DDoS attacks on U.S. banks will continue, and community institutions may well be the next major targets. Rodney Joffe of Neustar offer tips for how smaller institutions can assess DDoS risks and improve DDoS mitigation.
In an interview about DDoS threats and defenses, Joffe discusses:
Why community banks must...
An HHS inspector general report on the shortcomings of a government contractor's USB drive security practices is a reminder of why all healthcare organizations need to control the use of mobile storage media and ports.
Researcher Billy Rios and a partner found password vulnerabilities in 300 medical devices, prompting the Department of Homeland Security to issue a security advisory to device manufacturers, healthcare facilities and users.
My colleagues and I often need access to company-related social network sites in the course of gathering evidence. The last thing we want is a dispute over who owns a site and who can regulate access to it.
The FDA has issued draft guidance urging medical device makers to develop cybersecurity controls. It has also released tips for how healthcare organizations can mitigate cybersecurity risks to devices.
Having the right log and access management tools in place - and not all tools are used by all agencies at all times - doesn't mean that the proper authorities are alerted in a timely manner to activities that could jeopardize the nation's security.
Collecting massive amounts of data on individuals, whether in the government or private sector, has become the norm in our society. It's not quite Orwellian, but it's a situation we might have to learn to live with.
As they develop mitigation strategies, organizations must keep in mind that all cyber-attacks, ranging from DDoS to phishing, ultimately aim to compromise data - and they virtually all are advanced and persistent.