BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Capitol Hill is Moving on Cyber Security Bill

Post by Peter McCalister July 23, 2012

Will government intervention help reduce the number of security attacks on our nation’s infrastructure or is the proposed Cyber Security Act too restrictive on private business causing forced transparency of operations and raised costs?

The Cyber Security Act 2012 Bill has been floating around for months and is now backed by President Obama. Sen. Joe Lieberman has stated that the Senate will consider the bill by weeks end. We revisit a previous standpoint detailed in Forbes earlier this year in light of this recent movement. There are several reasons why an increased bureaucratic push for compliance might not be good for business.

A large concern for organizations is to be mandated to disclose that their asset data has been compromised. In a recent Cyber Security Watch Survey, 70 percent of insider incidents are handled internally without legal action. Companies want to maintain a reputation as well as avoid the public eye at all costs. It’s much easier to deal with internal controversy without a media frenzy causing the microscope to land on your security practices.

More often now, executive management teams mistake well-planned and executed information security architecture with satisfaction of compliance and regulatory statutes. Unfortunately, this approach often falls short. Nonetheless, having great security practices don’t always mean compliance and vice versa. Satisfying compliance and regulatory mandates to the letter may still leave organizations vulnerable to security breaches.

In order to curb hackers from penetrating critical infrastructure, the government needs to focus on leveraging its vast resources to drive a new architecture of security, product research and development. This can be achieved by advocating software and systems that are needed to protect us – such as protection from the accidental insider, the government stands a much better chance of protecting our nation’s critical assets. The most dangerous security risk “cocktail” that every corporation needs to address is the combination of critical vulnerabilities and over-privileged accounts on corporate assets.

Leave a Reply

Additional articles

April VEF Participant Wins a Apple iPad mini

Every month we host our Vulnerability Expert Forum (VEF) webinar. This is a time where our experts share valuable insight regarding new vulnerabilities that are discovered and the actions that need to be taken as a result. It’s a quick way to get up to speed on current potential risks to your organization and a way to…

Post by Qui Cao April 24, 2014
smart rules manager for vulnerabilities - v2

A New Way of Looking at Vulnerabilities in Your Environment

Assets, users, vulnerabilities and exploits; all are common themes in my posts on BeyondInsight. With BeyondInsight v5.1, we unveiled a new way to view exploitable assets. Sure, most vulnerability management solutions link vulnerability data to exploit information, allowing tools like NeXpose and QualysGuard to list an asset, its vulnerabilities, and any related exploits. BeyondInsight does…

Post by Morey Haber April 23, 2014
Tags:
, , , , ,
smart rules manager for vulnerabilities

Staying on Top of the Latest Vulnerabilities with BeyondInsight v5.1

It’s no secret that dozens of new OS and application vulnerabilities are revealed every day. Staying on top of these new exposures normally requires paying for services or subscribing to multiple RSS feeds. BeyondInsight 5.1 provides customers with another option: a built-in, customizable vulnerability alerting system that delivers up-to-date information on the latest vulnerabilities in…

Post by Morey Haber April 21, 2014
Tags:
, , , , , ,