Новый проект ЕС takedown направлен на понимание мотивации ОПГ и террористов, теперь и в части киберугроз.
https://www.brighttalk.com/webcast/10415/359985
https://www.brighttalk.com/webcast/10415/359985
Brighttalk
The Nexus of Organized Cyber Crime and Cyber Terrorism
New Services and Tools for Supporting First-line-practitioners and Law Enforcement Agencies.
In recent years, Europe has been at increased risk of extremist violence and terrorism – from Islamic fund...
In recent years, Europe has been at increased risk of extremist violence and terrorism – from Islamic fund...
Продолжение серии отчетов про экономику киберпреступлений.
https://twitter.com/ArchieScorp/status/1138523436492435456?s=09
https://twitter.com/ArchieScorp/status/1138523436492435456?s=09
Twitter
Alexander Redchits
И продолжение серии отчетов https://t.co/sGCFHuriY7
Экономическое значение безопасности DNS.
https://www.globalcyberalliance.org/use-of-dns-firewalls-could-reduce-33-of-all-cybersecurity-breaches/
https://www.globalcyberalliance.org/use-of-dns-firewalls-could-reduce-33-of-all-cybersecurity-breaches/
GCA | Global Cyber Alliance | Working to Eradicate Cyber Risk
Use of DNS Firewalls Could Reduce 33% of All Cybersecurity Breaches, New Global Cyber Alliance Research Finds - GCA | Global Cyber…
New research from the Global Cyber Alliance has found that Domain Name System (DNS) firewalls, also known as protective DNS, which are freely available and easy to install, could prevent 33% of cybersecurity data breaches from occurring.
Новый черновик NIST
Detecting and Protecting Against Data Integrity Attacks in Industrial Control Systems Environments | NCCoE
https://www.nccoe.nist.gov/projects/use-cases/manufacturing/detecting-protecting-industrial-control-systems
Detecting and Protecting Against Data Integrity Attacks in Industrial Control Systems Environments | NCCoE
https://www.nccoe.nist.gov/projects/use-cases/manufacturing/detecting-protecting-industrial-control-systems
Forwarded from RUSCADASEC news: Кибербезопасность АСУ ТП (Anton Shipulin)
Github репозиторий, cобирающий материалы по теме безопасности и кибербезопасности роботов с пошаговыми руководствами: Robot reconnaissance, Robot footprinting, Robot enumeration, Robot Threat Modeling & Robot Vulnerability Identification, Robot exploitation, Robot forensics, Robot reversing and Other
https://github.com/vmayoral/basic_robot_cybersecurity
https://github.com/vmayoral/basic_robot_cybersecurity
GitHub
vmayoral/basic_robot_cybersecurity
An introductory series of cybersecurity for robots with a somewhat comprehensive step-by-step tutorials. - vmayoral/basic_robot_cybersecurity
Обзор докладов WEIS, ссылка на которые публиковалась выше
https://lukatsky.blogspot.com/2019/06/iso-27001-bug-bounty.html?m=1
https://lukatsky.blogspot.com/2019/06/iso-27001-bug-bounty.html?m=1
Blogspot
Почему сертификат ISO 27001 приводит к снижению инвестиционной привлекательности, а программа bug bounty лучше пентестов...
Блог Алексея Лукацкого "Бизнес без опасности"
Forwarded from Пост Лукацкого
Выложены презентации с ITSF 2019 https://t.co/UCKRt2c48l @itsfkzn
— Alexey Lukatsky (@alukatsky) June 14, 2019
— Alexey Lukatsky (@alukatsky) June 14, 2019
itsecurityforum.ru
ITSF 2019
XIII Цифровой Форум - ITSF. Большие данные. Кибербезопасность. Законодательство.
Forwarded from RUSCADASEC news: Кибербезопасность АСУ ТП (Anton Shipulin)
The International Society of Automation (ISA) выпустило книгу «Security PHA Review for Consequence-Based Cybersecurity» от Edward M. Marszal and Jim McGlone из компании Kenexis. Авторы рассказывают, как использовать результаты анализа опасностей process hazard analysis (PHA) для определения уязвимых к кибератакам сценариев и устранения проблем. Доступна электронная версия книги
https://www.isa.org/store/security-pha-review-for-consequence-based-cybersecurity/65832391
https://www.isa.org/store/security-pha-review-for-consequence-based-cybersecurity/65832391
Continuous Monitoring for IT Infrastructure | NCCoE
https://www.nccoe.nist.gov/projects/building-blocks/continuous-monitoring
https://www.nccoe.nist.gov/projects/building-blocks/continuous-monitoring
SP 800-205, Attribute Considerations for Access Control Systems | CSRC
https://csrc.nist.gov/publications/detail/sp/800-205/final
https://csrc.nist.gov/publications/detail/sp/800-205/final
CSRC | NIST
NIST Special Publication (SP) 800-205, Attribute Considerations for Access Control Systems
This document provides federal agencies with a guide for implementing attributes in access control systems. Attributes enable a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated…