{"id":3022,"date":"2014-02-05T22:49:31","date_gmt":"2014-02-06T03:49:31","guid":{"rendered":"http:\/\/www.opensource.im\/?p=3022"},"modified":"2014-02-05T22:49:31","modified_gmt":"2014-02-06T03:49:31","slug":"snowden-aftermath-defense-contractors-revamp-policies-practices","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/edward-snowden\/snowden-aftermath-defense-contractors-revamp-policies-practices.php","title":{"rendered":"Snowden aftermath: Defense contractors revamp policies, practices"},"content":{"rendered":"<p><p>  Summary: Following the Edward Snowden wake-up call,  three in four defense contractors have already made significant  changes in their IT security and hiring practices.<\/p>\n<p>    Both the volume and the sensitivity of the information leaked by    former NSA contractor Edward Snowden has compelled US defense    contractors to drastically overhaul their hiring practices and    reevaluate employees' data access privileges.  <\/p>\n<p>    The new study conducted by Opinion Matters on    behalf of security software provider ThreatTrack Security found that 75 percent of IT    and security managers employed by defense contractors have    changed their cybersecurity processes in a variety of ways.  <\/p>\n<p>    Of the 100 respondents, 41 percent said they've implemented    stricter hiring practices and 39 percent acknowledged that    their own IT administrative rights have been restricted.  <\/p>\n<p>    The depth and breadth of the Snowden leaks were also a wake-up call to enterprise companies who    understand and appreciate the immense value of the intellectual    property housed and accessed on their corporate networks.  <\/p>\n<p>    \"It's interesting to note that while defense contractors seem    to have better security practices in place and are more    transparent than many companies in the private sector, they are    finding the current cyber threat onslaught just as difficult to    deal with,\" said ThreatTrack Security CEO Julian Waits, Sr., in    the report.  <\/p>\n<p>    Fifty-five percent of defense contractors are now providing    more general cybersecurity awareness training to their    employees and 52 percent have reviewed or reevaluated    employees' data access privileges.  <\/p>\n<p>    It doesn't help, contractors said, that it's become    increasingly difficult to find and hire qualified security    staffers at a time when new threats are multiplying at an    exponential rate.  <\/p>\n<p>    Twenty-six percent of contractors said there was a shortage of    \"highly skilled\" security personnel on staff and their existing    IT security team is routinely torn between resolving new    malware sample analyses and cleaning malware off executives'    devices.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.zdnet.com\/snowden-aftermath-defense-contractors-revamp-policies-practices-7000026004\/\" title=\"Snowden aftermath: Defense contractors revamp policies, practices\">Snowden aftermath: Defense contractors revamp policies, practices<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Summary: Following the Edward Snowden wake-up call, three in four defense contractors have already made significant changes in their IT security and hiring practices. Both the volume and the sensitivity of the information leaked by former NSA contractor Edward Snowden has compelled US defense contractors to drastically overhaul their hiring practices and reevaluate employees' data access privileges. The new study conducted by Opinion Matters on behalf of security software provider ThreatTrack Security found that 75 percent of IT and security managers employed by defense contractors have changed their cybersecurity processes in a variety of ways<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-3022","post","type-post","status-publish","format-standard","hentry","category-edward-snowden"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/3022"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=3022"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/3022\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=3022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=3022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=3022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}