SANS Cyber Defense blog pertaining to Instructor Spotlight: Micah Hoffman, SEC487 AuthorRead More Instructor Spotlight: Micah Hoffman, SEC487 Author
Divers find three-foot “blobs” — egg sacs of the squid Illex coindetii — off the coast of Norway.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog pos…
To achieve DevSecOps you need to shift security left. Sounds simple, right? Well, it???s easier said than done.
A recent survey conducted by SANS Institute found that 74 percent of organizations are deploying software changes more than once per month ?…
The UK data protection landscape is a lot more complex following Brexit. Many organisations are now subject to both the EU GDPR (General Data Protection Regulation) and the UK GDPR (General Data Protection). The UK version was born out of the EU GDPR, so you might think that there are only cosmetic differences and that minor actions are required to adjust your documentation and compliance practices. Unfortunately, it’s not that straightforward. If you haven’t done so already, you must ensure that your data protection policies and procedures account for both sets of requirements. In this blog, we look at some
The post Updating your data protection documentation following Brexit appeared first on IT Governance UK Blog.Read More Updating your data protection documentation following Brexit
FBI cleans up compromised Exchange servers – Data of Clubhouse users scraped and posted online – WhatsApp bug alert
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
On Aug. 13, 2020, someone uploaded a suspected malicious file to VirusTotal, a service that scans submitted files against more than five dozen antivirus and security products. Last month, Microsoft and FireEye identified that file as a newly-discovered fourth malware backdoor used in the sprawling SolarWinds supply chain hack. An analysis of the malicious file and other submissions by the same VirusTotal user suggest the account that initially flagged the backdoor as suspicious belongs to IT personnel at the National Telecommunications and Information Administration (NTIA), a division of the U.S. Commerce Department that handles telecommunications and Internet policy.Read More Did Someone at the Commerce Dept. Find a SolarWinds Backdoor in Aug. 2020?
Small companies are attractive targets for cybercriminals because they don’t have the resources to combat it like the more prominent companies. Or they’re hoping that they don’t. Has a data breach compromised your company? Consider bringing in a digital forensics investigator that can root out any security issues they find when examining your setup. They’re […]
The post Data Protection: Making Sure that Your Customers’ Information is Secure appeared first on CyberDB.Read More Data Protection: Making Sure that Your Customers’ Information is Secure
Digital twin technology is an emerging area of research and standardization. Because of this, there may be a lack of clarity as to what is new with digital twins and what promise this technology holds. Draft NISTIR 8356, Considerations for Digital Twin…Read More Considerations for Digital Twin Technology and Emerging Standards: Draft NISTIR 8356 Available for Comment
It’s time for Security Awareness to adapt by thinking Cyber The transition to working from home, as well as the necessary technological change, has had an effect on businesses all over the world. This has serious consequences for cybersecurity. Curre…Read More Adapting Security Awareness to the Post-Pandemic World
Here are some quick and easy tips to help you clean up your cyber-clutter and keep your digital footprint tidy
The post Spring cleaning? Don’t forget about your digital footprint appeared first on WeLiveSecurity
PwC Chief Information and Technology Officer James Shira is an expert on managing security’s big picture. With the growing focus on risk management from boards and senior leadership, James shares advice on keeping security and risk management a top pri…Read More Strategies for elevating security to an evergreen business priority