Госкомпаниям запретят использовать зарубежные базы данных :: Технологии и медиа :: РБК
https://www.rbc.ru/technology_and_media/25/04/2019/5cc035ae9a794738a6a2494a?from=from_main
https://www.rbc.ru/technology_and_media/25/04/2019/5cc035ae9a794738a6a2494a?from=from_main
РБК
Госкомпаниям запретят использовать зарубежные базы данных
В законопроекте «О суверенном Рунете» эксперты обнаружили положение, которое усложнит жизнь госкомпаниям: им запрещается использовать зарубежные базы данных. Запрет может негативно отразиться на «Рост
Хорошая статья для понимания изменений в современных hr платформах и в последствии в кадровой безопасности.
https://joshbersin.com/2019/04/is-integrated-talent-management-over-yes-let-talent-experience-reign/
https://joshbersin.com/2019/04/is-integrated-talent-management-over-yes-let-talent-experience-reign/
JOSH BERSIN
From Talent Management To Talent Experience. Why The HR Tech Market Is In Disruption
Integrated talent management is over. A focus on meaningful, productive work is transforming HR tech and the way business must operate.
2 фактора или детективные меры брутфорса лучше регулярной смены пароля.
https://www.securitylab.ru/news/498917.php
https://www.securitylab.ru/news/498917.php
SecurityLab.ru
Microsoft признала бесполезной политику устаревания пароля
Компания откажется от механизма устаревания паролей в обновлении Windows 10 May 2019 Update.
Mitigating IoT-Based DDoS | NCCoE
https://www.nccoe.nist.gov/projects/building-blocks/mitigating-iot-based-ddos
https://www.nccoe.nist.gov/projects/building-blocks/mitigating-iot-based-ddos
www.nccoe.nist.gov
Mitigating IoT-Based DDoS | NCCoE
The demand for internet-connected “smart” home and small business devices is growing rapidly, but so too are concerns regarding the potential compromise of these devices. The term IoT is often applied to the aggregate of single-purpose, internet-connected…
Forwarded from RUSCADASEC news: Кибербезопасность АСУ ТП (Anton Shipulin)
8 Мая вебинар от Tenable и Siemens на тему: "Adapting Asset and Vulnerability Management Processes for Operational Technology". Обсудят:
- Breaking down silos between OT and IT
- Which OT asset attributes must be tracked
- Practical tips for effective OT asset management
- Adapting vulnerability remediation processes for OT
https://www.tenable.com/webinars/adapting-asset-and-vulnerability-management-for-ot
- Breaking down silos between OT and IT
- Which OT asset attributes must be tracked
- Practical tips for effective OT asset management
- Adapting vulnerability remediation processes for OT
https://www.tenable.com/webinars/adapting-asset-and-vulnerability-management-for-ot
Tenable®
Adapting Asset and Vulnerability Management Processes for Operational
Join Siemens and Tenable to learn how can you break down siloed practices and better protect both IT and OT.
Forwarded from SecurityLab.ru
Национальный институт стандартов и технологий США (The National Institute of Standards and Technology, NIST) выпустил обновление исследовательского набора инструментов (Automated Combinatorial Testing for Software, ACTS), призванное помочь разработчикам сложных критически важных с точки зрения безопасности приложений выявлять потенциально опасные ошибки в своем ПО.
NIST обновил инструмент для поиска ошибок в критически важном ПО
NIST обновил инструмент для поиска ошибок в критически важном ПО
SecurityLab.ru
NIST обновил инструмент для поиска ошибок в критически важном ПО
Инструмент CCM позволяет тестировать программное обеспечение с тысячами входных переменных.
Расскажут про roadmap nist framework
https://www.nist.gov/news-events/events/2019/04/next-cybersecurity-framework-webcast-look-back-look-ahead
https://www.nist.gov/news-events/events/2019/04/next-cybersecurity-framework-webcast-look-back-look-ahead
NIST
Next Up! Cybersecurity Framework Webcast: A Look Back, A Look Ahead
Note: Captioning will be available by 5/8/2019 NIST recently celebrated the Framework for Improving Critical Infrastructure Cybersecurity’s 5 th anniversary in...
Любителям "трофейного ПО" посвящается.
Supply Chain Hackers Snuck Malware Into Videogames | WIRED
https://www.wired.com/story/supply-chain-hackers-videogames-asus-ccleaner/
Supply Chain Hackers Snuck Malware Into Videogames | WIRED
https://www.wired.com/story/supply-chain-hackers-videogames-asus-ccleaner/
WIRED
Supply Chain Hackers Snuck Malware Into Videogames
An aggressive group of supply chain hackers strikes again, this time further upstream.
Однозначный тренд в эпоху GDPR.
States giving privacy officers a seat at the table -- GCN
https://gcn.com/articles/2019/04/22/nascio-chief-privacy-officers.aspx?m=1
States giving privacy officers a seat at the table -- GCN
https://gcn.com/articles/2019/04/22/nascio-chief-privacy-officers.aspx?m=1
GCN
States giving privacy officers a seat at the table -- GCN
Most states are addressing privacy issues, and the number of dedicated CPOs is on the rise.
Naming and shaming nations that launch cyberattacks does work, say intel chiefs | ZDNet
https://www.zdnet.com/article/naming-and-shaming-nations-that-launch-cyberattacks-does-work-say-intel-chiefs/
https://www.zdnet.com/article/naming-and-shaming-nations-that-launch-cyberattacks-does-work-say-intel-chiefs/
ZDNet
Naming and shaming nations that launch cyberattacks does work, say intel chiefs
Cybersecurity agencies explain when and why they attribute cyberattacks to other nations.
Пример того насколько надежна современная атрибуция кибер атак.
"...When we used to put out anonymised, non-attributable attacks, we'd say we'd seen something somewhere and this is how you can fix it, you can get a certain response. When you say this is Russia, you get a bigger response and that does matter," he said..."
"...When we used to put out anonymised, non-attributable attacks, we'd say we'd seen something somewhere and this is how you can fix it, you can get a certain response. When you say this is Russia, you get a bigger response and that does matter," he said..."