As the number of government records stolen increases, we continue asking why so much data was stolen over the past year without detection. The answer seems to lie in an article by Michael Cooney. It seems the U.S. government has a detection tool called EINSTEIN, but it is only partially implemented across scattered government networks.
One of the weaknesses in the EINSTEIN implementation is the lack of any behavior analysis. For the most part, the government is only using signature-based detection. This is a huge controls vulnerability.
What will it take for our bureaucratic quagmire of a government to implement the right controls. Yes, all organizations are viable targets for attack. However, detecting the attacks (e.g., anomalous network/system behavior, unexpected movement of data, etc.) is paramount to a good defense. Looks like much of the U.S. government either doesn’t get it or doesn’t care.