Ежегодный приказ по планируемым ГОСТ в стране, включая ИБ и ИТ "Программа национальной стандартизации". лучше всего искать соответствующие номера технических комитетов, например, 362. документ живой т.е. в него периодически вносятся правки.
https://www.gost.ru/portal/gost/home/activity/documents/orders#/order/123426
https://www.gost.ru/portal/gost/home/activity/documents/orders#/order/123426
28 мая 2020 ИД «Коммерсантъ», онлайн-конференция
Киберриски удаленной работы
https://www.kommersant.ru/conference/610
Киберриски удаленной работы
https://www.kommersant.ru/conference/610
Getting Ready for Post-Quantum Cryptography: Explore Challenges Associated with Adoption and Use of Post-Quantum Cryptographic Algorithms | CSRC
https://csrc.nist.gov/publications/detail/white-paper/2020/05/26/getting-ready-for-post-quantum-cryptography/draft
https://csrc.nist.gov/publications/detail/white-paper/2020/05/26/getting-ready-for-post-quantum-cryptography/draft
CSRC | NIST
Getting Ready for Post-Quantum Cryptography: Explore Challenges Associated with Adoption and Use of Post-Quantum Cryptographic…
Cryptographic technologies are used throughout government and industry to authenticate the source and protect the confidentiality and integrity of information that we communicate and store. The paper describes the impact of quantum computing technology on…
NICE Webinar: The Challenge of That First Job in Cybersecurity - Entry Level Roles and How to Qualify | NIST
https://www.nist.gov/news-events/events/2020/06/nice-webinar-challenge-first-job-cybersecurity-entry-level-roles-and-how
https://www.nist.gov/news-events/events/2020/06/nice-webinar-challenge-first-job-cybersecurity-entry-level-roles-and-how
NIST
NICE Webinar: The Challenge of That First Job in Cybersecurity - Entry Level Roles and How to Qualify
Трубная металлургическая компания» утвердила стратегию кибербезопасности
https://twitter.com/TAdviser/status/1265538243367522314?s=09
https://twitter.com/TAdviser/status/1265538243367522314?s=09
Twitter
TAdviser
«Трубная металлургическая компания» утвердила стратегию кибербезопасности https://t.co/9gsIpp53M6
The Forrester Wave™: Risk-Based Authentication, Q2 2020
https://reprints.forrester.com/#/assets/2/73/RES157259/reports
https://reprints.forrester.com/#/assets/2/73/RES157259/reports
https://www.helpnetsecurity.com/2020/05/27/underground-market-trends/
Other notable findings include the emergence of markets for:
Deepfake services for sextortion or to bypass photo verification requirements on some sites.
AI-based gambling bots designed to predict dice roll patterns and crack complex Roblox CAPTCHA.
Access-as-a-Service to hacked devices and corporate networks. Prices for Fortune 500 companies can reach up to US$10,000 and some services include access with read and write privileges.
Wearable device accounts where access could enable cybercriminals to run warranty scams by requesting replacement devices.
Other notable findings include the emergence of markets for:
Deepfake services for sextortion or to bypass photo verification requirements on some sites.
AI-based gambling bots designed to predict dice roll patterns and crack complex Roblox CAPTCHA.
Access-as-a-Service to hacked devices and corporate networks. Prices for Fortune 500 companies can reach up to US$10,000 and some services include access with read and write privileges.
Wearable device accounts where access could enable cybercriminals to run warranty scams by requesting replacement devices.
Help Net Security
What's trending on the underground market? - Help Net Security
Underground market trends will likely shift further in the months following the global COVID-19 pandemic, as attack opportunities continue to evolve.
ISACARuSec pinned «https://medium.com/anton-on-security/modern-cyber-defense-books-462e9bc950f7»
SP 800-204A, Building Secure Microservices-based Apps Using Service Mesh | CSRC
https://csrc.nist.gov/publications/detail/sp/800-204a/final
https://csrc.nist.gov/publications/detail/sp/800-204a/final
CSRC | NIST
NIST Special Publication (SP) 800-204A, Building Secure Microservices-based Applications Using Service-Mesh Architecture
The increasing trend in building microservices-based applications calls for addressing security in all aspects of service-to-service interactions due to their unique characteristics. The distributed cross-domain nature of microservices needs secure token…
SANS Oil & Gas Solutions Forum: Objective-based Security Drives Effective Solutions - SANS Institute
https://www.sans.org/webcasts/112760?ref=216530
https://www.sans.org/webcasts/112760?ref=216530
www.sans.org
SANS Oil & Gas Solutions Forum: Objective-based Security Drives Effective Solutions - SANS Institute
Over the last 15 or so years, Oil & Gas organizations, vendors and service providers have been steadily improving their awareness of the emerging cyber threats to their operations and the need to improve their security. As the realization of proven and potential…