NIST Cybersecurity Framework 2.0

NIST has released version 2.0 of the Cybersecurity Framework:

The CSF 2.0, which supports implementation of the National Cybersecurity Strategy, has an expanded scope that goes beyond protecting critical infrastructure, such as hospitals and power plants, to all organizations in any sector. It also has a new focus on governance, which encompasses how organizations make and carry out informed decisions on cybersecurity strategy. The CSF’s governance component emphasizes that cybersecurity is a major source of enterprise risk that senior leaders should consider alongside others such as finance and reputation…

Continue reading NIST Cybersecurity Framework 2.0

Roundup: Federal action that shaped cybersecurity in 2023

As 2023 draws to a close, it’s time to look back on our top five federal cyber stories of the year: a compilation of pivotal moments and key developments that have significantly shaped the landscape of cybersecurity at the federal level. These stories highlight the challenges federal agencies faced in securing digital infrastructure in the […]

The post Roundup: Federal action that shaped cybersecurity in 2023 appeared first on Security Intelligence.

Continue reading Roundup: Federal action that shaped cybersecurity in 2023

Renewable energy rides solar cycle paths through Dutch provinces

The Dutch love to cycle. So much so that there are more than 35,000 km (over 56,000 miles) of cycle paths snaking through the Netherlands. Two of those bike routes have now been topped with photovoltaic cells to produce renewable energy while they face… Continue reading Renewable energy rides solar cycle paths through Dutch provinces

What to do if your company was mentioned on Darknet?

We created a list of companies worldwide from different industries and searched through Darknet trying to find out how likely these companies have suffered a breach, what kind of data leaked, and what to do with it. Continue reading What to do if your company was mentioned on Darknet?

Sandworm, a Russian Threat Actor, Disrupted Power in Ukraine Via Cyberattack

Any company that is strategic could be targeted for the same kind of actions as this cyberattack. Follow these tips to mitigate your company’s risk to this cybersecurity threat. Continue reading Sandworm, a Russian Threat Actor, Disrupted Power in Ukraine Via Cyberattack

Some of the Biggest Movies, TV Shows You Love Rely on Local Data Centre Infrastructure

Australia and New Zealand-based film production partner The Rebel Fleet works on movie and TV projects big and small. CEO Michael Urban says data centre infrastructure is making it all possible. Continue reading Some of the Biggest Movies, TV Shows You Love Rely on Local Data Centre Infrastructure

EPA Won’t Force Water Utilities to Audit Their Cybersecurity

The industry pushed back:

Despite the EPA’s willingness to provide training and technical support to help states and public water system organizations implement cybersecurity surveys, the move garnered opposition from both GOP state attorneys and trade groups.

Republican state attorneys that were against the new proposed policies said that the call for new inspections could overwhelm state regulators. The attorney generals of Arkansas, Iowa and Missouri all sued the EPA—claiming the agency had no authority to set these requirements. This led to the EPA’s proposal being …

Continue reading EPA Won’t Force Water Utilities to Audit Their Cybersecurity

The importance of Infrastructure as Code (IaC) when Securing cloud environments

According to the 2023 Thales Data Threat Report, 55% of organizations experiencing a data breach have reported “human error” as the primary cause. This is further compounded by organizations now facing attacks from increasingly sophisticated cyber criminals with a wide range of automated tools. As organizations move more of their operations to the cloud, they […]

The post The importance of Infrastructure as Code (IaC) when Securing cloud environments appeared first on Security Intelligence.

Continue reading The importance of Infrastructure as Code (IaC) when Securing cloud environments