NISTIR 8287, Partnerships to Build the Cybersecurity Workforce | CSRC
https://csrc.nist.gov/publications/detail/nistir/8287/final
https://csrc.nist.gov/publications/detail/nistir/8287/final
CSRC | NIST
NIST Internal or Interagency Report (NISTIR) 8287, A Roadmap for Successful Regional Alliances and Multistakeholder Partnerships…
In September 2016, the National Initiative for Cybersecurity Education, led by the National Institute of Standards and Technology in the U.S. Department of Commerce, awarded funding for five pilot programs for Regional Alliances and Multistakeholder Partnerships…
Forwarded from Пост Лукацкого
Бизнес-метрики ИБ для руководства финансовой организации (презентация) https://t.co/TNvUp0Zw2G
— Alexey Lukatsky (@alukatsky) February 26, 2020
— Alexey Lukatsky (@alukatsky) February 26, 2020
Blogspot
Бизнес-метрики ИБ для руководства финансовой организации (презентация)
Блог Алексея Лукацкого "Бизнес без опасности"
Forwarded from Пост Лукацкого
https://t.co/pay7JZOtJP - презентации с Магнитки #ibbank
— Alexey Lukatsky (@alukatsky) February 26, 2020
— Alexey Lukatsky (@alukatsky) February 26, 2020
Forwarded from RUSCADASEC news: Кибербезопасность АСУ ТП (Anton Shipulin)
MITRE опубликовала Common Weakness Enumeration (CWE) list v 4.0. Прошлые версии включали описания уязвимостей программного обеспечения. В новую версию добавили описания уязвимостей аппаратного обеспечения. Кроме того, новая версия упрощает представление уязвимостей в виде различных представлений и добавляет функцию поиска для легкой навигации по ресурсу
https://cwe.mitre.org/
https://cwe.mitre.org/
cwe.mitre.org
CWE -
Common Weakness Enumeration
Common Weakness Enumeration
Common Weakness Enumeration (CWE) is a list of software and hardware weaknesses.
Future of Data Protection, Privacy & IT Risk Management 2020
ISACA Virtual Summit
March 25, 2020
https://www.isaca.org/education/online-events/lms_wvs0320?cid=sm_2003300
ISACA Virtual Summit
March 25, 2020
https://www.isaca.org/education/online-events/lms_wvs0320?cid=sm_2003300
Forwarded from Start X (ex-Антифишинг)
Добро пожаловать в открытый канал Антифишинга.
Здесь мы публикуем анонсы наших дайджестов, собственные исследования по психологии в безопасности, новости про фишинг и прочие цифровые атаки на людей, а также другие материалы, которые помогут вам, вашим коллегам и близким оставаться в безопасности.
www.antiphish.ru
blog.antiphish.ru
Классификация цифровых атак: www.antiphish.ru/classification
Стадии цифровой атаки: www.antiphish.ru/stages
Здесь мы публикуем анонсы наших дайджестов, собственные исследования по психологии в безопасности, новости про фишинг и прочие цифровые атаки на людей, а также другие материалы, которые помогут вам, вашим коллегам и близким оставаться в безопасности.
www.antiphish.ru
blog.antiphish.ru
Классификация цифровых атак: www.antiphish.ru/classification
Стадии цифровой атаки: www.antiphish.ru/stages
www.antiphish.ru
Антифишинг стадии цифровой атаки на человека
Антифишинг классификация цифровых атак на сотрудников
Forwarded from RUSCADASEC news: Кибербезопасность АСУ ТП (Anton Shipulin)
О том, как нужно делать аудит кибербезопасности АСУ ТП: обзор методологии оценки рисков кибербезопасности aeCyberPHA от компании aeSolutions
https://www.youtube.com/watch?v=CjgN-RqdTJI
https://www.youtube.com/watch?v=CjgN-RqdTJI
YouTube
aeCyberPHA® Cyber Risk Assessment Methodology
aeSolutions offers industrial control system (ICS) cybersecurity risk assessment services in every phase of the process automation/process safety lifecycle. ...
👍1
ACMA mandates stronger identity checks when porting Australian mobile numbers | ZDNet
https://www.zdnet.com/article/acma-mandates-stronger-identity-checks-when-porting-australian-mobile-numbers/
https://www.zdnet.com/article/acma-mandates-stronger-identity-checks-when-porting-australian-mobile-numbers/
ZDNet
ACMA mandates stronger identity checks when porting Australian mobile numbers
From April, customers will need to authorise transfers with their telco.
Responses to catastrophic artificial general intelligence (AGI) risk: a survey
https://iopscience.iop.org/article/10.1088/0031-8949/90/1/018001
https://iopscience.iop.org/article/10.1088/0031-8949/90/1/018001
ISACA Webinar, 3rd of March: Meeting the Board’s Security, Audit and Compliance Demands
https://www.isaca.org/education/online-events/lms_w030320?cid=sm_2003367
https://www.isaca.org/education/online-events/lms_w030320?cid=sm_2003367
Cybersecurity: Poised for a giant leap forward | SC Media
https://www.scmagazine.com/home/security-news/ransomware/poised-for-a-giant-leap-forward/
https://www.scmagazine.com/home/security-news/ransomware/poised-for-a-giant-leap-forward/
SC Media
Cybersecurity: Poised for a giant leap forward | SC Media
Cybersecurity has enjoyed good health but is the industry itching for innovation and transformation – and the next big thing?
Follow the cybersecurity money | SC Media
https://www.scmagazine.com/home/security-news/features/follow-the-cybersecurity-money/
https://www.scmagazine.com/home/security-news/features/follow-the-cybersecurity-money/
SC Media
Follow the cybersecurity money | SC Media
Venture capitalists have poured money into cybersecurity in recent years – their investments offer a glimpse at what products, solutions and startups are
RDP - the most exploitable by ransomeware protocol in the last 3 quarters.
Ransomware victims are paying out millions a month. One particular version has cost them the most | ZDNet
https://www.zdnet.com/article/fbi-ransomware-victims-have-paid-out-140-million-one-version-has-cost-them-the-most/
Ransomware victims are paying out millions a month. One particular version has cost them the most | ZDNet
https://www.zdnet.com/article/fbi-ransomware-victims-have-paid-out-140-million-one-version-has-cost-them-the-most/
ZDNet
Ransomware victims are paying out millions a month. One particular version has cost them the most | ZDNet
Over six-and-a-half years, ransomware victims have handed over vast amounts of bitcoin to crooks. Some variants of the malware have generated more ransom than others.
'Malware-free' attacks now most popular tactic amongst cybercriminals | ZDNet
https://www.zdnet.com/article/malware-free-attacks-now-most-popular-tactic-amongst-cybercriminals/
https://www.zdnet.com/article/malware-free-attacks-now-most-popular-tactic-amongst-cybercriminals/
ZDNet
'Malware-free' attacks now most popular tactic amongst cybercriminals | ZDNet
Malware-free or fileless techniques accounted for 51% of attacks last year, compared to 40% the year before, as hackers turn to stolen credentials to breach corporate networks, reveals CrowdStrike's latest threat report.
Global Threat Report 2020: Foreword from George Kurtz | CrowdStrike
https://www.crowdstrike.com/blog/global-threat-report-foreword-2020/
https://www.crowdstrike.com/blog/global-threat-report-foreword-2020/
crowdstrike.com
Global Threat Report 2020: Foreword from George Kurtz | CrowdStrike
Read the foreword of the 2020 Global Threat Report from CrowdStrike CEO and Co-Founder George Kurtz, and download your copy of the annual threat report.