Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
OPM Breach Shows Government Cybersecurity Remains Work In Progress
Newest First  |  Oldest First  |  Threaded View
Enrico Fontan
50%
50%
Enrico Fontan,
User Rank: Strategist
6/5/2015 | 3:44:39 PM
EINSTEIN System to tune
Government says the breach has been discovered by EINSTEIN system.

If you look at the EINSTEIN system, it possible to see that it has been developed to detect cyber threats.
Looking at the system last evolution we can see that EINSTEIN 3 system adds an IPS to improve it's capabilities:
"The intrusion prevention capability (IPS) builds upon the previous versions by adding the ability to block and disable attempted intrusions before any harm is done."

I think the IPS feature has to be developed again.


EINSTEIN reference "Cross Agency Priority Goal: Cybersecurity FY2013 Q4 Status Update"
kbannan100
50%
50%
kbannan100,
User Rank: Moderator
6/5/2015 | 11:58:29 AM
Being ahead of a breach
This just shows that even the most sophisticated and (you'd hope) solid security measures don't always work. You constantly have to be ahead of a breach and be looking for the unexpected. 

bit.ly/1P0OVdV

--KB 

Karen J. Bannan, commenting on behalf of IDG and FireEye.
Paladium
100%
0%
Paladium,
User Rank: Moderator
6/5/2015 | 10:23:57 AM
Work in progress....?
No, sadly, the excuse that cybersecurity is a work in progress is unacceptable.  

"Here ya go Sir.  Your car is good as new.  Don't worry about the brakes.  They are not hooked up yet.  Just drive slow.  The tires should be fine too.  No worries.  Just don't make any sharpe turns or they might fall off.  We just couldn't get to putting the nuts on them yet.  A stearing wheel you say?  Here, use this long handled screwdriver to turn the stearing collum."

The single, most important fact everyone should take away from these Government breaches is that politics (petty kingdoms, lack of authority, onerous processes to remove a single screw..., etc.) *prevent* cybersecurity from being properly implemented.  Cold, hard, undisputable fact.  

Ask pretty much every single former (who chose to walk away) federal contractor providing cybersecurity services what the number one reason is.


Stop Defending Everything
Kevin Kurzawa, Senior Information Security Auditor,  2/12/2020
Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems
Jai Vijayan, Contributing Writer,  2/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-4230
PUBLISHED: 2020-02-19
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.1 and 11.5 is vulnerable to an escalation of privilege when an authenticated local attacker with special permissions executes specially crafted Db2 commands. IBM X-Force ID: 175212.
CVE-2019-4429
PUBLISHED: 2020-02-19
IBM Maximo Asset Management 7.6.0 and 7.6.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 162886.
CVE-2019-4457
PUBLISHED: 2020-02-19
IBM Jazz Foundation 6.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, and 6.0.6.1 could allow an authenticated user to obtain sensitive information that could be used in further attacks against the system. IBM X-Force ID: 163654.
CVE-2019-4640
PUBLISHED: 2020-02-19
IBM Security Secret Server 10.7 processes patches, image backups and other updates without sufficiently verifying the origin and integrity of the code which could result in an attacker executing malicious code. IBM X-Force ID: 170046.
CVE-2020-4135
PUBLISHED: 2020-02-19
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow an unauthenticated user to send specially crafted packets to cause a denial of service from excessive memory usage.