Under DDoS attack? It could be just a distraction

When businesses are hit by noticeable distributed denial-of-service attacks, three-quarters of the time those attacks are accompanied by another security incident, according to Kaspersky Lab.

Those other attacks may or may not originate from the same party, but they can go undetected if IT staff is totally focused on defending against the DDoS, says Evgeny Vigovsky, head of Kaspersky DDoS Protection.

“In many cases, it may be a coordinated effort, but even if these attacks originate from different sources, IT staff have to allocate resources to solve two problems at the same time, under a lot of stress,” Vigovsky says. Kaspersky polled top managers and IT pros at 5,500 companies in 26 countries about their experiences with DDoS attacks.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

Dear Congress: Save open data

Imagine a government program that helps add over a trillion dollars of value to the economy every year, reduces fraudulent and wasteful government spending, and has widespread bipartisan support. In a time when members of Congress routinely struggle to find common ground, supporting such a valuable and uncontroversial program sounds like a sure winner. Fortunately, this program exists. Unfortunately, unless Congress intervenes, these benefits may disappear on Jan. 20, 2017, when the next president takes office. 

Since 2009, the federal government’s open data initiatives have been a tremendous boon for the economy, enabling established businesses and entrepreneurs alike to develop new products and services based on government data sets. Open data also makes it easier for the public to scrutinize how the government spends its money, such as by shining a light on $3.5 billion in Medicare payments. And open data has made the federal government more responsive. The Consumer Financial Protection Bureau’s Consumer Complaint Database, which collects and shares complaints from consumers about malicious financial products or companies, is consistently one of the most downloaded data sets on Data.gov.

To read this article in full or to leave a comment, please click here

Read more 0 Comments

Inherited risk: The downside of mergers

Enterprises going through mergers and acquisitions reap the benefits of new products and other assets, but they also acquire all of the threat vectors that have been targeting the other organization. In addition, new internal threats can arise as employees often fear job security when they learn of M&A deals.

2015 has been a year of abundant changes for many enterprises from private equity firms to telco companies.  

Trustwave, which announced the completion of its acquisition by Singapore Telecommunications Limited (Singtel) in late August, had itself acquired many companies in the past.

Steve Kelley, senior vice president of product and corporate marketing at Trustwave, said, “From an M&A perspective, I’ve never seen the industry as hot as it is today. One of the key reasons is that security has gone from being an IT risk to really a business risk, and that is what is driving a lot of the M&A activity.”

To read this article in full or to leave a comment, please click here

Read more 0 Comments