the biggest barriers to improving IT security, including exposure during consolidation and modernization processes, threats from foreign governments and careless or untrained insiders.

Top of the list? IT modernization. In fact, almost half of the government’s IT modernization and consolidation efforts have resulted in an increase in security challenges.

The Past, Present and Future of Network Access Control (NAC)

Network Access Control (NAC), ensures proper configuration and security posture on devices trying to access a network.  It’s been around for a while, but acquired a bad reputation in its early days.  I remember looking at some NAC solutions when they first hit the market, years ago, and they were expensive, clumsy, and more likely to keep out good folks than bad actors.  However, that was then, and this is now.  Let’s take a look at NAC today.  First, I’ll review fundamental technologies and concepts.