Free EDR functions by Elastic stack.
Elastic Security 7.9 delivers anti-malware and collection, new cloud detection rules, and more | Elastic Blog
https://www.elastic.co/blog/whats-new-elastic-security-7-9-0-free-endpoint-security
Elastic Security 7.9 delivers anti-malware and collection, new cloud detection rules, and more | Elastic Blog
https://www.elastic.co/blog/whats-new-elastic-security-7-9-0-free-endpoint-security
Elastic Blog
Elastic Security 7.9 delivers anti-malware and collection, new cloud detection rules, and more
Experience Elastic Security 7.9, with built-in anti-malware and data collection, pre-built cloud protections, enhanced analyst workflows, expanded data collection and analysis, and more....
How encryption and key management enable real security | Google Cloud Blog
https://cloud.google.com/blog/products/identity-security/how-encryption-and-key-management-enable-real-security
https://cloud.google.com/blog/products/identity-security/how-encryption-and-key-management-enable-real-security
Google Cloud Blog
How encryption and key management enable real security | Google Cloud Blog
How encryption key management is an important part of data security, and best practices to follow in your implementation
REPLY-TO-ALL Information Security Blog: IoC hunting и pivoting
http://reply-to-all.blogspot.com/2020/09/ioc-hunting-pivoting.html?m=1
http://reply-to-all.blogspot.com/2020/09/ioc-hunting-pivoting.html?m=1
Blogspot
IoC hunting и pivoting
Не путайте 'IoC hunting' и 'Threat hunting', так как первое всегда находит известные угрозы, а второе - неизвестные . Из Твиттера. Из обще...
Forwarded from Пост Лукацкого
Моя презентация с CISO Forum про презентации ИБ для руководства компании
COVID cybercrime: 10 disturbing statistics to keep you awake tonight | ZDNet
https://www.zdnet.com/article/ten-disturbing-coronavirus-related-cybercrime-statistics-to-keep-you-awake-tonight/
https://www.zdnet.com/article/ten-disturbing-coronavirus-related-cybercrime-statistics-to-keep-you-awake-tonight/
ZDNet
COVID cybercrime: 10 disturbing statistics to keep you awake tonight
Nine out of 10 coronavirus domains are scams. Half a million Zoom accounts are for sale on the Dark Web. Brute-force attacks are up 400%. And there's more. So much more.
Securing Property Management Systems | NCCoE
https://www.nccoe.nist.gov/projects/use-cases/securing-property-management-systems
https://www.nccoe.nist.gov/projects/use-cases/securing-property-management-systems
Threat Models for Differential Privacy | NIST
https://www.nist.gov/blogs/cybersecurity-insights/threat-models-differential-privacy
https://www.nist.gov/blogs/cybersecurity-insights/threat-models-differential-privacy
NIST
Threat Models for Differential Privacy
This post is part of a series on differential privacy.
Forwarded from SecurityLab.ru
Корпорация MITRE совместно с партнерами из сферы кибербезопансти запустила проект под названием Adversary Emulation Library, в рамках которого намерена публиковать так называемые планы эмуляции, имитирующие атаки крупнейших на сегодняшний день хакерских группировок. Проект, поддерживаемый фондом MITRE Engenuity, призван помочь командам безопасности обеспечить более эффективную защиту компьютерных сетей.
MITRE представила план имитации атак хакерской группы FIN6
MITRE представила план имитации атак хакерской группы FIN6
t.me
MITRE представила план имитации атак хакерской группы FIN6
Проект Adversary Emulation Library призван помочь командам безопасности обеспечить более эффективную защиту компьютерных сетей.
Mobile Device Security: Corporate-Owned Personally-Enabled | NCCoE
https://www.nccoe.nist.gov/projects/building-blocks/mobile-device-security/corporate-owned-personally-enabled
https://www.nccoe.nist.gov/projects/building-blocks/mobile-device-security/corporate-owned-personally-enabled
Mitigating IoT-Based DDoS | NCCoE
https://www.nccoe.nist.gov/projects/building-blocks/mitigating-iot-based-ddos
https://www.nccoe.nist.gov/projects/building-blocks/mitigating-iot-based-ddos
www.nccoe.nist.gov
Mitigating IoT-Based DDoS | NCCoE
The demand for internet-connected “smart” home and small business devices is growing rapidly, but so too are concerns regarding the potential compromise of these devices. The term IoT is often applied to the aggregate of single-purpose, internet-connected…
House approves bill to secure internet-connected federal devices against cyber threats | TheHill
https://thehill.com/policy/cybersecurity/516373-house-approves-bill-to-secure-internet-connected-federal-devices-against
https://thehill.com/policy/cybersecurity/516373-house-approves-bill-to-secure-internet-connected-federal-devices-against
TheHill
House approves bill to secure internet-connected federal devices against cyber threats
The House on Monday passed legislation to improve the security of federal internet-connected devices, with the bill garnering bipartisan support.
UK NCSC releases the Vulnerability Disclosure ToolkitSecurity Affairs
https://securityaffairs.co/wordpress/108308/laws-and-regulations/vulnerability-disclosure-toolkit.html
https://securityaffairs.co/wordpress/108308/laws-and-regulations/vulnerability-disclosure-toolkit.html
Security Affairs
UK NCSC releases the Vulnerability Disclosure Toolkit
The British National Cyber Security Centre (NCSC) released a guideline for the implementation of a vulnerability disclosure process.
Gartner Top Security Projects for 2020-2021
https://www.gartner.com/smarterwithgartner/gartner-top-security-projects-for-2020-2021/
https://www.gartner.com/smarterwithgartner/gartner-top-security-projects-for-2020-2021/
Gartner
Gartner Top 10 Security Projects for 2020-2021
Gartner analyst Brian Reed shares the top 10 #security projects for 2020-2021. Read more. #GartnerSEC #CISO @Gartner_IT
Gartner Security & Risk Management Summit, Day 1 Highlights
https://www.gartner.com/en/newsroom/press-releases/2020-09-14-gartner-security---risk-management-summit--day-1-high
https://www.gartner.com/en/newsroom/press-releases/2020-09-14-gartner-security---risk-management-summit--day-1-high
Gartner
Gartner Security & Risk Management Summit, Day 1 Highlights
Read the highlights from Day 1 at the Gartner Security & Risk Management Summit. #GartnerSEC #CISO #CyberSecurity #Security
The Phish Scale: NIST’s New Tool Helps IT Staff See Why Users Click on Fraudulent Emails | NIST
https://www.nist.gov/news-events/news/2020/09/phish-scale-nists-new-tool-helps-it-staff-see-why-users-click-fraudulent
https://www.nist.gov/news-events/news/2020/09/phish-scale-nists-new-tool-helps-it-staff-see-why-users-click-fraudulent
NIST
The Phish Scale: NIST-Developed Method Helps IT Staff See Why Users Click on Fraudulent Emails
Researchers at the National Institute of Standards and Technology (NIST) have developed a new method called the Phish Scale that could help organizations bet