How to Use NIST’s Cybersecurity Framework to Protect against Integrity-Themed Threats

When it comes to the CIA triad, confidentiality generally commands most of the attention. Organizations are worried about the unauthorized disclosure of their data, so they concentrate on reducing the risks of that type of an incident. In so doing, how… Continue reading How to Use NIST’s Cybersecurity Framework to Protect against Integrity-Themed Threats

Design Considerations for Azure Web Apps

Aidan Finn discusses things you should consider when designing an Azure App Service deployment.

The post Design Considerations for Azure Web Apps appeared first on Petri.

Continue reading Design Considerations for Azure Web Apps

Choosing the Right Security Framework to Fit Your Business

By adopting a hybrid security framework, organizations can cherry-pick the guidelines and compliance requirements that meet their unique business objectives.

The post Choosing the Right Security Framework to Fit Your Business appeared first on Security Intelligence.

Continue reading Choosing the Right Security Framework to Fit Your Business

Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges

Organizations that follow both the COSO enterprise risk management framework and the NIST CSF can vastly improve their cyber risk oversight and management.

The post Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges appeared first on Security Intelligence.

Continue reading Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges

Risk assessment: The first step in improving cyber security

Despite the proliferation of high profile cyber-attacks over the last 18 months, many organisations are still too disorganised in their approach to security. While it is no longer feasible to guarantee 100% protection against a breach, businesses are setting themselves up for a fall by failing to adequately understand and prepare for the risks facing them. PwC’s 2018 Information Security Survey, which surveyed more than 9,000 business and technology executives around the world, found that … More Continue reading Risk assessment: The first step in improving cyber security

It’s time for a common sense security framework

Privacy Rights Clearinghouse maintains a database of every data breach made public since 2005, and as the total number of records rapidly approaches one billion, board members, infosec leaders, and consumers are all asking the same question: Why does this keep happening? It’s not like we don’t collectively understand how to secure our systems and networks. NIST maintains nearly two hundred special publications focused on computer security, and the ISO 27000 series contains dozens of … More Continue reading It’s time for a common sense security framework

Turla gets ready to target Mac users

The cyber espionage group deploying the Turla (aka Snake, Uroburos, or Agent.BTZ) malware framework is expected to be able to target Mac users soon. The APT group The group, which security researchers named after the tool, has been operating for years, and was first spotted targeting computers running the Windows, then later also Linux users. They have been targeting corporations, intelligence and other government agencies, and are widely believed to be of Russian origin. “Compared … More Continue reading Turla gets ready to target Mac users

IoT Trust Framework: The foundation for future IoT certification programs

The Online Trust Alliance (OTA) released its updated IoT Trust Framework. Serving as a product development and risk assessment guide for developers, purchasers and retailers of Internet of things (IoT) devices, the Framework is the foundation for future IoT certification programs. OTA’s goal is to highlight devices and companies that demonstrate a commitment to device lifecycle security and embrace responsible privacy practices. Such notifications and disclosures will aid consumers to make informed IoT device purchasing … More Continue reading IoT Trust Framework: The foundation for future IoT certification programs

Cybersecurity: This Is Not a Drill

Organizations large and small must address many common cybersecurity vulnerabilities to keep up with the evolving threat landscape.

The post Cybersecurity: This Is Not a Drill appeared first on Security Intelligence.

Continue reading Cybersecurity: This Is Not a Drill

A Risk-Driven Approach to Security, From Check Boxes to Risk Management Frameworks

Department heads have to start thinking about risk management in terms of acceptable risk levels, not compliance requirements to mark off a checklist.

The post A Risk-Driven Approach to Security, From Check Boxes to Risk Management Frameworks appeared first on Security Intelligence.

Continue reading A Risk-Driven Approach to Security, From Check Boxes to Risk Management Frameworks