Capitol Hill riot exposes Congress’s operational and cybersecurity frailties

The violent pro-Trump mob that stormed the Capitol on Wednesday exposed not only glaring weaknesses in the legislative body’s physical security but also its digital and operational security, according to experts. The intruders were able to roam the halls of Congress and at certain points had unfettered access to some lawmakers’ offices and computers. One rioter left a note in front of a computer in House Speaker Nancy Pelosi’s office saying, “We will not back down.” Sen. Jeff Merkley, D-Ore., said a laptop was stolen from his office. There is no public evidence that devices were tampered with. But some experts are hoping that, in addition to a likely investigation into the failures of physical security measures, lawmakers take the opportunity to review their own digital security practices, which have long been a concern. The insurrectionists who breached the Capitol were unsophisticated opportunists who were more interested in taking selfies […]

The post Capitol Hill riot exposes Congress’s operational and cybersecurity frailties appeared first on CyberScoop.

Continue reading Capitol Hill riot exposes Congress’s operational and cybersecurity frailties

Cybersecurity Lessons from the Pandemic: Protection

To paraphrase an old saying: “One person’s prevention is another person’s protection.” This may well apply to the wearing of masks during the pandemic, the efficacy of which is still being hotly debated by some. Having gone through various iterations, … Continue reading Cybersecurity Lessons from the Pandemic: Protection

Businesses Will Buy Down Risk With Defense-in-Depth – 2020 Trend #5

As 2019 came to an end, Imperva CTO Kunal Anand began working with our global research team, Imperva Labs, to put together a list of the most important cybersecurity issues security leaders should be prepared for in 2020. He published his list in the b… Continue reading Businesses Will Buy Down Risk With Defense-in-Depth – 2020 Trend #5

Defense-in-Depth: Key for Healthcare Data

Healthcare organizations must adopt defense-in-depth strategies to keep information protected at all times A study conducted by IBM revealed that it takes nearly a year for the healthcare industry to identify and contain a data breach. To reduce the a… Continue reading Defense-in-Depth: Key for Healthcare Data

A Web-Driven World Needs Better Web Security

Web interfaces are everywhere. From social media sites to online shopping portals to your CRM, the humble web interface is now used to access much of the online world. So, it isn’t difficult to see why web applications are a prime target for cybe… Continue reading A Web-Driven World Needs Better Web Security

Now’s the Time to Shift From Defense in Depth to Security in Depth

In today’s threat landscape, where many cybercriminals are sophisticated enough to circumvent layered safeguards, the old defense-in-depth approach is due for an upgrade.

The post Now’s the Time to Shift From Defense in Depth to Security in Depth appeared first on Security Intelligence.

Continue reading Now’s the Time to Shift From Defense in Depth to Security in Depth

Defense in Depth: Securing the New Network Edge

A new hardware-based defense-in-depth security strategy could better protect against east-west attacks The use of application-level network segmentation is growing in popularity to protect enterprise data center servers as they become the new network … Continue reading Defense in Depth: Securing the New Network Edge

Let’s Make 2019 the Year of Fewer Records Compromised in Data Breaches

A notable takeaway from the report was that despite fewer reported data breaches, 2018 witnessed a 126 percent uptick in the number of records breached containing personally identifiable information.

The post Let’s Make 2019 the Year of Fewer Records Compromised in Data Breaches appeared first on Security Intelligence.

Continue reading Let’s Make 2019 the Year of Fewer Records Compromised in Data Breaches

Here’s What You Need to Know to Secure Your IoT Projects

Securing IoT projects requires a thorough understanding of your technology infrastructure, its services and components, and how they relate to each other.

The post Here’s What You Need to Know to Secure Your IoT Projects appeared first on Security Intelligence.

Continue reading Here’s What You Need to Know to Secure Your IoT Projects