When a cybersecurity incident occurs, it’s not just IT systems and data that are at risk — a company’s reputation is on the line, too.
Автор: Edge Editors
Even Orgs With SSO Are Vulnerable to Identity-Based Attacks
Use SSO, don’t use SSO. Have MFA, don’t have MFA. An analysis of a snapshot of organizations using Push Security’s platform finds that 99% of accounts susceptible to phishing attacks.
FERC Outlines Supply Chain Security Rules for Power Plants
The US Federal Energy Regulatory Commission spelled out what electric utilities should do to protect their software supply chains, as well as their network "trust zones."
How Should CISOs Navigate the SEC Cybersecurity and Disclosure Rules?
Companies that commit to risk management have a strong cybersecurity foundation that makes it easier to comply with the SEC’s rules. Here is what you need to know about 8K and 10K filings.
NIST Drops Password Complexity, Mandatory Reset Rules
The latest draft version of NIST’s password guidelines simplifies password management best practices and eliminates those that actually did not promote stronger security.
CISA Releases Plan to Align Cybersecurity Across Federal Agencies
The FOCAL plan outlines baselines to synchronize cybersecurity priorities and policies across, as well as within, agencies.
CISA Urges Software Makers to Eliminate XSS Flaws
The latest Secure by Design alert from CISA outlines recommended actions security teams should implement to reduce the prevalence of cross-site scripting vulnerabilities in software.
What is the Shared Fate Model?
New threats, an overburdened workforce, and regulatory pressures mean cloud service providers need a more resilient model than the shared responsibility framework. That’s where "shared fate" comes in.
NVD Backlog Continues to Grow
Despite getting help, NIST is not keeping up with new vulnerability reports for the National Vulnerabilities Database, according to an analysis from Fortress Information Security.
NVD Backlog Continues to Grow
Despite getting help, NIST is not keeping up with new vulnerability reports for the National Vulnerabilities Database, according to an analysis from Fortress Information Security.