Lack of adequate investments hinders identity security efforts

Organizations are still grappling with identity-related incidents, with an alarming 90% reporting one in the last 12 months, a 6% increase from last year, according to The Identity Defined Security Alliance (IDSA). Protecting digital identities As iden… Continue reading Lack of adequate investments hinders identity security efforts

Why organizations should adopt a cloud cybersecurity framework

The cloud is the future of enterprise architecture. It’s economical (to a degree), it’s scalable, it’s flexible and – best of all – it’s someone else’s responsibility. Again, to a point. That’s because the cloud comes with its own set of se… Continue reading Why organizations should adopt a cloud cybersecurity framework

Preparing for federal supply chain security standardization

In 2021, the Biden Administration published the Executive Order on Improving the Nation’s Cybersecurity (EO 14028), setting off an agency-wide security initiative with the ultimate objective of standardizing security requirements across the Department … Continue reading Preparing for federal supply chain security standardization

Tython: Open-source Security as Code framework and SDK

Development teams utilize automation through Infrastructure as Code (IaC) to facilitate rapid and frequent changes to their cloud-native architectures. Security teams must adopt automation and incorporate security measures into code to keep up with the… Continue reading Tython: Open-source Security as Code framework and SDK

OSC&R open software supply chain attack framework now on GitHub

OSC&R (Open Software Supply Chain Attack Reference) is an open framework for understanding and evaluating software supply chain security threats. It has received the endorsement of former U.S. NSA Director Admiral Mike Rogers, and is now available… Continue reading OSC&R open software supply chain attack framework now on GitHub

How healthcare CISOs can automate cloud security controls

Cloud environments provide many benefits, primarily involving their ease of scalability and resilience. Those qualities exist because of automation and the easy and straightforward way to leverage that to enhance a cloud environment. While that ease th… Continue reading How healthcare CISOs can automate cloud security controls

ML practitioners push for mandatory AI Bill of Rights

The AI Bill of Rights, bias, and operational challenges amid tightening budgets are pressing issues affecting the adoption of ML as well as project and initiative success, according to Comet. “Our latest survey comes as ML practitioners are facing a ne… Continue reading ML practitioners push for mandatory AI Bill of Rights

Mapping Threat Intelligence to the NIST Compliance Framework Part 2

How threat intelligence is critical when justifying budget for GRC personnel, and for threat intelligence, incident response, security operations and CISO buyers.

The post Mapping Threat Intelligence to the NIST Compliance Framework Part 2 appeared first on SecurityWeek.

Continue reading Mapping Threat Intelligence to the NIST Compliance Framework Part 2