This research looks at various segments relevant to Imperva — Web application firewalls (WAFs), data-centric audit and protection (DCAP), cloud security, and cloud access security brokers (CASBs) — to provide the reader with the ability to assess the company’s prospects. Based in Redwood Shores, California, Imperva provides hardware and software cybersecurity solutions designed to protect data and applications in the cloud and on-premises. Customers use these solutions to discover assets and risks, protect information, and comply with regulations. …
Gartner clients can access this research by clicking here.
http://www.nextgov.com/cybersecurity/2015/03/pentagon-has-until-2016-extend-3000-jobs-offers-civilian-cyber-whizzes/106842/ By Aliya Sternstein Nextgov.com March 5, 2015 The military has been given the go-ahead to fast-track the hiring of 3,000 computer whiz civilians, in part, to flesh out the half-staffed U.S. Cyber Command, federal officials announced Thursday. Yesterday, command leaders told Congress they need to be able to quicker make compensation deals with prospective employees, as threats from nation state hackers mount. The permission slip the Office of Personnel Management signed applies to the entire Defense Department, including the command, according to a notice posted in the Federal Register. The 5-year-old command organizes cyberattacks against adversaries and network defense operations. The pay scale for the new Defense positions starts at $42,399 and goes up to $132,122. Under the arrangement, the Pentagon can skip the process of rating applicants based on traditional competitive criteria. Instead, the department can offer jobs based on the candidate’s unique skills and knowledge. The special qualifications include the ability to analyze malware, respond to incidents, manage cyber fire drills and detect vulnerabilities, among other things. […]
http://www.wsj.com/articles/is-the-prefix-cyber-overused-1425427767 By DANNY YADRON and JENNIFER VALENTINO-DEVRIES The Wall Street Journal March 4, 2015 These days, CyberPatriots go to CyberCamps. Washington wonks ponder a Cyber Red Cross. Last week, the Director of National Intelligence told Congress a “cyber Armageddon” is unlikely. This week, CBS Corp. will premiere the latest iteration of its long-running cops and crime franchise, “CSI: Cyber,” whose protagonist describes herself as cybercop and is based, the network says, on a real-life cyberpsychologist. For some, it is cyber-overload. Stop using the word,” Alex Stamos, the chief information security officer at Yahoo Inc. told a “Cybersecurity for a New America” conference in Washington last week. Earlier, Mr. Stamos quipped on Twitter that he had won “CyberBingo” at his table after a conference speaker warned of a “Cyber Pearl Harbor,” a term popularized by former Defense Secretary Leon Panetta in 2012. Mr. Stamos isn’t brushing off computer intrusions in his quest to hack away at “cyber” usage. As the guy in charge of keeping prying eyes out of one of the world’s most popular websites, you could say he is obsessed with them. […]
http://www.nextgov.com/cybersecurity/2015/03/6-biggest-blunders-governments-annual-cyber-report-card/106512/ By Aliya Sternstein Nextgov.com March 2, 2015 The White House has released its yearly assessment of agency compliance with the governmentwide cyber law known as the Federal Information Security Management Act. And given the spate of breaches and hacks that hit both government and the private sector, the results may not be all that surprising. Sensitive agency data is often not encrypted. Many departments do not use two-step verification for accessing government networks, despite post-Sept. 11 requirements that employees carry login smart cards. And cyber training is deficient in one of the most unlikely areas… 2014’s Biggest Federal Computer Security Blunders 1. Federal agencies reported 15 percent more information security incidents in fiscal 2014 compared to fiscal 2013, rising from 60,753 to nearly 70,000 events. These incidents included phishing attempts, malware infections and denial-of-service attacks, as well as leaks of paper records and sensitive emails sent without encryption. […]
http://www.washingtonpost.com/local/trafficandcommuting/faa-computers-vulnerable-to-hackers-gao-report-says/2015/03/02/388219ac-c119-11e4-9271-610273846239_story.html By Ashley Halsey III The Washington Post March 2, 2015 The Federal Aviation Administration has fallen short in its efforts to protect the national air traffic control system from terrorists or others who might try to hack into the computers used to direct planes in flight, according to a government report released Monday. The Government Accountability Office report credited the FAA with taking steps to deter hackers but concluded that “significant security control weaknesses remain, threatening the agency’s ability to ensure the safe and uninterrupted operation of the national airspace.” The FAA said it intends to implement the 14 changes recommended in the GAO report. In a written response to the GAO last month, Keith Washington, acting assistant secretary for administration at the Department of Transportation, said the FAA already had achieved six “major milestones” toward improving cybersecurity and agreed with the GAO recommendations for improvements. […]
http://thehill.com/policy/cybersecurity/233740-nsa-staffers-rake-in-silicon-valley-cash By Cory Bennett The Hill 02/24/15 Former employees of the National Security Agency are becoming a hot commodity in Silicon Valley amid the tech industry’s battle against government surveillance. Investors looking to ride the boom in cybersecurity are dangling big paydays in front of former NSA staffers, seeking to secure access to the insider knowledge they gained while working for the world’s most elite surveillance agency. With companies desperate to protect their networks against hackers, many tech executives say the best way to develop security products is to enlist the talents of people who have years of experience cracking through them. “The stories he could tell,” venture capitalist Ray Rothrock recalled about his meetings with a former NSA employee who founded the start-up Area 1 Security. “They come with a perspective that nobody in Silicon Valley has.” […]
http://www.nextgov.com/cybersecurity/2015/02/cyber-collaboration-government-still-work-progress/106071/ By Hallie Golden Nextgov.com Feb 25, 2015 Amid the onslaught of cyberthreats faced by federal agencies, the potential for an even larger and more sustained catastrophic version of a digital attack has become an increasingly real possibility. If such a scenario were to took take place, the Defense Department would certainly play a lead role in the response. But it likely couldn’t do it alone, according to Lt. Gen. Edward Cardon, commanding general of the Army Cyber Command. “It’s not solely going to be a DOD problem,” he said this week at a New America Foundation event on cybersecurity. Despite the fact that his organization increased exponentially in a year