Former U.S. Army contractor sentenced to prison for destroying IT system

A federal contractor who worked on a U.S. Army IT system was sentenced to two years in prison on Friday for illegally accessing his employer’s network, stealing servers and proprietary information, and causing damage that resulted in more than $1 million in losses. Barrence Anthony, 40, worked for Federated IT, a federal contractor that provides IT services to government agencies. In this case, Federated IT provided services to the Office of the Army‘s Chaplain Corps, according to an affidavit obtained by CyberScoop. Federated IT was specifically working on building and managing a SharePoint instance for the corps hosted on Amazon Web Services. According to the affidavit, Anthony accessed the AWS instance on which the corps system was located after his employment was terminated on Dec. 8, 2016. Shortly thereafter, Anthony made backup versions of the system and moved the duplicates to his own AWS account. Later that night, Anthony logged back into […]

The post Former U.S. Army contractor sentenced to prison for destroying IT system appeared first on CyberScoop.

Continue reading Former U.S. Army contractor sentenced to prison for destroying IT system

How Data Loss Prevention (DLP) Can Help Solve the Insider Threat Problem

Reading Time: 3 minutes A data loss prevention (DLP) solution that delivers comprehensive visibility, historical context and file recovery can help organizations meet the challenges posed by insider threats.

The post How Data Loss Prevention (DLP) Can Help Solve the Insider Threat Problem appeared first on Security Intelligence.

Continue reading How Data Loss Prevention (DLP) Can Help Solve the Insider Threat Problem

11 Ways Employees Can Be Your Weak Link for Cybersecurity

With some creative tips to help engage and educate your employees on cybersecurity Each year, incidences of cyberattacks on companies are increasing with the intent to steal sensitive information. There are cybersecurity tools made to protect organizat… Continue reading 11 Ways Employees Can Be Your Weak Link for Cybersecurity

Insider Threats: Root Causes and Mitigation Practices

The Importance of Insider Threats The recent IBM 2019 Cost of Data Breach survey found that the cost of a data breach had risen 12% over the past 5 years to $3.92 million on average. While 51% of the data breach attacks were attributed to malicious or … Continue reading Insider Threats: Root Causes and Mitigation Practices

Extortion and alleged ISIS threats: A Saudi embassy learned the hard way about email security

When Saudi Arabia contacted security researcher Chris Kubecka to investigate an apparent intrusion into its Dutch embassy’s secured email accounts, she knew it was not going to be a simple case. Local laws in the Hague did not apply, since the embassy is considered Saudi soil. And it only got more complicated after Kubecka got to work: Once the email account was secured, the attacker — who claimed ISIS affiliation — left a trail suggesting an insider was responsible and then threatened to kill hundreds of innocent people if certain demands weren’t met. The escalations sent Kubecka, the Saudis, the Dutch and dozens of other diplomats scrambling on an international whodunnit — a hacking case that emphasized the high-stakes challenges and troublesome gray areas that come with securing diplomatic communications. The particular account that was compromised — the Saudi ambassador’s secretary’s email — was on its secure embassy system, according to Kubecka, whom the Saudi government brought in […]

The post Extortion and alleged ISIS threats: A Saudi embassy learned the hard way about email security appeared first on CyberScoop.

Continue reading Extortion and alleged ISIS threats: A Saudi embassy learned the hard way about email security

More than 2m AT&T phones illegally unlocked by bribed insiders

The alleged, now indicted ringleader paid more than $1m in bribes to insiders who planted malware and hardware for remote unlocking. Continue reading More than 2m AT&T phones illegally unlocked by bribed insiders

GitHub ‘encourages’ hacking, says lawsuit following Capital One breach

The class action charges Capital One and GitHub, charging it with being “friendly” (at least) toward hacking and for the hackers’ posts. Continue reading GitHub ‘encourages’ hacking, says lawsuit following Capital One breach

4 Questions CISOs Need to Ask About Enterprise Cybersecurity

Reading Time: 4 minutes It’s not always easy to ask the hard questions about enterprise cybersecurity. Here are four questions that CISOs need to answer to boost infosec impact.

The post 4 Questions CISOs Need to Ask About Enterprise Cybersecurity appeared first on Security Intelligence.

Continue reading 4 Questions CISOs Need to Ask About Enterprise Cybersecurity

Former NSA contractor sentenced to 9 years for theft of government info

Former NSA contractor Harold T. Martin was sentenced Friday to 9 years in prison for his role in a massive theft of classified documents. Martin was responsible for one of the largest leaks of U.S government secrets, after it was found that the former NSA contractor possessed up to 50 terabytes of classified government documents he collected over the course of two decades. Judge Richard Bennett’s sentence falls short of the maximum number of years Martin previously face — 10 years for each of the 20 counts against him — for unauthorized and willful retention of national defense information. However, the sentence aligns with the plea agreement his public defenders reached with the U.S. government. The U.S. attorneys said his theft called for “significant” prison time, according to the government’s sentencing memorandum, which CyberScoop obtained. “The exceptionally grave nature and circumstances of the defendant’s criminal conduct call for a significant […]

The post Former NSA contractor sentenced to 9 years for theft of government info appeared first on CyberScoop.

Continue reading Former NSA contractor sentenced to 9 years for theft of government info