Forwarded from Андрей
Кодекс практики обеспечения кибербезопасности и безопасности в машиностроении
Институт инженерии и технологии опубликовал Кодекс практики при поддержке NCSC.
https://electrical.theiet.org/guidance-codes-of-practice/publications-by-category/cyber-security/code-of-practice-cyber-security-and-safety/
Институт инженерии и технологии опубликовал Кодекс практики при поддержке NCSC.
https://electrical.theiet.org/guidance-codes-of-practice/publications-by-category/cyber-security/code-of-practice-cyber-security-and-safety/
electrical.theiet.org
Code of Practice: Cyber Security and Safety
This Code of Practice is written for engineers and engineering management to support their understanding of the issues involved in ensuring that the safety responsibilities of an organization are addressed, in the presence of a threat of cyber attack. “If…
3 Themes Emerge From the Gartner Hype Cycle for Midsize Enterprise, 2020
https://www.gartner.com/smarterwithgartner/3-themes-emerge-from-the-gartner-hype-cycle-for-midsize-enterprise-2020/
https://www.gartner.com/smarterwithgartner/3-themes-emerge-from-the-gartner-hype-cycle-for-midsize-enterprise-2020/
Gartner
3 Themes Emerge From the Gartner Hype Cycle for Midsize Enterprise, 2020
Gartner analyst Mike Cisek shares the 3 themes from the Gartner Hype Cycle for #Midsize Enterprises, 2020. Read more. #CIO #MSE #Trends #Productivity @Gartner_IT
"... Risk-based security: Trends related to remote worker and edge infrastructure have accelerated the need to strengthen security and simplify how IT teams deliver it. Risk-based security allows CIOs to focus on high-priority areas of risk in an efficient and cost-effective way. ...."
Cybersecurity Risk Checklist for CFOs to Manage Increase in Remote Finance
https://www.gartner.com/smarterwithgartner/the-cfo-cybersecurity-risk-checklist/
https://www.gartner.com/smarterwithgartner/the-cfo-cybersecurity-risk-checklist/
Gartner
Cybersecurity Risk Checklist for CFOs to Manage Increase in Remote Finance
CFOs must understand a new type of financial risk management related to cybersecurity risk because so many finance activities are now conducted remotely.
Differential Privacy Blog Series | NIST
"We have developed this blog series leveraging the differential privacy contributions in the de-identification tools section."
https://www.nist.gov/itl/applied-cybersecurity/privacy-engineering/collaboration-space/focus-areas/de-id/dp-blog
"We have developed this blog series leveraging the differential privacy contributions in the de-identification tools section."
https://www.nist.gov/itl/applied-cybersecurity/privacy-engineering/collaboration-space/focus-areas/de-id/dp-blog
It’s easier to trust a cloud provider that enables you to trust them less | Google Cloud Blog
https://cloud.google.com/blog/products/identity-security/trust-a-cloud-provider-that-enables-you-to-trust-them-less
https://cloud.google.com/blog/products/identity-security/trust-a-cloud-provider-that-enables-you-to-trust-them-less
Google Cloud Blog
It’s easier to trust a cloud provider that enables you to trust them less | Google Cloud Blog
Cloud providers should build technologies that allow organizations to benefit from cloud computing while decreasing the amount of trust they need to place into the provider themselves.
#ForrTech: Predicted European Data Privacy Trends for 2021 - Infosecurity Magazine
https://www.infosecurity-magazine.com/news/european-data-privacy-trends-2021
https://www.infosecurity-magazine.com/news/european-data-privacy-trends-2021
Infosecurity Magazine
#ForrTech: Predicted European Data Privacy Trends for 2021
European businesses need to prepare for major changes in the data privacy landscape next year
Q3 Ransomware Demands rise: Maze Sunsets and Ryuk Returns
https://www.coveware.com/blog/q3-2020-ransomware-marketplace-report
https://www.coveware.com/blog/q3-2020-ransomware-marketplace-report
Coveware: Ransomware Recovery First Responders
Q3 Ransomware Demands rise: Maze Sunsets & Ryuk Returns
Ransom payments in Q3 increased as more victims were impacted by new combinations of attacks leveraging both encryption ransomware and data exfiltration.
Enterprise IT security teams continue to struggle - Help Net Security
https://www.helpnetsecurity.com/2020/11/02/enterprise-it-security-teams/
https://www.helpnetsecurity.com/2020/11/02/enterprise-it-security-teams/
Help Net Security
Enterprise IT security teams continue to struggle - Help Net Security
A 114% increase in remote workers coupled with a 59% increase in BYOD policy adoption has wreaked havoc among enterprise IT security teams.
Honour among thieves: the study of a cybercrime marketplace in action | University of Cambridge
https://www.cam.ac.uk/research/news/honour-among-thieves-the-study-of-a-cybercrime-marketplace-in-action
https://www.cam.ac.uk/research/news/honour-among-thieves-the-study-of-a-cybercrime-marketplace-in-action
University of Cambridge
Honour among thieves: the study of a cybercrime marketplace in action
Having seen a large rise in illegal transactions during the first national lockdown last spring, the researchers warned that the second lockdown is likely to result in another surge in cybercrime