NSA Urges SysAdmins to Replace Obsolete TLS Protocols


The NSA released new guidance providing system administrators with the tools to update outdated TLS protocols. Government Vulnerabilities and Defense Industrial Base CloudFlare Department of Defense (DoD) government Heartbleed National Security System (NSS) NSA SSL TLS 1.0

Simplify records management while improving information governance

OpenText Information Management

Challenge: Your organization has many users involved in the lifecycle management of important information assets–from knowledge workers to legal associates to system administrators and, yes, Records Managers.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Legendary Help: Keeping benefits running despite historic unemployment

Rocket Software

During the height COVID-19 pandemic, millions of people globally were laid off or unable to return to work due to government orders. In order to accommodate these orders and keep people safe, state governments released new funding to provide financial relief to individuals who needed it.

Chinese Hackers Stole an NSA Windows Exploit in 2014

Schneier on Security

Check Point has evidence that (probably government affiliated) Chinese hackers stole and cloned an NSA Windows hacking tool years before (probably government affiliated) Russian hackers stole and then published the same tool.

MY TAKE: How SMBs can improve security via ‘privileged access management’ (PAM) basics

The Last Watchdog

As digital transformation kicks into high gear, it’s certainly not getting any easier to operate IT systems securely, especially for small- and medium-sized businesses. Yet all organizations today, no matter their size or sector, face the same daunting security challenge: how to preserve the integrity of their IT systems when the attack surface is expanding and intrusion attempts are intensifying. There are a lot of moving parts to modern IT systems.

Access 156

Latest on the SVR’s SolarWinds Hack

Schneier on Security

Initial estimates were that Russia sent its probes only into a few dozen of the 18,000 government and private networks they gained access to when they inserted code into network management software made by a Texas company named SolarWinds.

Cyber Blackmail: More Than Just Ransomware

The Texas Record

We are happy to welcome guest writers from the Texas Department of Information Resources, Daniel Hankins, Shared Services Security Manager and Andy Bennett, Director Information Security Governance. The city of Atlanta’s operations were virtually dragged to a halt after an unmet demand for roughly $50,000 in ransom ended up essentially crippling the city’s government and has already cost at least $2.7

Orcus RAT Author Charged in Malware Scheme

Krebs on Security

The accused, 36-year-old John “Armada” Revesz , has maintained that Orcus is a legitimate “ R emote A dministration T ool” aimed at helping system administrators remotely manage their computers, and that he’s not responsible for how licensed customers use his product. government said was used to infect more than a half million computers worldwide.

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

In fact, memory attacks have quietly emerged as a powerful and versatile new class of hacking technique that threat actors in the vanguard are utilizing to subvert conventional IT security systems. Memory hacking is being carried out across paths that have been left comparatively wide open to threat actors who are happy to take full advantage of the rather fragile framework of processes that execute deep inside the kernel of computer operating systems.

CISA’s MAR warns of North Korean BLINDINGCAN RAT

Security Affairs

According to the government experts, the BLINDINGCAN malware was employed in attacks aimed at US and foreign companies operating in the military defense and aerospace sectors.

Feds Allege Adconion Employees Hijacked IP Addresses for Spamming

Krebs on Security

A statement of facts filed by the government indicates Petr Pacas was at one point director of operations at Company A (Adconion). The government alleges the men sent forged letters to an Internet hosting firm claiming they had been authorized by the registrants of the inactive IP addresses to use that space for their own purposes. It appears the government has been investigating Adconion’s email practices since at least 2015, and possibly as early as 2013.

Nick Jovanovic, VP Federal of Thales eSecurity Federal, Speaks to Media about Data Security

Thales Cloud Protection & Licensing

Nick Jovanovic, VP Federal of Thales eSecurity Federal (a division of TDSI), recently spoke with Federal Tech Talk’s John Gilroy about federal agency data security and key findings from the 2018 Thales Data Threat Report, Federal Government Edition. federal government, airs on Federal News Radio, a radio station in the Washington, D.C. He suggests that protecting data that is on your system should be the focus.

Canadian Police Raid ‘Orcus RAT’ Author

Krebs on Security

The CRTC executed a warrant under Canada’s Anti-Spam Legislation (CASL) and the RCMP National Division executed a search warrant under the Criminal Code respectively,” reads a statement published last week by the Canadian government. Rezvesz maintains his software was designed for legitimate use only and for system administrators seeking more powerful, full-featured ways to remotely manage multiple PCs around the globe.

Threat actors are attempting to exploit recently fixed F5 BIG-IP flaw

Security Affairs

The BIG-IP product is an application delivery controller (ADC), it is used by government agencies and major business, including banks, services providers and IT giants like Facebook, Microsoft and Oracle. System administrators need to upgrade to fixed versions ASAP.

CIA elite hacking unit was not able to protect its tools and cyber weapons

Security Affairs

According to his LinkedIn profile , Schulte worked for the NSA for five months in 2010 as a systems engineer, after this experience, he joined the CIA as a software engineer and he left the CIA in November 2016.

IT 112

List of data breaches and cyber attacks in February 2020 – 623 million records breached

IT Governance

San Diego school district investigating after online grading system hacked (unknown). Preschool services provider Educational Enrichment Systems discloses cyber attack (unknown). Puerto Rico government loses $2.6

MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

The Last Watchdog

Both were well-equipped to teach, test and train individuals ranging from teen-agers and non-technical adults, to working system administrators and even seasoned tech security pros. Today Merit supplies IT infrastructure to schools, universities, government and other entities across the state. Another cluster of students attempted to crack into an Alphaville industrial controls system. “I

AIIM's Information Management Training - Cost, Options, and FAQs


AIIM training has a long history, going back to 2001 when AIIM developed the Fundamentals of ECM System Implementation course. You may not know that we developed a 4-day Email Management class in 2008 or a 2-day Social Media Governance course in 2011. System and Information Inventory.

ECM 62

Can smart cities be secured and trusted?

Thales Cloud Protection & Licensing

There’s just one problem…these massive, radical, interconnected technology systems also raise serious privacy and security concerns. In June 2019, Riviera Beach in FL paid $600,000 to hackers to restore its email system and public records. Atlanta , Baltimore , Port of San Diego , and the island of Saint Maarten were subjected to wide scale cyber-attacks affecting vital government services and costing these municipalities millions of dollars.

How to start your career in cyber security

IT Governance

Technically, you don’t need any cyber security experience to get started, though many people entering the field will come from jobs that have similar skillsets, such as systems administration or information analysis. The qualifications you need will depend on your career path, but the most common and versatile are associated with ISO 27001 , the international standard that describes best practice for an ISMS (information security management system).

Cloud Hopper operation hit 8 of the world’s biggest IT service providers

Security Affairs

Then the attackers used the stolen information to target into customer systems. “Teams of hackers connected to the Chinese Ministry of State Security had penetrated HPE’s cloud computing service and used it as a launchpad to attack customers, plundering reams of corporate and government secrets for years in what U.S. Some intruders resembled “drunken burglars,” said one source, getting lost in the labyrinth of corporate systems and appearing to grab files at random.”

Cloud 83

£60 million in recovery costs for Norsk Hydro after refusing ransom demand

IT Governance

For a few hundred thousand pounds, Norsk Hydro could have bought a decryptor from the blackmailers and restored its systems. On 19 March 2019, Norsk Hydro’s systems were infected with the LockerGoga ransomware. TrendMicro’s analysis into the ransomware found that it was the same system administration tool abused by the likes of SOREBRECT and Bad Rabbit. Cyber security experts and governments urge victims to never pay the ransom.

Five Eyes Intelligence agencies warn of popular hacking tools

Security Affairs

To aid the work of network defenders and systems administrators, we also provide advice on limiting the effectiveness of these tools and detecting their use on a network.” It poses a threat to several different operating systems, including Windows, Linux, MAC OS X, and Android.” The tools in this Activity Alert have been used to compromise information across a wide range of critical sectors, including health, finance, government, and defense.

Georgia Governor Vetoes Broad-Reaching Computer Crime Bill, Highlighting Debate Around Bug Bounty Programs

Data Matters

In his veto statement , Governor Deal commented that parts of SB 315 “have led to concerns regarding national security implications and other potential ramifications” that caused him to conclude that “while intending to protect against online breaches and hacks, SB 315 may inadvertently hinder the ability of government and private industries to do so.”. Organizations have employed bug bounty programs in an effort to encourage researchers to report security flaws in their systems.

Protecting America’s Critical Infrastructure

Thales Cloud Protection & Licensing

But the energy sector also underpins our emergency and response systems, our hospitals and healthcare, our schools, our businesses, and virtually everything we do as a society. Disruptions to Ukraine’s power system in 2015 and 2016 were attributed to a cyberattack and led to power outages affecting hundreds of thousands of people. The SEIA bill passed on June 27th in the Senate could be a good start to isolate and segment the most important control systems of the U.S.

More Cloud Means More Multi-Tenant Environments

Thales Cloud Protection & Licensing

The shift towards consolidation, especially in the federal government, is also abundantly clear with the increase of hyperconverged infrastructure adoption and the push for organizations to do more with less. To ensure a secure multi-tenant environment for consolidation, you need a solution that: adequately isolates security for specific tenants or customers; authorizes access to the data itself without allowing even systems administrators or privileged users to see the data; and.

Cloud 67

What Are the Best Practices for Email Management?


Email systems are used for all kinds of business and non?business Everyone uses it, often as a filing system rather than as a simple communications mechanism. Most content management products today provide email integration capabilities, allowing information workers to capture an email, or folder of emails into the system with minimal clicks. Federal government, it is nevertheless an option for business departments, particularly if they focus on senior staff and managers.

Weekly podcast: Memcached DDoS attacks, Equifax (once again) and Alexa

IT Governance

Hello and welcome to the IT Governance podcast for Friday, 9 March 2018. An Akamai blog explained that memcached is “meant to cache data and reduce strain on heavier data stores […] and is only intended to be used on systems that are not exposed to the Internet”. According to Akamai, there are “currently more than 50,000 known vulnerable systems exposed”. This week, we discuss the biggest distributed denial-of-service attacks on record, another 2.4

Building the Relationship Between RM and IT

The Texas Record

The initial meeting to discuss such issues can be uncomfortable for some, so we’ve solicited the help of three Records Management Officers (RMO) who’ve already crossed that bridge; Interim RMO with the Employee Retirement System of Texas, Martha Whitted, Texas State Library and Archives Commission RMO, Gloria Meraz , and with the Office of the Governor RMO, Angela Ossar all graciously agreed to share their experiences with us.

On the Twitter Hack

Schneier on Security

Someone compromised the entire Twitter network, probably by stealing the log-in credentials of one of Twitter's system administrators. Yet they are run by for-profit companies with little government oversight. Twitter was hacked this week.

Trust, but Verify: Keeping Watch over Privileged Users

Thales Cloud Protection & Licensing

Privileged users today can include a multitude of people from system administrators, network engineers, and database administrators, to data center operators, upper management, and security personnel. Stolen credentials can go unnoticed until a great deal of data has been harvested or modified, or critical systems sabotaged. Depending on their privileges, users may need unlimited access to applications, but only limited or no access to file systems and their data.

DevOps Chat Podcast: $2M DARPA Award Sparks Behavior Testing With ForAllSecure's Mayhem Solution


” Mayhem has moved on from capture the flag contests to observing and finding vulnerabilities in DoD software and is working its way to corporate systems. Like, you see it executes this system call, that system call. Are you working with a particular private sector, government sector? Sounds like something that might be interesting to the government side of things, too.



” Mayhem has moved on from capture the flag contests to observing and finding vulnerabilities in DoD software and is working its way to corporate systems. Like, you see it executes this system call, that system call. Are you working with a particular private sector, government sector? Sounds like something that might be interesting to the government side of things, too.

GAO Report shed the lights on the failures behind the Equifax hack

Security Affairs

Government Accountability Office (GAO) provides detailed information of the Equifax hack. Government Accountability Office (GAO) published a report on the Equifax hack that includes further details on the incident. The reports also refers documents from the Internal Revenue Service (IRS), Social Security Administration (SSA), and U.S. “In July 2017, Equifax system administrators discovered that attackers had gained. A new report from the U.S.