Apple’s 45-day certificate proposal: A call to action

In a bold move, Apple has published a draft ballot for commentary to GitHub to shorten Transport Layer Security (TLS) certificates down from 398 days to just 45 days by 2027. The Apple proposal will likely go up for a vote among Certification Authority… Continue reading Apple’s 45-day certificate proposal: A call to action

A closer look at the 2023-2030 Australian Cyber Security Strategy

In this Help Net Security video, David Cottingham, CEO of Airlock Digital, discusses the 2023-2030 Australian Cyber Security Strategy and reviews joint and individual cybersecurity efforts, progress, and strategies over the past year. The Australian Go… Continue reading A closer look at the 2023-2030 Australian Cyber Security Strategy

Why AI-enhanced threats and legal uncertainty are top of mind for risk executives

AI-enhanced malicious attacks are the top emerging risk for enterprises in the third quarter of 2024, according to Gartner. Key emerging risks for enterprises It’s the third consecutive quarter with these attacks being the top of emerging risk. IT vend… Continue reading Why AI-enhanced threats and legal uncertainty are top of mind for risk executives

TSA issues proposed cyber mandates for pipelines, rail, airlines

The post-Colonial Pipeline proposal requires the agency’s charges to follow one cyber mandate to rule them all.

The post TSA issues proposed cyber mandates for pipelines, rail, airlines appeared first on CyberScoop.

Continue reading TSA issues proposed cyber mandates for pipelines, rail, airlines

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM’s 2024 Cost of a Data Breach report. This underscores the need for robust IT […]

The post Exploring DORA: How to manage ICT incidents and minimize cyber threat risks appeared first on Security Intelligence.

Continue reading Exploring DORA: How to manage ICT incidents and minimize cyber threat risks