Bidding Open on DHS’ $6B Security Hub, House report stresses sharing

July 29, 2013
No Comment


DHSHere are the top news and stories of the day.

  • Vendors Question DISA’s Cloud Cost-Saving Claims – “Some contractors are questioning whether the Defense Department’s planned $450 million cloud-computing project will offer the most cost-effective solutions for its customers or merely resell industry products and services for a higher price.” The DISA cloud delivery project could offer shared services that increase the ability of the IC to meet their goals. It could also increase the ability of the IC agencies to share data with each other. Via Defense News, more here.
  • Oil, gas field sensors vulnerable to attack via radio waves – Researchers at IOActive have found a multitude of vulnerabilities in oil and gas field sensors. These monitor temperature and pipeline pressure among other things. The fact that more key sensors in ICS systems are found to be vulnerable is evidence of the inherent weaknesses in these systems and the need to secure them. Via ComputerWorld, more here.
  • Bidding is Open for the DHS’ $6 billion Security Hub – “The US Department of Homeland Security is putting into motion its plans to create a $6 billion repository for continuous monitoring security tools to be used by federal, state and local agencies.” “The suppliers will provide a centralized way for government agencies to procure hardware, software and consulting services for continuous monitoring and real-time threat detection.” The size and import of a hub such as this one should create a very interesting bidding and proposal process. Via InfoSecurity, more here.
  • Five charged with stealing 160+ million credit card numbers – “A federal indictment made public in New Jersey charges five men with conspiring in a worldwide hacking and data breach scheme that targeted major corporate networks, stole more than 160 million credit card numbers, resulted in hundreds of millions of dollars in losses and is the largest such scheme ever prosecuted in the United States.” Using a SQL-injection attacks, the group obtained access and installed backdoors into several large payment processing companies, then stole a huge amount of information from the companies. They then resold these for varying amounts, depending on the origin of the card. Via Net Security, more here.
  • Google Play store inundated with scam apps, Symantec says – “A steady stream of questionable applications is flowing daily into Google’s Play store for Android devices, according to security vendor Symantec.” Symantec believes that they have found at least 1200 malicious apps in the last seven months. These apps are often taken down quite quickly, but still can damage users. The breadth and number of these apps just increases the care a user must take when downloading apps. Via ComputerWorld, more here.

  • DoD’s new cyber teams aren’t expensive, says Carter – The 40 new cyber teams within cyber command, 1/3 of which are dedicated towards offense, constitute 4,000 personnel. The secretary of defense, Ashton Carter, does not view them as expensive, but rather an investment in cyber capabilities. While the teams are new and an addition to the US force, they have been planned and will offer the nation enhanced cyber protection. Via FierceGovernmentIT, more here.

  • House report tells federal, local law enforcement to work on sharing – “The House Homeland Security Committee on Friday issued a plea to further empower fusion centers, the regional agencies tasked with analyzing and sharing local crime data with local, state and federal officials.” While fusion centers, founded post 9-11, have been spreading and making advances, they are lacking in strategy, funding and overall metrics. Many homeland security experts believe that fusion centers can be a huge help in stopping terror and other attacks, and increase our overall security posture. Via FedScoop, more here.
  • Most Organizations Don’t Assess Time to Incident Detection as Key Security Metric – Security metrics are all over the place, but apparently many agencies are missing an extremely key metric – time to incident detection. Incident detection is the first step in the cycle, and without it, you cannot mitigate or re-mediate. Until organizations focus on this metric, they will be focusing incorrectly on threats and their cyber response. Via InfoSecurity, more here.