BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

The Growing Government Interest in Cyber R&D

Posted March 26, 2014    BeyondTrust Software

Both US and International governments have been shifting their focus to the research and development of technology to protect critical cyber assets. At the recent AFCEA Homeland Security Conference, cyber security was one of the main topics covered by keynote speakers and exhibitors. We’ve compiled some of the latest endeavors taking place on behalf of governments and large companies in their R&D pursuit of cyber security excellence.

Domestic R&D From Washington D.C.

The Pentagon’s Quadrennial Defense Review

The QDR has stressed the need to protect science, technology, research and development, specifically cyber capabilities. The three focus areas are protecting the homeland, building security globally, and project power and win decisively. The Cyber Mission Force implementing these agendas will focus on “new and expanded cyber capabilities and forces to enhance our ability to conduct cyberspace operations and support military operations.” The force will be fully operational by 2016. The investments include high performance engine technology, state-of-the-art tools and infrastructure, protecting engineering and technological know-how for next generation ground combat vehicle design, and protecting the missile industrial base. “Nearly any future conflict will occur on a much faster pace and on a more technically challenging battlefield.” – Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff

US Budget Request Focuses on a High Tech Future

US Military focused less on prolonged ground wars and more on fighting on a high-tech, contested battlefield. The Pentagon is protecting R&D money in its fiscal 2015 budget submission, and it will push for greater risk-taking and big bets. The Navy Department had a 9 percent increase of their RDT&E budget request, representing an increase of $1.3 billion.

FY 2015 President’s Budget Request Summary For NASA

The FY 2015 budget makes efficient use of NASA’s assets and also includes reinvigorated efforts to protect these assets, particularly from cyber threats.

Subcommittee on Oversight and Subcommittee on Research and Technology Joint Hearing

The Oversight Subcommittee and the Research and Technology Subcommittee held a joint hearing to examine the current state of technology and standards to protect Americans from international cybercriminals. Witnesses discussed the evolution of cyber-attacks against U.S. computer networks and infrastructure from rogue hackers to sophisticated international crime syndicates and foreign nations such as Russia and China. “The cyber threat will pose the greatest threat to our country.” – FBI Director Robert Mueller

International R&D

From Belgium

Swift Chief Executive Calls for a Standardized Global Framework

Swift chief executive Gottfried Leibbrandt has called on EU policymakers work towards the creation of a standardized global framework for international cyber-security. The interbank network, which connects over 10,000 institutions globally, was founded on security and confidentiality principles.“Every day we wake up and go to sleep thinking about, and protecting against that threat. It is hard work and never done. When we don’t sleep, it is because of cyber risks.” European politicians are shifting their focus on drafting the EU’s future cyber-security strategy. Leibbrandt prescribes a minimum of internationally agreed personnel vetting standards, supplier certification standards, readiness level standards and penetration testing standards and best practice definitions. He would also like the EU to do more to foster a vibrant ecosystem of participants and guides in cyber-security, backed by a R&D framework and advanced skill sets.

From Singapore

Israel Aerospace Industries Opens a Cyber R&D Center

Israel Aerospace Industries is launching a new research and development center in Singapore which will focus on finding new technologies to provide early warnings of looming cyber-attacks. The center is the first that an Israeli defense corporation has opened in the Far East, with 80 to 90 percent of its workforce from the local area, including scientists, engineers and professional computer analysts. “This center will deal with cyber challenges, focusing on providing warnings ahead of impending attacks,” – Esti Peshin, head of the Cyber Programs section at IAI’s subsidiary Elta. The center will emphasize three areas: active defenses, such as catching cyber attackers in real time, monitoring them, and redirecting their attacks; finding the geographical location of virtual attackers; and anomaly detection, or recognizing deviations from routine behavior that could indicate impending attacks.

From the United Kingdom

Cyber Emergency Response Team Launch

At the end of March, the UK government will launch the UK Computer Emergency Response Team, a £650 milion cybersecurity strategy. It will guard against criminal attacks on critical government systems and their associated operational functions. Just last year the UK’s energy infrastructure was at risk of being shut down by hackers. Notable CERT personnel include Director Chris Gibson (formerly of the Forum of Incident Response and Security Teams), Director of Operations Neil Cassidy (former cyber defense lead at Qinetiq), and Deputy Director Andrew Whittaker (a former Foreign Office crisis management expert). CERT-UK will provide a central point to coordinate responses to secure the country’s cyber space & is launching amidst increased awareness surrounding attacks on critical infrastructure.

Request a free trial of the BeyondInsight IT Risk Management Platform for U.S. federal agencies.

For more information, please contact: 
BeyondTrust Federal Solutions Group 
Tel: 301.337.8112
federalsales@beyondtrust.com

Tags:
, , , , , , ,

Leave a Reply

Additional articles

Integrating Least Privilege and Password Management to Solve Account Security Challenges

Integrating Least Privilege and Password Management to Solve Account Security Challenges

Posted July 24, 2014    Morey Haber

There is a reason all BeyondTrust Privileged Account Management (PAM) solutions share the PowerBroker name: They all inherently enable you to reduce user-based risk and can be integrated under a centralized IT risk management platform. Here’s one common use case that demonstrates how this integration changes the playing field. Consider the challenge of privileged access:…

Tags:
, , , , ,
PowerBroker Password Safe Password Age Report

Reshaping Privileged Password Management with Password Safe 5.2

Posted July 21, 2014    Martin Cannard

Today, we’re pleased to unveil the latest edition of our privileged password management solution, PowerBroker Password Safe. I’ll start with a brief intro of what’s new and then tell you a little about the driving factors behind Password Safe development. New features for mitigating password risk and ensuring accountability enterprise-wide Here’s the 10,000-foot overview of…

Tags:
, , ,
PowerBroker for Windows tamper protection

PowerBroker for Windows 6.6 Tamper Protection

Posted July 18, 2014    Morey Haber

I have a bone to pick: Stopping an administrator from performing an action on a system is futile endeavor. As an administrator, there is always a way to circumvent a solution’s from tampered protection. Really! By default, Windows administrators have unrestricted access to the system – and even though an application, hardened configuration, or group policy…

Tags:
, ,