Safeguarding Your Data While Traveling Abroad

By Alain Espinosa

According to the U.S. National Travel & Tourism Office, almost 73 million U.S. citizens traveled abroad in 2016. While most of us have adapted to the travel restrictions implemented by the Travel and Safety Administration (TSA), there is an often-overlooked facet to travel — protecting your privacy and data.

This content is for Subscribers only.
If you are already logged in and are seeing this message, please try refreshing this page to clear your browsers cached version.
Log In Subscribe

Time to Take Back Control of Your Cybersecurity Now

By Paul A. Ferrillo & Dr. Christophe Veltsos

Hi. We are back. We had hoped to delay this update at least one more year, but that turned out not to be possible as, early on in 2016, the ransomware plague affected large swaths of corporate America and the healthcare system. And things have gotten uglier over the past few months.

Companies and organizations of great notoriety suffered cyber attacks, like the recent hacks of the Democratic National Committee (DNC),(1) the alleged hack on The New York Times by unknown sources, and very powerful distributed denial of service attacks against the website of famed blogger, Brian Krebs; a French media company called OVH; and a top-level domain name server company called Dyn.(2)

This content is for Subscribers only.
If you are already logged in and are seeing this message, please try refreshing this page to clear your browsers cached version.
Log In Subscribe

Cyber Health Working Group Exemplifies Importance of Collaboration

By Susan Kahn and Kari Thompson

Around the globe, key players from the public sector, private industry and nonprofit sector are coming together as partners to find long-term solutions to the complex challenges of our rapidly changing world. These partnerships are addressing everything from U.S. infrastructure development to safe drinking water in developing countries. Gilbert Probst of the World Economic Forum has called collaboration “the paradigm of the 21st century.”

This content is for Subscribers only.
If you are already logged in and are seeing this message, please try refreshing this page to clear your browsers cached version.
Log In Subscribe

Q&A: Aviation Security Enhancements for Selected Last Point of Departure Airports

Why is the U.S. Government taking these steps now? Are these new policies in response to a specific terrorist threat or plot?

The U.S. Government is concerned about terrorists’ ongoing interest in targeting commercial aviation, including transportation hubs over the past two years, as evidenced by the 2015 airliner downing in Egypt, the 2016 attempted airliner downing in Somalia, and the 2016 armed attacks against airports in Brussels and Istanbul. Evaluated intelligence indicates that terrorist groups continue to target commercial aviation, to include smuggling explosive devices in various consumer items.

This content is for Subscribers only.
If you are already logged in and are seeing this message, please try refreshing this page to clear your browsers cached version.
Log In Subscribe

Police Search for Motive in Killing of Airport Worker

By Sean Murphy

OKLAHOMA CITY (AP) — Oklahoma City police investigators worked to piece together why a man waited to gun down an airline employee outside Will Rogers World Airport on Tuesday in an ambush that forced hundreds of travelers to take shelter and prompted authorities to shut down the state’s busiest airport for hours.

Police later discovered the suspected shooter dead from an apparently self-inflicted gunshot wound inside a pickup truck in a parking garage near where they believe he waited, watching airport employees come and go before shooting and killing Michael Winchester, 52, a Southwest Airlines employee.

“We do believe this was a premeditated act against the victim,” said Oklahoma City Police Capt. Paco Balderrama. “This was not random, and obviously the investigation is ongoing in reference to the other details.”

This content is for Subscribers only.
If you are already logged in and are seeing this message, please try refreshing this page to clear your browsers cached version.
Log In Subscribe

DHS Releases Strategic Principles for Securing Internet of Things

The Department of Homeland Security (DHS) recently issued a set of “Strategic Principles for Securing the Internet of Things (IoT), Version 1.0.” These principles highlight approaches and suggested practices to fortify the security of the IoT and will equip stakeholders to make responsible and risk-based security decisions as they design, manufacture, and use Internet-connected devices and systems.

This content is for Subscribers only.
If you are already logged in and are seeing this message, please try refreshing this page to clear your browsers cached version.
Log In Subscribe

Threat Considerations to Faith Communities and the Community at Large

On July 26, 2016, the InfraGard Maryland Members Alliance (IMMA) co-hosted a full-day seminar at Garrett College with the Maryland Governor’s Faith-Based Community Outreach Initiative Office and the FBI. The seminar addressed threats to faith institutions and active shooter incidents.

The seminar drew nearly 100 attendees from West Virginia, Pennsylvania and Maryland. Other agency partnering representatives included Marvella Gray from the FBI’s Community Outreach Program and Jennifer Gray from the Governor’s office, who also emceed.

This content is for Subscribers only.
If you are already logged in and are seeing this message, please try refreshing this page to clear your browsers cached version.
Log In Subscribe

Yahoo Took Its Time Investigating Massive  Security Breach

By Michael Liedtke

SAN FRANCISCO (AP) — Yahoo detected evidence that a hacker had broken into its computer network at least 18 months before launching an investigation that discovered personal information had been stolen from about 500 million user accounts.

The timeline outlined in a regulatory filing raises further questions about why it took Yahoo so long to realize the severity of its security breakdown. It also could provide Verizon Communications with reason to revise or terminate its $4.8 billion deal to buy Yahoo’s online services.

This content is for Subscribers only.
If you are already logged in and are seeing this message, please try refreshing this page to clear your browsers cached version.
Log In Subscribe

EU Police Agency Blames Human Error for Data Security Breach

By Mike Corder

THE HAGUE, Netherlands (AP) — European Union police agency Europol on Nov. 30 blamed human error for a breach of its data security rules by a former staff member that reportedly led to dossiers containing information about terrorism investigations becoming visible online.

Dutch investigative television show Zembla reported that a Europol staffer — in a breach of the agency’s tight security rules — took dossiers home and copied them to a backup drive that was linked to the Internet.

This content is for Subscribers only.
If you are already logged in and are seeing this message, please try refreshing this page to clear your browsers cached version.
Log In Subscribe

Ted Koppel Talks to InfraGardNCR About Grid Cyber Security

By Talley Cross Philpy, InfraGardNCR VP-Communications

How is the U.S. government preparing for a cyberattack against the electric grid? What can be done to ameliorate the effects of a massive attack? On Friday, March 4, journalist Ted Koppel addressed these questions and many more to InfraGardNCR members gathered at Boeing’s Arlington, Va., auditorium. InfraGardNCR President Kristina Tanasichuk conducted the interview with Koppel, author of the best-selling book Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath.

There isn’t universal agreement on whether a cyberattack on the electric grid could have a massive impact, since the grid is somewhat decentralized, and there are redundancies. The grid is also designed with some compensatory mechanisms in place. According to Koppel, the disagreement over attack impact has made the issue less urgent to the U.S. government, which he contended is reactive versus proactive, and focuses its efforts on fighting fires in the present. The media is similarly preoccupied with reporting unfolding dramas rather than potential ones, he said, as networks compete fiercely for viewers in the wake of the Internet and digital media explosion. Continue reading