Insider Threats and the Snowden Spying Tsunami at NSA

The buzz at the AFCEA (Armed Forces Communications and Electronics Association) CYBERCOM this year was focused on the NSA (National Security Agency) spying leaks by Edward Snowden.  In particular, points of discussion revolved around the impact these leaks would have on the NSA, our national security, foreign policy, and our image around the world.

GEN Keith Alexander, Commander, US Cyber Command; Director, NSA, defended the integrity of those who work at NSA, the intention of the mission, and the controls placed on it by Congressional oversight and the courts.

With far reaching and growing threats from terrorism, both inside and outside the US, there is a delicate balance that must be struck between security and privacy.  Sources and methods employed to protect us from those threats must remain confidential, and leaks of any kind put too much information into the public domain.  Thus, the emphasis at the show was on “Insider Threat“.

While everyone has their head in the clouds, someone has to keep their feet on the ground…

As displayed at CYBERCOM, most attention by large and small companies has been placed on:

  • IT network security
  • audit tracking
  • behavioral analysis and anomalies
  • multi-domain compartmentalization
  • and access control management

The one area that keeps getting ignored, and is at the genesis of the Insider Threat, is physical infrastructure security… particularly, the last six feet to the desktop; the man-machine interface to the network.  It must work, hand-in-hand, with other countermeasures to insure seamless protection from the user to the cloud.

While everyone has their head in the clouds, someone has to keep their feet on the ground.  This is the essence of Trusted Layer Zero; seamless user-to-the-cloud protection.  This was on display at our booth at CYBERCOM, where Trusted Systems was the only exhibitor focused on physical infrastructure security.