Financial institutions can strengthen cybersecurity with SWIFT’s CSCF v2021

The Society for Worldwide Interbank Financial Telecommunications (SWIFT) has introduced an updated set of baseline customer security controls that all of its users must implement on their SWIFT-related infrastructure by mid-year 2021. SWIFT is the worl… Continue reading Financial institutions can strengthen cybersecurity with SWIFT’s CSCF v2021

Notable Enhancements to the New Version of NIST SP 800-53

As an infosec professional, you’ve likely heard of the National Institute of Standards and Technology (NIST). If you are unfamiliar with NIST, it is an organization that produces many publications including the well-respected Special Publication SP 800… Continue reading Notable Enhancements to the New Version of NIST SP 800-53

Zoom Takes on Zoom-Bombers Following FTC Settlement

The videoconferencing giant has upped the ante on cybersecurity with three fresh disruption controls. Continue reading Zoom Takes on Zoom-Bombers Following FTC Settlement

Meeting the Challenges of Remote Work with Chrome OS Policy Settings – Part II

Welcome to the second part of this two-part blog series for administrators who are new to the Chromebook enterprise system. In the previous blog, we discussed settings that are applicable to users and applications. In this blog, we will further explore… Continue reading Meeting the Challenges of Remote Work with Chrome OS Policy Settings – Part II

The Center for Internet Security (CIS) Use Cases and Cost Justification

Vince Lombardi, the famous football coach, used to start his training camp each season with a talk about doing the basics. He’d tell the players that they start with the basics, then he’d take a football and hold it up and tell them, &#8220… Continue reading The Center for Internet Security (CIS) Use Cases and Cost Justification

Internet security is improving, but exposures still run rampant

Rapid7’s research found that the security of the internet overall is improving. The number of insecure services such as SMB, Telnet, rsync, and the core email protocols, decreased from the levels seen in 2019. Vulnerabilities and exposures still … Continue reading Internet security is improving, but exposures still run rampant

Understanding the Purpose of Security Controls and the Need for Compliance

What are the brakes on a car designed to do? I have asked this question many times when speaking to customers or organizations who were dipping their toes into the audit space. Invariably, their answer was, “To stop the car.” At this point,… Continue reading Understanding the Purpose of Security Controls and the Need for Compliance

The CSA IoT Security Controls Framework

Building the Case for IoT Security Framework The Internet of Things (IoT) is growing in technical, social, and economic significance. ENISA defines the increasingly complex IoT systems as “cyber-physical ecosystem[s] of interconnected sensors and… Continue reading The CSA IoT Security Controls Framework

Foundational Controls Make the Hard Things Easier to Do

Let’s begin with a short story. Imagine that we have two large organizations in the public sector. These entities are very similar. Both are on the receiving end of cyber threats. Both adhere to multiple compliance standards. And both need to ens… Continue reading Foundational Controls Make the Hard Things Easier to Do

How Zero Trust Will Change Your Security Design Approach

How would Zero Trust change the way security solutions are designed and where does one even start when implementing Zero Trust principles into their architecture? Learn more here.

The post How Zero Trust Will Change Your Security Design Approach appeared first on Security Intelligence.

Continue reading How Zero Trust Will Change Your Security Design Approach