Spotting and Avoiding Government Cyber Warfare Tactical Weapons

Ranked number eight out of ten of the most insidious hacking techniques, government-sponsored malware is becoming the tactical weapon of choice in cyber warfare. While Stuxnet may be the most widely known malware, it is far from the only variant used by nations across the globe. Looking at past incidents of state-sponsored malware may be interesting, as they pale and are amateurish in comparison to the sophistication of the payloads seen recently.

Read more

Risk Management with RSA’s Archer GRC Framework

Risk is something we deal with on a daily basis. Living in New Jersey and having the occasional storm, I’ve recently performed my own risk assessment determining the value of certain assets and activities and made a decision on what I was willing to spend to reduce risk to what I perceived as an acceptable level. My management of risk was a rather simple case. Sure, in my revised business continuity plan for my home, I’ll make sure that I have more D cell batteries, have my garage door adjusted so it opens manually again, more food I can heat on a stove and that doesn’t rely on refrigeration, and finally I’ll consider a whole house gas generator that uses natural gas, which has always been available to power critical systems like the sump pump in my basement. What if, however, I was a really large business? One with lots of components and interdependencies that require a tight integration in order to succeed? How and where can a large volume of information necessary to management, business continuity, and disaster recovery be correlated and communicated to those individuals who, because of their roles and responsibilities, need to make the critical decisions regarding the management of risk?

Read more