Cybersecurity Bachelor's Degree | SANS.edu
https://www.sans.edu/academics/applied-cybersecurity-bachelors-degree
https://www.sans.edu/academics/applied-cybersecurity-bachelors-degree
www.sans.edu
Cybersecurity Bachelor's Degree | SANS.edu
Gain the high-level technical skills and professional certifications required for a cybersecurity career with a bachelor's degree in Applied Cybersecurity from SANS.edu. 100% online option available. No prior technical experience required.
https://twitter.com/SVSoldatov/status/1314540183900090369
Bulletproof hosting (BPH) services have long been crucial parts of the cybercriminal infrastructure. How do they protect malicious activities, and how do cybercriminals use them to stay in business?
Bulletproof hosting (BPH) services have long been crucial parts of the cybercriminal infrastructure. How do they protect malicious activities, and how do cybercriminals use them to stay in business?
Twitter
Sergey Soldatov
https://t.co/YH0qwWy7tX
Forwarded from Vulnerability Management and more
I decided to make a review of several Vulnerability Management market news that I recently read.
#Tenable made a press release about the upcoming Lumen features ("Remediation Maturity", "Mitigations", "Predictive Scoring"). This all sounds pretty cool. The only thing is, as usual, what kind of data they analyze, how good the data is, and how good the methods of analysis are. Most likely, it will remain a black box. Unfortunately.
Tenable also made a press release that they became partners with Central for Internet Security. Maybe Tenable will become the only VM vendor associated with #CIS Controls IG1 “Cyber Hygiene”, but who knows. I really don't understand what is the Center for Internet Security nowadays. These guys for a long time were combining best practices for software & operating system into security standards, and controlling the implementation of those standards among Compliance Management vendors. At the same time, they were a Compliance Management vendor themselves (CIS CAT). A bit weird, but ok. But after they became a kind of regulator, with acquisition of SANS 20 and MITRE OVAL repository, the role of Central for Internet Security is completely unclear to me.
#Rapid7 released a blog post "Why Every Organization Needs a Vulnerability Management Policy". In short, it can be useful as a guide describing how to sell the idea of Vulnerability Management process to your c-level management. In this article, I saw three groups of reasons:
1. Real security. "technical infrastructures stay more secure, which helps them [organizations] reduce risk in an environment filled with cybercriminals".
2. Compliance. "...any corporation with little focus on vulnerability management runs the risk of fines due to falling out of compliance"; "many regulators first look for the existence of a policy as part of any auditing process"; "a clearly defined vulnerability management policy holds the different technology teams at a company responsible for internal compliance"
3. Corporate culture and IT/Dev benefits. "One result of this proactive approach [to VM] is higher system uptime"; "Regular, proactive feature improvements in software applications play a key role in the success of those companies that thrive on an innovative culture. Seamlessly integrating software patches and enhancements is a must for these businesses, and a strong vulnerability management policy helps this integration happen in a secure fashion"; "providing innovative applications and services to their customer base without burning development cycles dealing with security issues"
#Qualys released a tool that "report the deployment status of Cloud Agent across all vCenter-managed virtual machines". It's great that they did it. The only thing I want to mention is that this is a good illustration of a task (“controlling agent installation”), which is not really a part of Vulnerability Management process, but without this task the Vulnerability Management process simply won't work. So such automation should be done by someone on vendor's or customer's side.
#Tenable made a press release about the upcoming Lumen features ("Remediation Maturity", "Mitigations", "Predictive Scoring"). This all sounds pretty cool. The only thing is, as usual, what kind of data they analyze, how good the data is, and how good the methods of analysis are. Most likely, it will remain a black box. Unfortunately.
Tenable also made a press release that they became partners with Central for Internet Security. Maybe Tenable will become the only VM vendor associated with #CIS Controls IG1 “Cyber Hygiene”, but who knows. I really don't understand what is the Center for Internet Security nowadays. These guys for a long time were combining best practices for software & operating system into security standards, and controlling the implementation of those standards among Compliance Management vendors. At the same time, they were a Compliance Management vendor themselves (CIS CAT). A bit weird, but ok. But after they became a kind of regulator, with acquisition of SANS 20 and MITRE OVAL repository, the role of Central for Internet Security is completely unclear to me.
#Rapid7 released a blog post "Why Every Organization Needs a Vulnerability Management Policy". In short, it can be useful as a guide describing how to sell the idea of Vulnerability Management process to your c-level management. In this article, I saw three groups of reasons:
1. Real security. "technical infrastructures stay more secure, which helps them [organizations] reduce risk in an environment filled with cybercriminals".
2. Compliance. "...any corporation with little focus on vulnerability management runs the risk of fines due to falling out of compliance"; "many regulators first look for the existence of a policy as part of any auditing process"; "a clearly defined vulnerability management policy holds the different technology teams at a company responsible for internal compliance"
3. Corporate culture and IT/Dev benefits. "One result of this proactive approach [to VM] is higher system uptime"; "Regular, proactive feature improvements in software applications play a key role in the success of those companies that thrive on an innovative culture. Seamlessly integrating software patches and enhancements is a must for these businesses, and a strong vulnerability management policy helps this integration happen in a secure fashion"; "providing innovative applications and services to their customer base without burning development cycles dealing with security issues"
#Qualys released a tool that "report the deployment status of Cloud Agent across all vCenter-managed virtual machines". It's great that they did it. The only thing I want to mention is that this is a good illustration of a task (“controlling agent installation”), which is not really a part of Vulnerability Management process, but without this task the Vulnerability Management process simply won't work. So such automation should be done by someone on vendor's or customer's side.
Жизнь 80 на 20: Статистика по сертификатам ISO 27001 за 2019 год
https://80na20.blogspot.com/2020/10/iso-27001-2019.html?m=1
https://80na20.blogspot.com/2020/10/iso-27001-2019.html?m=1
Blogspot
Статистика по сертификатам ISO 27001 за 2019 год
Управление информационной безопасностью
Cyber insurance is only a few claims away from disaster | World Economic Forum
https://www.weforum.org/agenda/2020/10/there-s-not-enough-money-in-cyber-insurance/
https://www.weforum.org/agenda/2020/10/there-s-not-enough-money-in-cyber-insurance/
World Economic Forum
Cyber insurance is only a few claims away from disaster. This is why it matters
Too many companies are underinsured against the growing threat posed by cyberattacks. Here are two ways the insurance industry can start to rectify that.
Forwarded from SecAtor
Отличная статья на ZeroDay за авторством Криса Матищика, технического эксперта, руководителя консалтинговой компании Howard Raucous.
Если оставить все размышлизмы Матищика за кадром, то останется два основных тезиса, одновременно являющиеся же и ключевыми проблемами, которым посвящена статья:
- корпоративные пользователи остаются людьми со всеми присущими им человеческими недостатками, поэтому пытаются прикрутить к корпоративной сети любую новую свистоперделку с выходом в Интернет, будь то умная колонка от Amazon или дистанционно управляемая кофеварка;
- специалисты ИТ и ИБ остаются людьми со всеми присущими им человеческими недостатками, поэтому, несмотря на признание подключения незащищенных IoT устройств к корпоративной сети одной из основных угроз ее компрометации, даже не рассматривают возможность организации процесса их своевременных обновлений.
Единство и борьба противоположностей. Инфосек edition.
Если оставить все размышлизмы Матищика за кадром, то останется два основных тезиса, одновременно являющиеся же и ключевыми проблемами, которым посвящена статья:
- корпоративные пользователи остаются людьми со всеми присущими им человеческими недостатками, поэтому пытаются прикрутить к корпоративной сети любую новую свистоперделку с выходом в Интернет, будь то умная колонка от Amazon или дистанционно управляемая кофеварка;
- специалисты ИТ и ИБ остаются людьми со всеми присущими им человеческими недостатками, поэтому, несмотря на признание подключения незащищенных IoT устройств к корпоративной сети одной из основных угроз ее компрометации, даже не рассматривают возможность организации процесса их своевременных обновлений.
Единство и борьба противоположностей. Инфосек edition.
ZDNet
Amazon's Alexa is driving IT managers crazy
An extensive new study reveals what's really worrying IT and security professionals. It also reveals a little of their (deeply human) hypocrisy.
Forwarded from SecurityLab.ru
Организации European Network for Cyber Security (ENCS) и European Distribution System Operators’ Association (E.DSO) выпустили требования по кибербезопасности для распределенной автоматизации (Distribution Automation, DA) устройств связи с объектом (Remote Terminal Units, RTU).
Представлены новые требования по кибербезопасности распределенной автоматизации
Представлены новые требования по кибербезопасности распределенной автоматизации
t.me
Представлены новые требования по кибербезопасности распределенной автоматизации
Требования являются важным инструментом безопасности данных для коммунальных предприятий в Европе.
NISTIR 8286, Integrating Cybersecurity and Enterprise Risk Management (ERM) | CSRC
https://csrc.nist.gov/publications/detail/nistir/8286/final
https://csrc.nist.gov/publications/detail/nistir/8286/final
CSRC | NIST
NIST Internal or Interagency Report (NISTIR) 8286, Integrating Cybersecurity and Enterprise Risk Management (ERM)
The increasing frequency, creativity, and severity of cybersecurity attacks means that all enterprises should ensure that cybersecurity risk is receiving appropriate attention within their enterprise risk management (ERM) programs. This document is intended…
WEIS 2020
The 2020 Workshop on the Economics of Information Security (Brussels, December 14-15, 2020)
free and online this year.
https://weis2020.econinfosec.org/
The 2020 Workshop on the Economics of Information Security (Brussels, December 14-15, 2020)
free and online this year.
https://weis2020.econinfosec.org/
For the chapter members: 2021 membership and Certifications are open. Do not forget to submit you CPE for 2020.