Опубликован сводный план проверок субъектов предпринимательства на 2019 год.
Надо вводить инн, огрн и капчу.
http://plan.genproc.gov.ru/plan2019/
Надо вводить инн, огрн и капчу.
http://plan.genproc.gov.ru/plan2019/
Минздрав США выпустил руководство по кибербезопасности для мед. организаций. Некоторые эксперты видят существенный недостаток, что оно не риск-ориентировано.
HHS releases cyber guides for healthcare orgs -- FCW
https://fcw.com/articles/2019/01/02/hhs-cyber-johnson.aspx?m=1
HHS releases cyber guides for healthcare orgs -- FCW
https://fcw.com/articles/2019/01/02/hhs-cyber-johnson.aspx?m=1
FCW
HHS releases cyber guides for healthcare orgs -- FCW
The Department of Health and Human Services has rolled out new guidance to protect organizations in the health care sector from cyberattacks.
Если не ошибаюсь, то на soc-forum Виталий Сергеевич Лютиков обозначил сектор телекома как условно отстающий в части категоризации КИИ.
CenturyLink outage takes down several 911 emergency services across the US | ZDNet
https://www.zdnet.com/article/centurylink-outage-takes-down-several-911-emergency-services-across-the-us/
CenturyLink outage takes down several 911 emergency services across the US | ZDNet
https://www.zdnet.com/article/centurylink-outage-takes-down-several-911-emergency-services-across-the-us/
ZDNet
CenturyLink outage takes down several 911 emergency services across the US | ZDNet
Downtime caused by network issue affecting 15 of CenturyLink's data centers.
ENISAFactsheetA4201709181955pdf.pdf
881 KB
Факты о продлении мандата всеевропейского ФСТЭК -ENISA после 2020 года и грядущей всеевропейской сертификации СЗИ.
1.Пишут, что сертификации сама по себе добровольная, но требования по её наличию могут быть установлены законодательно. Как думаете, как скоро она станет обязательной для GDPR?
2.Приведены существующие системы сертификации в ЕС: CPA, CSPN, BSPA, SOG-IS MRA.
ENISAFactsheetA4201709181955pdf.pdf
1.Пишут, что сертификации сама по себе добровольная, но требования по её наличию могут быть установлены законодательно. Как думаете, как скоро она станет обязательной для GDPR?
2.Приведены существующие системы сертификации в ЕС: CPA, CSPN, BSPA, SOG-IS MRA.
ENISAFactsheetA4201709181955pdf.pdf
ISACARuSec
Из за shutdown не доступны в т.ч. и ресурсы NIST. Shutdown Due to Lapse of Congressional Appropriations | U.S. Department of Commerce https://www.commerce.gov/news/blog/2018/12/shutdown-due-lapse-congressional-appropriations
Что характерно база уязвимостей NVD продолжает работать и не включена в шатдаун.
Опубликован проект ГОСТ Р
"Защита информации. Разработка безопасного программного обеспечения. Угрозы безопасности информации при разработке программного обеспечения"
https://fstec.ru/tk-362/standarty-tk362/303-proekty/1758-gost-r-2
"Защита информации. Разработка безопасного программного обеспечения. Угрозы безопасности информации при разработке программного обеспечения"
https://fstec.ru/tk-362/standarty-tk362/303-proekty/1758-gost-r-2
fstec.ru
ГОСТ Р - ФСТЭК России
Официальный сайт Федеральной службы по техническому и экспортному контролю (ФСТЭК России)
Хороший пример массового набора специалистов с привязкой к NIST NICE.
https://t.co/BcD1GgxIZ9
https://t.co/BcD1GgxIZ9
CIS
11 of the Coolest Technical Jobs at CIS
There are hundreds of different job noscripts within the cybersecurity industry with millions of unfilled positions around the globe. Find out more about 11 of CIS' interesting and fun careers.
За нарушение gdpr госпиталь в Португалии оштрафовали на 400000 евро.
https://twitter.com/3dwave/status/1082358446199050240?s=09
https://twitter.com/3dwave/status/1082358446199050240?s=09
Twitter
Andrey Prozorov
First #GDPR fine in Portugal issued against hospital for three violations https://t.co/XQqw2UNYHV
Some facts considered proven by the CNPD:
There was no document containing the correspondence between the functional competences of the users and the profiles for access to the information (including to clinical information).
There was also no document defining the rules for creating users of the hospital's information system.
Nine technical employees enjoyed the level of access reserved for the medical group, which resulted in the indiscriminate possibility of such employees consulting the clinical processes of all hospital users.
Existence of access credentials which allowed any doctor, regardless of his/her specialty, to access at any time the data of the clients of a hospital. This was considered as violating the principle of "need to know" and the principle of "minimization of data."
There were 985 users associated with the profile "doctor," but in the official hospital human resources charts there are only 296 doctors in that hospital.
Maintenance of useless profiles for doctors who no longer provide services to the hospital.
There were only 18 user accounts that were inactive and the last one was deactivated in November 2016.
The defendant acted in a free and voluntary way and consciously knowing that its acts are prohibited by law.
There was no document containing the correspondence between the functional competences of the users and the profiles for access to the information (including to clinical information).
There was also no document defining the rules for creating users of the hospital's information system.
Nine technical employees enjoyed the level of access reserved for the medical group, which resulted in the indiscriminate possibility of such employees consulting the clinical processes of all hospital users.
Existence of access credentials which allowed any doctor, regardless of his/her specialty, to access at any time the data of the clients of a hospital. This was considered as violating the principle of "need to know" and the principle of "minimization of data."
There were 985 users associated with the profile "doctor," but in the official hospital human resources charts there are only 296 doctors in that hospital.
Maintenance of useless profiles for doctors who no longer provide services to the hospital.
There were only 18 user accounts that were inactive and the last one was deactivated in November 2016.
The defendant acted in a free and voluntary way and consciously knowing that its acts are prohibited by law.
Forwarded from RUSCADASEC news: Кибербезопасность АСУ ТП (RUSCADASEC-bot)
Хороший обзор того что делает Siemens и ее партнеры по кибербезопасности. Показывает уровень зрелости вендора, а также тенденции рынка industrial cybersecurity и его участников
Долгосрочные исследования Siemens по кибербезопасности
- Self-securing systems design;
- Security validation for digital twin;
- Next-generation patching;
- Security for cooperative, autonomous systems;
- Post-quantum cryptography
- Homomorphic encryption
- Automated forensics and malware analysis;
- Secure, cloud-based, real-time control; and
- Supply-chain security.
Сервисы компании TÜV изначально специализировавшейся на сервисах промышленной безопасности
- Digital footprint of an entity;
- Automated and manual red teaming
- Device fingerprinting based on AI;
- OSINT-based digital reputation;
- Intelligence-led penetration testing;
- Critical asset identification; and
- Top management risk reports
https://www.controlglobal.com/industrynews/2019/siemens-partners-strive-for-security/
Долгосрочные исследования Siemens по кибербезопасности
- Self-securing systems design;
- Security validation for digital twin;
- Next-generation patching;
- Security for cooperative, autonomous systems;
- Post-quantum cryptography
- Homomorphic encryption
- Automated forensics and malware analysis;
- Secure, cloud-based, real-time control; and
- Supply-chain security.
Сервисы компании TÜV изначально специализировавшейся на сервисах промышленной безопасности
- Digital footprint of an entity;
- Automated and manual red teaming
- Device fingerprinting based on AI;
- OSINT-based digital reputation;
- Intelligence-led penetration testing;
- Critical asset identification; and
- Top management risk reports
https://www.controlglobal.com/industrynews/2019/siemens-partners-strive-for-security/
Control Global
Siemens, partners strive for security
Siemens AG and 16 of its primary industrial partners, who recently signed their jointly developed Charter of Trust, which is seeking to present a united front and standardized protections against cyber threats, intrusions and attacks. As part of their efforts…
Учитывая, что siemens в топ-20 по вложениям в r&d, шансы очень неплохие, что исследования закончатся значимым итогом.
Forwarded from Proeconomics
Компании - мировые лидеры по затратам на НИОКР в 2018 году. В лидеры выбился Samsung. Излишне говорить, что в Топ-50 российских компаний нет
В США запустили информационную кампанию по порьбе с целевыми атаками. Кампания ориентирована на частный сектор.
Интересна сводная статистика по целевым атакам за 2018 год.
КНР: 45 компаний и ФОИВ.
Иран: более чем 144 университета.
Материалы предназначены для борьбы со следующими угрозами исходящими от:
1. Цепочка поставок.
2. Спиарфишинг.
3.социальные медиа и ложные новости.
4. Зарубежные путешествия.
National Counterintelligence and Security Center Launches Campaign to Help Private Industry Guard Against Threats from Nation State Actors
https://www.dni.gov/index.php/ncsc-newsroom/item/1938-national-counterintelligence-and-security-center-launches-campaign-to-help-private-industry-guard-against-threats-from-nation-state-actors
Интересна сводная статистика по целевым атакам за 2018 год.
КНР: 45 компаний и ФОИВ.
Иран: более чем 144 университета.
Материалы предназначены для борьбы со следующими угрозами исходящими от:
1. Цепочка поставок.
2. Спиарфишинг.
3.социальные медиа и ложные новости.
4. Зарубежные путешествия.
National Counterintelligence and Security Center Launches Campaign to Help Private Industry Guard Against Threats from Nation State Actors
https://www.dni.gov/index.php/ncsc-newsroom/item/1938-national-counterintelligence-and-security-center-launches-campaign-to-help-private-industry-guard-against-threats-from-nation-state-actors
www.dni.gov
National Counterintelligence and Security Center Launches Campaign to Help Private Industry Guard Against Threats from Nation…
NEWS RELEASE FOR IMMEDIATE RELEASE ODNI News Release No. 01-19 January 7, 2019 National Counterintelligence and Security Center Launches...
Сами материалы кампании размещены здесь:
NCSC Awareness Materials
https://www.dni.gov/index.php/ncsc-how-we-work/ncsc-know-the-risk-raise-your-shield/ncsc-awareness-materials
NCSC Awareness Materials
https://www.dni.gov/index.php/ncsc-how-we-work/ncsc-know-the-risk-raise-your-shield/ncsc-awareness-materials
Tech skills in most demand this year: data, cloud and cybersecurity | ZDNet
https://www.zdnet.com/article/tech-skills-in-the-most-demand-this-year-data-cloud-and-cybersecurity/
https://www.zdnet.com/article/tech-skills-in-the-most-demand-this-year-data-cloud-and-cybersecurity/
ZDNet
Tech skills in most demand this year: data, cloud and cybersecurity
Salaries and skills surveys by Foote Partners and Hays finds insatiable demand for people who can build AI systems and those who can secure them.
"In terms of cybersecurity, Foote indicates "that 12 of the 25 top-paying certifications are related to information/cybersecurity. Almost every job in tech now requires security awareness and basic know-how."
Пентагон решил определить этические принципы использования ИИ в вооружении.
Pentagon Seeks a List of Ethical Principles for Using AI in War - Defense One
https://www.defenseone.com/technology/2019/01/pentagon-seeks-list-ethical-principles-using-ai-war/153940/
Pentagon Seeks a List of Ethical Principles for Using AI in War - Defense One
https://www.defenseone.com/technology/2019/01/pentagon-seeks-list-ethical-principles-using-ai-war/153940/
Defense One
Pentagon Seeks a List of Ethical Principles for Using AI in War
An advisory board is drafting guidelines that may help shape worldwide norms for military artificial intelligence — and woo Silicon Valley to defense work.
Forwarded from Пост Лукацкого
Блиц-обзор новостей по ИБ за прошедшие праздники https://t.co/XzUQextYM5
— Alexey Lukatsky (@alukatsky) January 9, 2019
— Alexey Lukatsky (@alukatsky) January 9, 2019
Blogspot
Блиц-обзор новостей по ИБ за прошедшие праздники
Блог Алексея Лукацкого "Бизнес без опасности"
MS подвез новых патчей для критических уязвимостей.
Обратите внимание:
CVE-2019-0547 is a memory corruption vulnerability in the Windows DHCP client that exists when an attacker sends specially crafted DHCP responses to a client. An attacker could gain the ability to run arbitrary code on the client machine if they successfully exploit this vulnerability
https://vulners.com/talosblog/TALOSBLOG:7E9E33CAB0FFF41F91CB12E204945F7F
Обратите внимание:
CVE-2019-0547 is a memory corruption vulnerability in the Windows DHCP client that exists when an attacker sends specially crafted DHCP responses to a client. An attacker could gain the ability to run arbitrary code on the client machine if they successfully exploit this vulnerability
https://vulners.com/talosblog/TALOSBLOG:7E9E33CAB0FFF41F91CB12E204945F7F
Vulners Database
Microsoft Patch Tuesday — January 2019: Vulnerability disclosures and Snort coverage
Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 49 vulnerabilities, seven of which are rated “critical,” 40 that are considered “important” and one that…