My Fed colleagues tell me that their favorite morning news station for the D.C. beltway commute is Federal News Radio (1500 on your AM dial). So I was thrilled when I was invited to talk to Tom Temin on the “Federal Drive” morning news show about Cybersecurity and Network Forensics. With the latest Home Depot breach still fresh in the news, we talked about the growing awareness that breaches are going to happen, and the importance of putting robust incident response plans in place—in advance.
Recent very public incidents involving residents and police have sparked a conversation of the value of equipping police with on-body video surveillance—not for security monitoring, but to provide law enforcement and citizens with a single source of truth. Cambridge University recently completed a study of the police department in Rialto, California—a city of about 100,000—where they saw an 89% reduction in the number of complaints against officers in a year-long trial using body cameras. Without accurate video evidence taken at the point of an incident, it becomes almost impossible to know what really happened. And in the absence of visual proof, assumptions run wild and events can spiral out of control.
A former FBI director is famous for saying that there are two types of companies: those that have been hacked, and those that will be. One of the rewards of working on scale-out storage for mission critical environments is that you get to work on solutions that make a difference—to national security, to financial markets, to our economy. Today we are pleased to announce Quantum’s partnership with FireEye in the area of network forensics—a critical component of any modern organization’s security operations.
Recent news reports have shined a big bright light on some very public cybersecurity breaches. And more organizations are asking: Could this happen to me? Am I doing enough to protect my business from a breach? Have I already been hacked—and I just don’t know it yet? There is a growing sense that a cyber attack is inevitable—a sense that traditional signature-based defenses are insufficient. As a result, organizations are increasingly adopting next-generation security solutions— that will help them to detect, investigate, and resolve the inevitable cyber attack.