ISACARuSec – Telegram
ISACARuSec
2.27K subscribers
1.78K photos
13 videos
303 files
5.65K links
Канал направления ИБ Московского отделения ISACA

Направление канала новости ISACA, новости в области управления ИБ в России и мире, обмен лучшими практиками.

https://engage.isaca.org/moscow/home

Связь с администрацией
@popepiusXIII
Download Telegram
Новый черновик лучших практик Нист.
As part of a zero trust approach, data-centric security management aims to enhance protection of information (data) regardless of where the data resides or who it is shared with. Data-centric security management necessarily depends on organizations knowing what data they have, what its characteristics are, and what security and privacy requirements it needs to meet so the necessary protections can be achieved. Standardized mechanisms for communicating data characteristics and protection requirements are needed to make data-centric security management feasible at scale.
https://www.nccoe.nist.gov/projects/building-blocks/data-classification
Намерение генеральных директоров увеличить расходы на цифровые решения и ИТ неизбежно влечет повышение расходов на ИБ.

https://www.gartner.com/smarterwithgartner/ceos-see-growth-in-2021-marked-by-3-shifts/
Интересный обзор новой стратегии США кибербезопасности - https://t.co/B7SchxQknr pic.twitter.com/CGDntQcaBA
— Alexey Lukatsky (@alukatsky) May 20, 2021
Forwarded from SecurityLab.ru (SecurityLab news)
Одна из крупнейших в США страховых компаний CNA заплатила хакерам $40 млн за восстановление доступа к своим сетям после атаки вымогательского ПО.



https://www.securitylab.ru/news/520430.php
https://twitter.com/shipulin_anton/status/1395680498068897795

New report by @USGAO on Cyber Insurance:
Insurers and Policyholders Face Challenges in an Evolving Market.

"The growing frequency and severity of cyberattacks have led more insurance clients to opt for cyber coverage—up from 26% in 2016 to 47% in 2020"

https://t.co/q2P6z5tAfJ https://t.co/2grhQEFCQP
To tackle vulnerabilities in the UEFI space, the duo proposed a multi-step ideal scenerio to work toward:

Promote software bills of materials (SBOMS) extending to the firmware level
Have vendors include the intent of the components of the system
Produce analysis of code
Provide public risk scoring
Reduce purchasing of products that shape up poorly

https://www.scmagazine.com/home/security-news/vulnerabilities/dhs-announces-program-to-mitigate-vulnerabilities-below-the-operating-system/