Inside the Second White House Ransomware Summit

Ransomware is a growing, international threat. It’s also an insidious one.  The state of the art in ransomware is simple but effective. Well-organized criminal gangs hiding in safe-haven countries breach an organization, find, steal and encrypt important files. Then they present victims with the double incentive that, should they refuse to pay, their encrypted files […]

The post Inside the Second White House Ransomware Summit appeared first on Security Intelligence.

Continue reading Inside the Second White House Ransomware Summit

What CISOs Want to See From NIST’s Impending Zero Trust Guidelines

Cybersecurity at U.S. federal agencies has been running behind the times for years. It took an executive order by President Joe Biden to kickstart a fix across the agencies. The government initiative also serves as a wake-up call to enterprises lagging in getting zero trust up and running.  Several organizations, including the Office of Management […]

The post What CISOs Want to See From NIST’s Impending Zero Trust Guidelines appeared first on Security Intelligence.

Continue reading What CISOs Want to See From NIST’s Impending Zero Trust Guidelines

A Response Guide for New NSA and CISA Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) recently published a report highlighting a range of critical security vulnerabilities requiring attention from organizations of all types. The report was published with input from the National Security Agency (NSA) and similar agencies worldwide. It should be considered essential reading.  Many of the vulnerabilities in the report are […]

The post A Response Guide for New NSA and CISA Vulnerabilities appeared first on Security Intelligence.

Continue reading A Response Guide for New NSA and CISA Vulnerabilities

The Cost of a Data Breach for Government Agencies

What happens when attackers breach local government, police departments or public health services? What would happen if attackers compromised the U.S. Treasury’s network? These types of incidents happen every month and lead to service interruptions at the very least. More serious problems could occur, such as leakage of classified data or damage to critical infrastructure. […]

The post The Cost of a Data Breach for Government Agencies appeared first on Security Intelligence.

Continue reading The Cost of a Data Breach for Government Agencies

How Cybersecurity Policy Has Changed Since the SolarWinds Attack

Major cyberattacks since 2019 jolted the U.S. government and software industry into action. The succeeding years have seen executive orders, new funding, two summits and a newfound resolve. Because of those attacks, the federal government aims to fix the open-source software security threat altogether. But what has really come of these efforts in the last […]

The post How Cybersecurity Policy Has Changed Since the SolarWinds Attack appeared first on Security Intelligence.

Continue reading How Cybersecurity Policy Has Changed Since the SolarWinds Attack

Everything CISOs Need to Know About NIST

It’s never been harder to be a chief information security officer (CISO). In 2021, there were 50% more attacks each week compared to 2020. Without a plan, maintaining a robust security posture is an uphill struggle.  Thankfully, the National Institute of Standards and Technology (NIST) offers CISOs the guidance they need. Read on to learn […]

The post Everything CISOs Need to Know About NIST appeared first on Security Intelligence.

Continue reading Everything CISOs Need to Know About NIST

U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack

More than a year ago, a ransomware attack made the news across the nation. The Colonial Pipeline Company announced on May 7, 2021, that the DarkSide Ransomware-as-a-Service group, based in eastern Europe, had hit it. The FBI has since confirmed DarkSide, which has since shut down, as the threat actors. What’s changed about U.S. cyber […]

The post U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack appeared first on Security Intelligence.

Continue reading U.S. Cybersecurity Policy Has Changed Since the Colonial Pipeline Attack

A Common Mission: Improve the Cybersecurity Posture of the Nation

Securing information and infrastructure is among the highest national security priorities. In recent months and years, we continue to see an escalating sophistication and frequency of attacks by malicious actors and nation-states. In response, leaders are taking action. The Executive Order 14028 has focused both the Federal government and the private sector on aligning to […]

The post A Common Mission: Improve the Cybersecurity Posture of the Nation appeared first on Security Intelligence.

Continue reading A Common Mission: Improve the Cybersecurity Posture of the Nation

What Cybersecurity Teams Can Learn From the US Cyber Command’s ‘Hunt Forward’

After decades of playing defense, the United States government went on the offense in the past few years against global state-sponsored cyber attackers. U.S. Cyber Command conducted “hunt forward” operations recently in 16 countries, including in Ukraine, as part of a policy set in 2018.  This policy involves partnering with foreign countries on finding cyber […]

The post What Cybersecurity Teams Can Learn From the US Cyber Command’s ‘Hunt Forward’ appeared first on Security Intelligence.

Continue reading What Cybersecurity Teams Can Learn From the US Cyber Command’s ‘Hunt Forward’

One Year After the Colonial Pipeline Attack, Regulation Is Still a Problem

The Colonial Pipeline cyberattack is still causing ripples. Some of these federal mandates may mark major changes for operational technology (OT) cybersecurity. The privately held Colonial Pipeline company, which provides nearly half of the fuel used by the East Coast — gasoline, heating oil, jet fuel and fuel for the military totaling around 100 million […]

The post One Year After the Colonial Pipeline Attack, Regulation Is Still a Problem appeared first on Security Intelligence.

Continue reading One Year After the Colonial Pipeline Attack, Regulation Is Still a Problem