Cybersecurity Blog: The Cyber Scene is evolving, are you?

Return to blog
Angela Heise is President of the Civil Group at Leidos. In this capacity, she is responsible for providing solutions to US Cabinet-level civil agencies and major elements of the public sector across the globe. Focus areas include energy and the environment, utilities, manufacturing and industrial, federal infrastructure, air traffic management, exploration and mission support, cybersecurity and information technology. Prior to this role, Heise served as vice president of Commercial Markets for Lockheed Martin-Commercial Cyber, where she was responsible for delivery of a portfolio of cybersecurity and information technology solutions and services to commercial Global 1000 customers. Heise graduated from Southern Illinois University with a Bachelor of Science in computer science. She was recognized in 2012 as Aviation Week’s Top 40 under 40 and in 2013 was one of Federal Computing Week’s Top 100 Executives.

Organizations in the financial services sector have a lot on their plates these days. From dealing with smaller profit margins and challenging regulations, to grappling with higher customer expectations and evolving technologies, there is no shortage of challenges. This includes facing an increase in cyberattacks on the financial services industry.

Read more

As previously discussed (TIP Defined blog post), a properly employed Threat Intelligence Platform can enable an organization to take a more effective approach to computer network defense. In this post we will delve a bit deeper into how a Threat Intelligence Platform (TIP) can act as a tool for incident response and investigations, becoming a central hub for SOC operations performing with an Intelligence Driven Defense®mindset.

Read more

One of the most important aspects of cybersecurity is intelligence. Fighting and defending against constant attacks without the proper knowledge of who they are, how and why they are attacking, as well as a lack of understanding of the characteristics that signal an attack can lead to a massive data breach or disruption of service.

Read more

Everywhere you turn it seems as though there is another article or blog about ‘Big Data’.

Given the importance of data and the opportunities it provides to businesses—to fuel better business decisions, facilitate more meaningful customer interactions, and develop new products and services—the topic is worthy of much discussion.

Read more

After reporting that hackers had stolen more than 500 million financial records worldwide in 2014, the director in the FBI’s Cyber Division issued a warning saying, “You’re going to be hacked. Have a plan.” -Heartland Blog

Read more

Arguably one of the most important aspects of cybersecurity is Threat Intelligence. Yet despite its importance, this particular discipline as part of a solid security posture is often underestimated in terms of importance.

The consulting company, Forrester, defines threat intelligence as the details of the motivations, intent and capabilities of internal and external threat actors. Forrester extends their definition of Threat Intelligence to include specifics on the tactics, techniques and procedures that hackers and Advanced Persistent Threats employ within their attacks. - Threat Intelligence Buyer’s Guide SANS CTI Summit, 10 February 2014.

Read more

The US payment system provides one of the greater challenges within cybersecurity. When most people hear about the payment system within the banking industry, they often have varying degrees of understanding as to what that exactly it is.

Read more

Advanced Persistent Threat (APT), as a term, is perhaps over-used in cybersecurity. Like the Boogie-Man that strikes fear into the minds and hearts of children at night, APTs work just as hard to ensure that CISOs and CIOs never rest easily. But just like the Boogie-Man, the trick to not being afraid of APTs is to understand them. Unfortunately, understanding APTs isn’t as simple as a bed time story.

Read more