Cybersecurity for IoT: The Road We’ve Traveled, The Road AheadThe NIST Cybersecurity for IoT program published Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy...
Day: November 1, 2022
The Cornerstone of Cybersecurity – Cryptographic Standards and a 50-Year Evolution
The Cornerstone of Cybersecurity – Cryptographic Standards and a 50-Year EvolutionIn today’s connected digital world, cryptographic algorithms are implemented in every device and applied to every...
Comprehensive Traceability for Android Supply-Chain Security
Comprehensive Traceability for Android Supply-Chain SecurityWe discuss the importance of traceability in the world of mobile operating systems.Leer másTrend Micro Research, News, PerspectivesWe discuss the importance...
Setting off on the Journey to the NIST Cybersecurity Framework (CSF) 2.0
Setting off on the Journey to the NIST Cybersecurity Framework (CSF) 2.0Over the past few months, NIST has been seeking feedback on the use and improvements...
NIST International Outreach Strengthened through Additional Translations and Engagement
NIST International Outreach Strengthened through Additional Translations and EngagementWith the update to the Cybersecurity Framework in full swing, NIST continues to prioritize international engagement through conversations...
Manufacturing Cybersecurity: Trends & Survey Response
Manufacturing Cybersecurity: Trends & Survey ResponseBased on our survey of over 900 ICS security leaders in the United States, Germany, and Japan, we dig deeper into...
Identity and Access Management at NIST: A Rich History and Dynamic Future
Identity and Access Management at NIST: A Rich History and Dynamic FutureDigital identity for access control is a fundamental and critical cybersecurity capability that ensures the...
Standards: The CPSO’s Best Friend
Standards: The CPSO’s Best FriendWorkshop Shines Light on Role of Standards in Cybersecurity for IoT What do Chief Product Security Officers (CPSOs) want to make their...
Next Up: Integrating Information and Communication Technology Risk Programs with Enterprise Risk Management
Next Up: Integrating Information and Communication Technology Risk Programs with Enterprise Risk ManagementGiven the increasing reliance of organizations on technologies over the past 50 years, a...
NIST’s Expanding International Engagement on Cybersecurity
NIST’s Expanding International Engagement on CybersecurityIn providing a foundation for cybersecurity advancements over the years, NIST has taken the global context into account when determining priorities...
The Final Countdown to Cybersecurity Awareness Month 2022: “It's easy to stay safe online!”
The Final Countdown to Cybersecurity Awareness Month 2022: “It's easy to stay safe online!”Today’s blog will jumpstart NIST’s celebration of Cybersecurity Awareness Month 2022! We have...
How to improve security awareness and training for your employees
How to improve security awareness and training for your employeesJust training people periodically using generic content won’t help them or your organization reduce the risk of...
NIST International Engagement Updates: CSF 2.0 Update Workshop and More
NIST International Engagement Updates: CSF 2.0 Update Workshop and MoreThe subject of international alignment and alignment with international resources continues to be an important focus for...
2022 cyber threat report details growing trends
2022 cyber threat report details growing trendsSonicWall’s mid-year report update has been released with new information on malware, ransomware, cryptojacking and more. The post 2022 cyber...
Cybersecurity Awareness Month 2022: Updating Software
Cybersecurity Awareness Month 2022: Updating SoftwareCybersecurity Awareness Month is flying by, and today’s blog identifies different security vulnerabilities that can be exposed if you are unable...
Cybersecurity Awareness Month 2022: Using Strong Passwords and a Password Manager
Cybersecurity Awareness Month 2022: Using Strong Passwords and a Password ManagerThe key behavior that we are highlighting this week for Cybersecurity Awareness Month is using strong...
Cranefly uses new communication technique in attack campaigns
Cranefly uses new communication technique in attack campaignsA threat actor dubbed "Cranefly" uses a new technique for its communications on infected targets. The post Cranefly uses...
Cybersecurity Awareness Month 2022: Enabling Multi-factor Authentication Key behavior: Multi-factor Authentication
Cybersecurity Awareness Month 2022: Enabling Multi-factor Authentication Key behavior: Multi-factor AuthenticationIn celebration of Cybersecurity Awareness Month, NIST will be publishing a dedicated blog series throughout October;...
What is data migration?
What is data migration?In business and technology, migrating data means moving it from one system or platform to another. Learn the processes and challenges of data...
Student Insights on Cybersecurity Careers
Student Insights on Cybersecurity CareersHi, our names are Aubrie, Kyle, and Lindsey! We participated in internships at the National Initiative for Cybersecurity Education (NICE) Program Office...
Cybersecurity Awareness Month 2022: Recognizing & Reporting Phishing
Cybersecurity Awareness Month 2022: Recognizing & Reporting PhishingThis blog will officially wrap up our 2022 Cybersecurity Awareness Month blog series — today we have a special...
ConnectWise fixes RCE bug exposing thousands of servers to attacks
ConnectWise fixes RCE bug exposing thousands of servers to attacksConnectWise has released security updates to address a critical vulnerability in the ConnectWise Recover and R1Soft Server...
Why Employers Should Embrace Competency-Based Learning in Cybersecurity
Why Employers Should Embrace Competency-Based Learning in CybersecurityThere is a growing movement toward increasing the use of competency and skills-based education and hiring practices in both...
The Week in Ransomware – October 28th 2022 – Healthcare leaks
The Week in Ransomware - October 28th 2022 - Healthcare leaksThis week, we learned of healthcare data leaks out of Australia, information about existing attacks, and...
Microsoft releases out-of-band updates to fix OneDrive crashes
Microsoft releases out-of-band updates to fix OneDrive crashesMicrosoft has released out-of-band updates today to address a known issue causing OneDrive and OneDrive for Business to crash...
New open-source tool scans public AWS S3 buckets for secrets
New open-source tool scans public AWS S3 buckets for secretsA new open-source 'S3crets Scanner' scanner allows researchers and red-teamers to search for 'secrets' mistakenly stored in publicly...
A global CISO’s secrets to high-performing security awareness initiatives
A global CISO’s secrets to high-performing security awareness initiativesJonathan Fischbein is the Chief Information Security Officer for cyber security vendor Check Point Software. He has more...
Instagram confirms outage following stream of user suspensions
Instagram confirms outage following stream of user suspensionsInstagram users are currently experiencing issues signing into their accounts, some of them being notified their accounts have been...
3 simple, strategic measures to stop phishing attacks
3 simple, strategic measures to stop phishing attacksEXECUTIVE SUMMARY: To celebrate Cyber Security Awareness Month, CyberTalk.org is publishing dedicated blogs throughout October. Each week, we are...
Hacking group abuses antivirus software to launch LODEINFO malware
Hacking group abuses antivirus software to launch LODEINFO malwareThe Chinese Cicada hacking group, tracked as APT10, was observed abusing security software to install a new version...