Challenging Insider Threat Problems? Try Technical Controls

By |February 3rd, 2017|Insider threat, KSE|

KSE Technical Controls (Insider Threat Round-table Continued) A previous post, "New methods needed for addressing insider threats", was based on a panel discussion that pointed out hard challenges in preventing the insider threat. NISPOM CC2 and Executive Order 13587 for Federal government departments and agencies are now mandating insider threat programs to be implemented. The requirements

Defense Against the Dark phArts

By |January 14th, 2017|KSE|

Wait! What! There's no spell for that? This tongue-in-cheek post was written  to point out that one should consider preparing for worst case scenarios. We can’t talk ourselves secure, and it doesn’t look like it’s going to be business as usual. This week saw the damage caused by Petya/NotPetya, a widespread attack that appeared at

New methods needed for addressing insider threats: A roundtable discussion

By |December 28th, 2016|Compliance, Insider threat, KSE|

Tough Insider Threat Problems Identified   Two federal compliance regimens for insider threat  will drive improved awareness, but not much more. They are NISPOM Conforming Change 2 regulating cleared DOD contractors, and Executive Order 13587 for Federal government departments and agencies. These standards are significant because they formally recognize the insider threat. However, they will have

IoT security: Prevention should mean… prevention

By |October 5th, 2016|KSE|

Prevention: you keep using that word... This past week the infosec industry and others took notice of two disturbing events. First was the huge Yahoo breach in which 500 million (or possibly more) data records have been stolen. The second event was a huge DDOS attack on Brian Krebs, a leading investigative reporter of cyber

Security D’oh-No!: Hackathons & Cyber Skills-Really?

By |August 4th, 2016|KSE, TUX GUI|

A recent article, "White House: Cyber Competitions Could Solve Skills Shortage", reminds that the cyber skills gap and the never-ending search for talent is likely going to be an on-going discussion point for some time. The piece informs us that, "The Office of Science and Technology Policy hosted a workshop aimed at encouraging volunteers and organizers to

Insider Threat – Clear Text Data in Use, More

By |July 28th, 2016|Insider threat, KSE|

KSE Insider Threat Toolbox   Encryption is the usual prescription to generally protect data in transit and in storage. Authorized personnel have access to sensitive data in a decrypted state while performing tasks and activities in accordance with assigned roles and duties. In terms of the insider threat, a major challenge is how to protect clear text