Tag Archives: printing

My latest Gartner research: Forecast: Information Security, Worldwide, 2013-2019, 1Q15 Update

The information security market will grow 7.7% in revenue in 2014, with the IT security outsourcing segment recording the fastest growth — 15.2%. 1 Summary Tables Suitable for Printing 2 Pivot Table for Analysis 3 Data Structure and Definitions 4 Exchange Rates 5 Tips for Using Pivot Tables 1-1 Security Spending by Region, 2013-2019 (Millions of Dollars) 1-2 Security Spending by Segment, 2013-2019 (Millions of Dollars) 2-1 Worldwide …

Gartner clients can access this research by clicking here.




Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] New Technology Detects Cyberattacks By Their Power Consumption

http://www.darkreading.com/analytics/security-monitoring/new-technology-detects-cyberattacks-by-their-power-consumption-/d/d-id/1318669 By Kelly Jackson Higgins Dark Reading 1/20/2015 Startup’s “power fingerprinting” approach catches Stuxnet infection within seconds in DOE power grid test bed. A security startup launching early next week uses trends in power consumption activity, rather than standard malware detection, to spot cyberattacks against power and manufacturing plants. The technology successfully spotted Stuxnet in an experimental network before the malware went into action. PFP Cybersecurity, which officially launches on Monday and was originally funded by DARPA, the Defense Department, and the Department of Homeland Security, basically establishes the baseline power consumption of ICS/SCADA equipment such as programmable logic controllers (PLCs), supervisory relays, or other devices and issues an alert when power consumption or RF radiation changes outside of their baseline usage occur. Such changes could be due to malware, as well as to hardware or system failures, for instance. The US Department of Energy’s Savannah River National Laboratory (SRNL) recently tested the PFP technology’s ability to detect Stuxnet on a Siemens SIMATIC S7-1200 PLC. Joe Cordaro, advisory engineer with SRNL, says the PFP system right away found Stuxnet on the PLC, before the infamous malware began to activate


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] A Virginia hacker catches the attention of federal law enforcement

http://www.washingtonpost.com/local/crime/a-virginia-hacker-catches-the-attention-of-federal-law-enforcement/2014/09/27/51251eee-1405-11e4-9285-4243a40ddc97_story.html By Justin Jouvenal The Washington Post September 27, 2014 The agents from the Department of Homeland Security and the Secret Service showed up on Muneeb Akhter’s Springfield doorstep in mid-July, he said, soon after they learned that he claimed to have created a hack so powerful it was like printing virtual money. The cybersecurity expert and self-described hacker, who started college at 16, had casually told co-workers soon after starting work as a DHS contractor that he could add money to major retailers’ gift cards without spending a dime. Now, as the 22-year-old and the agents sat around his family’s dining room table, the officials wanted to know how. Akhter thought they might arrest him as he explained the hack, but instead, he said, they extended an extraordinary offer: Work secretly as a hacker for the government. “There is no university we can go to and just recruit people,” a man, who Akhter said is a DHS agent, is heard saying on an audio recording of the meeting that Akhter’s family made. “The people we’re looking for might be the people they have concerns about because you have special skills that we need.” […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] Things Can Go Kaboom When a Defense Contractor’s 3-D Printer Gets Hacked

http://www.nextgov.com/cybersecurity/2014/09/heres-why-you-dont-want-your-3-d-printer-get-hacked/93923/ By Aliya Sternstein Nextgov.com September 11, 2014 Defense companies that manufacture parts with three-dimensional printers using metal powders might want to heed forthcoming government-issued standards for preventing hacks. Not only can attackers steal proprietary designs by breaching the machines’ data files – but they can also cause physical damage to production plants and employees. “A compromise may affect the confidentiality, integrity or availability of both the device and the information it processes,” state National Institute of Standards and Technology draft guidelines for avoiding 3-D printer breaches. Military contractors increasingly are using the machines to mass-produce components for weapons systems, vehicles and other hardware to save time and money. 3-D printing, also called additive manufacturing, creates solid objects by layering thin sheets of material following the instructions of a digital computer file. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner Research: Forecast: Information Security, Worldwide, 2012-2018, 2Q14 Update

1 Summary Tables Suitable for Printing 2 Pivot Table for Analysis 3 Data Structure and Definitions 4 Exchange Rates 5 Tips for Using Pivot Tables 1-1 Security Spending by Region, 2012-2018 (Millions of Dollars) 1-2 Security Spending by Segment, 2012-2018 (Millions of Dollars) 2-1 Worldwide …

Gartner clients can access this research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] IRS Gave Sensitive Data to Convict Sentenced to 21 Years

http://www.nextgov.com/cio-briefing/2014/08/irs-gave-sensitive-data-convict-sentenced-21-years/91478/ By Aliya Sternstein Nextgov.com August 14, 2014 The Internal Revenue Service failed to conduct background checks on many contract workers who handled sensitive taxpayer data, an internal review reveals. The findings arrive at a time when identity theft has become an everyday threat in the public and private sectors. At the IRS, contractors hired for courier, printing, document recovery, and sign language and interpreter services who accessed sensitive information had not undergone investigations, which is a policy violation. A Treasury Inspector General for Tax Administration report released today details several situations where employees had ample opportunity to steal data. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

[ISN] How Antisec Died

https://medium.com/quinn-norton/654abf6aeff7 By Quinn Norton Medium.com November 22, 2013 Jeremy Hammond, Sabu, and the Intelligence-Industrial Complex First, an introduction: I write about hackers, and for the past few years that has meant I write about Anonymous. At the time of the Stratfor hack I was working for Wired covering Anonymous — notably the antics of Antisec anons much of the time. I had missed the Lulzsec period, which I spent under federal investigation myself. From February to July of that year I stayed away from the hacker world, unsure if my computer would be seized and unwilling to draw my sources into a possible fishing expedition. By the winter of 2011, I was making up for lost time. I’d become deeply involved with the day to day lives of active anons working on all sorts of actions, from Occupy support to street protests. And of course, I talked with members of Antisec on a daily basis. In accordance with my rules for coverage, no communication with anyone in Anonymous was ever logged unless it was an on-the-record interview permitted for printing. Even then, my notes didn’t preserve handles, the format of communication, or even urls of places we’d communicated. I never knew who anyone was in real life, and made it publicly clear that I would never work with any anon who revealed their identity to me. This was in part because I didn’t want my work to become involved in any court cases, but also because for the nature of my coverage, I didn’t believe, and still don’t, that the legal identity of individuals tells us much about the collective I was writing about. As a result, much of the story I have to tell of what really happened to Antisec comes of years-old memories. There are almost no notes anywhere to support the conversations I will claim to have had with people I can no longer find and never knew in anything like real life. Some of the details may have faded from memory. But the story has not. […]


Facebooktwittergoogle_plusredditpinterestlinkedinmail

My latest Gartner Research – Forecast: Information Security, Worldwide, 2011-2017, 2Q13 Update

1 Summary Tables Suitable for Printing 2 Pivot Table for Analysis 3 Data Structure and Definitions 4 Exchange Rates 5 Tips for Using Pivot Tables 1-1 Security Spending by Region, 2011-2017 1-2 Security Spending by Segment, 2011-2017 2-1 Worldwide Spending on Security by Technology …

Gartner customers can access this latest research by clicking here.


Facebooktwittergoogle_plusredditpinterestlinkedinmail