Risk
4/19/2012
12:10 PM
50%
50%

Federal IT Survey: Hacktivists, Cybercriminals Are Top Threats

Our first Federal Government Cybersecurity Survey reveals what concerns IT teams the most, and how they’re fighting back with continuous monitoring and other technologies.

InformationWeek Green - April 2012
InformationWeek Green
Download the entire April 2012 issue of InformationWeek Government, distributed in an all-digital format as part of our Green Initiative
(Registration required.)

Threats Vs. Readiness

Cybersecurity is the No. 1 priority of federal IT professionals, by a long shot. That's been the key finding of InformationWeek's Federal Government IT Priorities Survey each of the past two years, and you don't have to look any further than the threats posed by Anonymous, LulzSec, or WikiLeaks to understand why.

What are the most dangerous cyberthreats? And how are agencies responding? InformationWeek launched our 2012 Federal Government Cybersecurity Survey to find out. Our poll of 106 federal IT pros involved in IT security for their organizations was conducted in March. We asked respondents to rank the threats they face and their readiness to deal with them. We inquired about cybersecurity spending and where agencies are investing. And we probed into the most significant challenges they face.

Our survey results show that organized cybercriminals and hacktivists are viewed as the greatest threats to IT security. At the same time, government IT pros say they're least prepared for leaks that take place through social media. And a crush of competing priorities is the biggest challenge to effective execution.

The good news is that agencies feel they've made significant improvements in cybersecurity. This is the perception of agencies themselves, as well as the assessment of government evaluators charged with monitoring progress under the Federal Information Systems Management Act (FISMA).

Despite the progress, attacks are on the rise, and agencies must continue to bolster their defenses. In a report to Congress published in March on FISMA implementation in fiscal year 2011, the Office of Management and Budget (OMB) disclosed that the number of computer security incidents reported to the U.S. Computer Emergency Readiness Team (US-CERT) that impacted government agencies rose 5%, to 43,889. Longer term, federal computer security incidents have risen 650% over five years, according to a report released last fall by the Government Accountability Office. In explaining that increase, the GAO cited persistent weaknesses in information security controls, due to incomplete implementation of security programs.

So clearly, there's room for improvement in how agencies prepare and respond. Step one is raising awareness of cyberthreats and establishing an organizational commitment to readiness. It's imperative that an agency's top leaders--not just chief information security officers and their information assurance teams--get behind the effort. Steps to improve security include meeting the FISMA requirements and also understanding the security implications of new technologies such as virtualization and cloud computing.

To read the rest of the article,
Download the April 2012 issue of InformationWeek Government

The New Threat Landscape

Our full report on federal cybersecurity is free with registration.

This report includes 26 pages of action-oriented analysis, packed with 15 charts. What you'll find:
  • The top cybersecurity priorities of federal agencies
  • How FISMA compliance affects cybersecurity planning
Get This And All Our Reports


Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0174
Published: 2015-04-27
The SNMP implementation in IBM WebSphere Application Server (WAS) 8.5 before 8.5.5.5 does not properly handle configuration data, which allows remote authenticated users to obtain sensitive information via unspecified vectors.

CVE-2015-0175
Published: 2015-04-27
IBM WebSphere Application Server (WAS) 8.5 Liberty Profile before 8.5.5.5 does not properly implement authData elements, which allows remote authenticated users to gain privileges via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.