June 2, 2021

Non-binding norms of behaviour, agreed to in 2015, set the guardrails for what is acceptable. A UN committee has reportedly agreed to guidance for using the norms

The post UN report could be ‘positive step’ in establishing nation-state cyberspace norms, says Canadian expert first appeared on IT World Canada.

Read More UN report could be ‘positive step’ in establishing nation-state cyberspace norms, says Canadian expert

Smart meters and smart grid infrastructure have been deployed in many of the world’s electric distribution grids. They promise energy conservation, better grid management for utilities, electricity theft reduction, and a host of value-added services for consumers.

The post Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview appeared first on Microsoft Security.

Read More Privacy compliance for smart meter infrastructure with Microsoft Information Protection and Azure Purview

The New York Times has a long story on the DarkSide ransomware gang.

A glimpse into DarkSide’s secret communications in the months leading up to the Colonial Pipeline attack reveals a criminal operation on the rise, pulling in millions of dollars in ransom payments each month.

DarkSide offers what is known as “ransomware as a service,” in which a malware developer charges a user fee to so-called affiliates like Woris, who may not have the technical skills to actually create ransomware but are still capable of breaking into a victim’s computer systems…

Read More The DarkSide Ransomware Gang

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system.

The post Microsoft acquires ReFirm Labs to enhance IoT security appeared first on Microsoft Security.

Read More Microsoft acquires ReFirm Labs to enhance IoT security

NIST’s National Cybersecurity Center of Excellence (NCCoE) has released a new draft report, NIST Interagency or Internal Report (NISTIR) 8334, Using Mobile Device Biometrics for Authenticating First Responders. Many public safety organizations (PSOs) a…

Read More Using Mobile Device Biometrics for Authenticating First Responders: Draft NISTIR 8334 Available for Comment

Cyber Essentials is a UK government scheme that outlines the basic steps that organisations can take to secure their systems. Implementing its five controls effectively will help you prevent about 80% of cyber attacks. In this blog, we take a closer look at the Cyber Essentials scheme and explain how its organisational and technical controls can keep you protected. How does Cyber Essential work? Most criminal hackers aren’t state-sponsored agencies or activists looking for high-profile targets, and they don’t spend countless hours staking out and researching their targets. Instead, they tend to be opportunistic, looking for any available target. In

The post The 5 Cyber Essentials controls that you need to know appeared first on IT Governance UK Blog.

Read More The 5 Cyber Essentials controls that you need to know