When it comes to fighting DDoS attacks, institutions must understand the threats against them, says Bill Wansley of Booz Allen Hamilton. Varying attack vectors require different modes of detection and prevention.
"The lack of clear disclosures to consumers about how their location data are used and shared means that consumers lack adequate information to provide informed consent about the use of these data," the Government Accountability Office says.
"A cyberattack perpetrated by nation states or violent extremists' groups could be as destructive as the terrorist attack on 9/11," U.S. Defense Secretary Leon Panetta says. "Such a destructive cyber-terrorist attack could virtually paralyze the nation."
DDoS attacks have existed for years. But the latest wave brings new threats to organizations. How should they defend against these attacks? Ashley Stephenson of Corero Network Security offers insights.
Employment of IT security professionals in the United States is at an all-time high, our analysis of the latest U.S. government jobs data shows, but the growth in the profession isn't keeping pace with the demand for these skills in business and government.
Delaware state information security officers recently convened for a day of meetings and training to better prepare for incidents in their individual agencies, an event state CSO Elayne Starkey compares to fire drills.
"Any bug, beacon or backdoor put into our critical systems could allow for a catastrophic and devastating domino effect of failures throughout our networks," says Mike Rogers, chairman of the House Select Committee on Intelligence.