Cybersecurity , Data Breach , Risk Management
Avoid 75% of all Data Breaches by Keeping Privileged Credentials Secure- Details
- Category: Security News
Governance , Incident Response
Directive Issuance Comes as Russians Suspected in Meddling in U.S. Elections
The Obama administration is implementing a presidential policy directive designed to coordinate response to a large-scale cyber incident.
See Also: 2016 Enterprise Security Study - the Results
"This directive establishes a clear framework to coordinate the government's response to [significant] incidents," Lisa Monaco, assistant to the president for homeland security and counter terrorism, told the International Conference on Cybersecurity, that met in New York on July 26. "It spells out which federal agencies are responsible. And it will help answer a question heard too often from corporations and citizens alike - 'In the wake of an attack, who do I call for help?'"
The administration defines a significant cyber incident as one that either on its own, or as part of a group of related incidents, would likely result in demonstrable harm to national security interests, foreign relations, the economy of the United States, public confidence, civil liberties or public health and safety of the American people.
Issuance of the directive comes as some highly regarded cyber and policy experts suspect the Russian government could be meddling in the U.S. presidential election by hacking and then leaking emails from Democratic National Committee computers (see How Should U.S. Respond If Russians Hacked DNC System? and DNC Breach More Severe Than First Believed).
Five Guiding Principles
According to a White House fact sheet, the directive outlines five principles that will guide the government during a cyber incident response:
Shared Responsibility: Individuals, the private sector and government agencies have a shared vital interest and complementary roles and responsibilities in protecting them from malicious cyber activity and managing cyber incidents and their consequences. Risk-Based Response: The federal government will determine its response actions and resource needs based on an assessment of the risks posed to an entity, national security interests, foreign relations or economy of the United States or to the public confidence, civil liberties or public health and safety of the American people. Respecting Affected Entities: Federal government responders will safeguard details of the incident, as well as related privacy and civil liberties and sensitive private sector information. Unity of Effort: Whichever federal agency first becomes aware of a cyber incident will rapidly notify other relevant agencies in order to facilitate a unified federal response and ensure that the right combination of agencies responds to a particular incident. Enabling Restoration and Recovery: Federal response activities will be conducted in a manner to expedite restoration and recovery of an entity that has experienced a cyber incident, balancing investigative and national security requirements with the need to return to normal operations as quickly as possible.Applying Lessons Learned
In explaining why the directive is needed, the White House says the United States has been faced with managing increasingly significant cyber incidents that affect the federal government and private sector.
"We have applied the lessons learned from these events, as well as our experience in other areas such as counterterrorism and disaster response," a White House statement says. "That experience has allowed us to hone our approach but also demonstrated that significant cyber incidents demand a more coordinated, integrated and structured response. We have also heard from the private sector the need to provide clarity and guidance about the federal government's roles and responsibilities."
As part of the directive, the administration released a cyber incident severity schema that establishes a common framework within the government to evaluate and assess the severity of cyber incidents and help identify significant cyber incidents in which the directive coordination procedures would apply.
According to the White House, the schema describes a cyber incident's severity from a national perspective, defining six levels, zero through five, in ascending order of severity. Each level describes the incident's potential to affect public health or safety, national security, economic security, foreign relations, civil liberties or public confidence. An incident that ranks at a level 3 or above on this schema is considered "significant" and will trigger application of the directive's coordination mechanisms.
Three Lines of Effort
The directive organizes federal response activities into three lines of effort - threat response, asset response and intelligence support activities - and establishes a federal lead agency for each.
"When a federal agency is a victim of a significant cyber incident, that agency will be the lead for this fourth line of effort," the White House statement says. "In the case of a private victim, the federal government typically will not play a role in this line of effort, but will remain cognizant of the victim's response activities consistent with these principles and coordinate with the victim."
- Details
- Category: Security News
Anti-Malware , Data Breach , Data Loss
The Big Question: Will the US Respond?
As the fallout from the leaked Democratic National Committee files continues, a new finding from an analysis of the more than 19,000 emails published by WikiLeaks suggests cyberattackers also had access to at least one staffer's personal email account.
See Also: How to Mitigate Credential Theft by Securing Active Directory
A DNC consultant saw several warnings that her Yahoo account may have been compromised by state-sponsored attackers, according to a story published on July 25 by Michael Isikoff, Yahoo's chief investigative correspondent .
The DNC consultant, Alexandra Chalupa, had been investigating connections between Republican presidential candidate Donald Trump's campaign chairman, Paul Manafort, and pro-Russian political leaders in the Ukraine, Isikoff wrote.
Meanwhile, the growing concern over the hacking of the DNC, first revealed in June, has prompted the FBI to depart from its normal protocol of staying silent about investigations.
"The FBI is investigating a cyber intrusion involving the DNC and is working to determine the nature and scope of the matter," the bureau says in a statement. "A compromise of this nature is something we take very seriously, and the FBI will continue to investigate and hold accountable those who pose a threat in cyberspace."
Democratic presidential candidate Hillary Clinton's campaign theorizes that the release of 19,252 emails and 8,034 attachments is a well-timed play by Russia intended to disrupt the Democratic Party and increase Donald Trump's standing before the November election. Although it's unlikely to ever be proven, the incident stands as a curious example of using stolen data to attempt to influence global events at a crucial political moment.
That has prompted calls from at least one expert for the U.S. government to take action, treat WikiLeaks as a counterintelligence target and come forward with more definitive evidence of who perpetrated the DNC attacks.
"American inaction now risks establishing a de facto norm that all election campaigns in the future, everywhere, are fair game for sabotage - sabotage that could potentially affect the outcome and tarnish the winner's legitimacy," writes Thomas Rid, a professor in the Department of War Studies at King's College in London, in Vice's MotherBoard.
"State-Sponsored Actors" Alert
Pictured: Screenshot of a Yahoo alert forwarded to DNC by consultant Alexandra Chalupa in May. (Source: WikiLeaks.)
Chalupa, the DNC's director of ethnic engagement, on May 3 wrote an email to Luis Miranda, the organization's communications director. It included a screenshot of a Yahoo warning, alerting her that her account might have been compromised by "state-sponsored actors."
"Since I started digging into Manafort, these messages have been a daily occurrence on my Yahoo account despite changing my password often," she wrote.
Yahoo first began providing alerts to users that their accounts might be the target of state-sponsored actors in December 2015. That was well after Google, which instituted such warnings in June 2012. In January 2010, Google was the first technology company to openly accuse China of coordinated attacks against Gmail accounts of activists, in the so-called Operation Aurora incident.
Chalupa's frustration in seeing the warning repeatedly would suggest that her computer was infected with malware. That would have made it easy for attackers to obtain her new passwords with a keystroke logger, rendering futile any subsequent attempts she might make to secure her Yahoo account.
Given attackers' apparent access to a wide range of DNC email accounts - as revealed by the WikiLeaks DNC leaks - compromising Chalupa's computer would theoretically have been easy. Attackers could have sent her a malware-laced document or malicious link from a legitimate DNC account, thus tricking her into falling for an exploit designed to give attackers persistent access to her machine.
Will the U.S. Respond?
Because of increasing concerns over the impact of state-funded hacking, the United States has previously confronted governments for hack attacks, particularly when cyberattacks have been directed at private companies.
In May 2014, U.S. prosecutors indicted five alleged members of Unit 61398, a Chinese Army signals intelligence unit, for allegedly stealing industrial trade secrets from six U.S. organizations over eight years. It was the first such indictment of its kind, intended to send a strong message to China that intellectual property theft would not be tolerated, although the accused still remain at large.
In December 2014, just a few weeks after Sony Pictures Entertainment experienced a devastating attack that stole gigabytes of information and destroyed computers, the U.S. government attributed the attack to North Korea.
Just two days after hackers were booted from the DNC's network, meanwhile, the DNC hired incident response firm CrowdStrike, which published a blog post saying it believed two Russian groups - nicknamed Cozy Bear and Fancy Bear - were responsible, based on forensic clues. Last year, Cozy Bear broke into the unclassified networks of the State Department, White House and Joint Chiefs of Staff. Fancy Bear, suspected to be linked with Russia's GRU intelligence unit, is believed to have attacked Germany's Parliament and France's TV5 Monde.
Rid, in his Vice report, summarizes what looks to be compelling technical evidence that there's a Russian connection to the DNC hack attacks and says that it's also possible that Guccifer 2.0 - who leaked DNC documents on a WordPress blog and claimed to have passed the emails to WikiLeaks - might be working with Russia. Guccifer 2.0 has claimed to have separately breached the DNC and to have been operating alone.
The influence of the leak and disruption of an ongoing campaign likely meets the "red line" for strong action by the U.S. government, says Justin Harvey, CSO of Fidelis Cybersecurity. "The American people deserve to know if the government has evidence that confirms this attack was state-sponsored," he says. "If it was, then a whole new level of foreign policy decisions must be made in relation to the leaks."
Christopher Soghoian, principal technologist with the American Civil Liberties Union, cast the DNC situation in a broader light on Twitter. "OK, now that serious people believe that a foreign government is trying to impact U.S. elections, can we agree that internet voting is too dangerous?"
It's easy to forget, but the CIA Director's AOL account was hacked by a teenager just a few months back. DC politicos are easy cyber prey.
- Details
- Category: Security News
- Details
- Category: Security News
Cybersecurity , Data Breach , Risk Management
A Practical Approach to Digital Clinician and Patient CredentialsYou might also be interested in …
- Details
- Category: Security News
More Articles …
Page 3470 of 3546







Today's organization needs to provide its employees, partners, applications and even networks access to its data and IT environment regardless of how they access it. But trying to maintain security and compliance in this increasingly complex hybrid IT world becomes a challenge - particularly if those solutions end up limiting productivity and hobble innovation and competitiveness.
Identity management and device compliance is essential to today's organizations, whether they are accessing information via traditional enterprise applications or through cloud services on their personal devices. That's why centrally managed "Secure Access," the ability to safeguard credentials across hybrid IT infrastructures, is the best method for ensuring data security and compliance for your organization.
Register for this session to hear from David Goldschlag, Senior Vice President of Strategy and CTO at Pulse Secure, to learn why secure access and flexibility go hand in hand in forming a successful and secure IT network.
To ensure that your employees and partners maintain data security no matter how they access your hybrid IT infrastructure, you need to have a central authentication and compliance solution in place. And leveraging a solution like Pulse Connect Secure enables organizations to deliver fast, secure, and optimized access to data center applications and cloud services while ensuring a consistent native-user experience across any device.
In this informative webinar, Pulse Secure CTO David Goldschlag will discuss:
The importance of having a single authentication and compliance policy for your hybrid IT infrastructure;
How to improve visibility and context to filter traffic and enforce secure access policies;
Real-world examples of how Pulse Secure's Secure Access architecture enables users to securely access Microsoft Office365 and SAP from iOS devices.
You might also be interested in …

