OVERVIEWBy looking at a very specific vector into industrial automation environments, we get a unique opportunity to analyze the real malware threats that industrial organizations face.This...
Category: Last Article Publication
SECURING THE SOFTWARE SUPPLY CHAIN – RECOMMENDED PRACTICES GUIDE FOR DEVELOPERS
Executive SummaryCyberattacks are conducted via cyberspace and target an enterprise’s use of cyberspace for thepurpose of disrupting, disabling, destroying, or maliciously controlling a computing environment orinfrastructure;...
Cyberjutsu – Cybersecurity for the Modern Ninja by Ben McCarty
Cybersecurity has never been this critical to our economic prosperity and social peace. The need to protect our businesses’ intellectual property and people’s personal information is...
Zero Trust Architecture (ZTA) Buyer´s Guide by GSA
This guide is intended to assist agencies with acquiring products and services to support and alignwith their Zero Trust Security Strategy. We fully recognize that each...
Earning Trust in the 21st Century – Cloud Security Alliance – DC (CSA-DC) Research
n today’s interconnected and technology reliant world, the expectation of trust and need to trustis growing. [1] Today’s trust-based solutions may become non-viable in the future....
CISO Perspectives and Progress in Deploying Zero Trust Report & Survey by Cloud Security Alliance CSA
Report on the results of a CSA CISO survey. Areas covered include where Zero Trust falls as a priority in the organization, the percentage of those...
Attack Surface Management by Claudio Benavente Cyber Security Advisor
Muito tem se falado sobre como ser mais preditivo e gerenciar riscos de cibersegurança de maneira mais abrangente. Com a adoção cada vez mais crescente de...
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI) Metrics – Incident Response (IR) Metrics for CISOs by SCYTHE
10 WAYS ASSET VISIBILITY BUILDS THE FOUNDATION FOR OT CYBERSECURITY – KNOWING THE DATA YOU NEED TO COLLECT ISN’T ENOUGH IF YOU DON’T HAVE FULL ASSET VISIBILITY by DRAGOS
EXECUTIVE SUMMARY Asset visibility plays a vital role in operational technology (OT) cybersecurity. Whether they’re running industrial control systems (ICS) or industrial internet of things (IIoT)...
The SOC of the Future by Jeffrey Wheat (Lumu`s CTO)
url pub: https://lumu.io/blog/soc-of-the-future/ Lumu’s recently appointed Field CTO Jeffrey Wheat looks at the future of the SOC and how incremental improvement leads to proficient operations. Beginning...
The Zero Trust Model in Cybersecurity – Towards undesstanding and deployment – Community Paper – World Economic Forum
Executive summary In the last couple of years, “zero trust” has gained significant traction in the cybersecurity realm as ameans to protect networks and increase security...