Very interesting article about some of the internals of the people responsible for constantly monitoring the Federal Reserve's networks for data being exfiltrated or computers on their network being compromised. They will detect if you plug in an unauthorized USB device and your computer can be instantly shunted in to a walled garden until it can be seized and searched for badness.
Amazing job these people do. This article originally appeared on the Foreign Policy web site under a really ridiculous registration system.
http://foreign-policy6.blogspot.com/2014/04/exclusive-meet-secret-fed-cyber.html
Amazing job these people do. This article originally appeared on the Foreign Policy web site under a really ridiculous registration system.
http://foreign-policy6.blogspot.com/2014/04/exclusive-meet-secret-fed-cyber.html
no subject
Date: 2014-05-07 04:02 pm (UTC)no subject
Date: 2014-05-11 05:48 pm (UTC)I wonder if we were able to talk to someone from them, what their opinion would be on their funding level.
no subject
Date: 2014-05-11 07:52 pm (UTC)I still don't understand how profit-maximalists can get away with not thinking about possible liability in case of a data breach, though.
no subject
Date: 2014-05-12 12:12 am (UTC)no subject
Date: 2014-05-12 12:37 am (UTC)