Опубликован проект ГОСТ Р
"Защита информации. Разработка безопасного программного обеспечения. Угрозы безопасности информации при разработке программного обеспечения"
https://fstec.ru/tk-362/standarty-tk362/303-proekty/1758-gost-r-2
"Защита информации. Разработка безопасного программного обеспечения. Угрозы безопасности информации при разработке программного обеспечения"
https://fstec.ru/tk-362/standarty-tk362/303-proekty/1758-gost-r-2
fstec.ru
ГОСТ Р - ФСТЭК России
Официальный сайт Федеральной службы по техническому и экспортному контролю (ФСТЭК России)
Хороший пример массового набора специалистов с привязкой к NIST NICE.
https://t.co/BcD1GgxIZ9
https://t.co/BcD1GgxIZ9
CIS
11 of the Coolest Technical Jobs at CIS
There are hundreds of different job noscripts within the cybersecurity industry with millions of unfilled positions around the globe. Find out more about 11 of CIS' interesting and fun careers.
За нарушение gdpr госпиталь в Португалии оштрафовали на 400000 евро.
https://twitter.com/3dwave/status/1082358446199050240?s=09
https://twitter.com/3dwave/status/1082358446199050240?s=09
Twitter
Andrey Prozorov
First #GDPR fine in Portugal issued against hospital for three violations https://t.co/XQqw2UNYHV
Some facts considered proven by the CNPD:
There was no document containing the correspondence between the functional competences of the users and the profiles for access to the information (including to clinical information).
There was also no document defining the rules for creating users of the hospital's information system.
Nine technical employees enjoyed the level of access reserved for the medical group, which resulted in the indiscriminate possibility of such employees consulting the clinical processes of all hospital users.
Existence of access credentials which allowed any doctor, regardless of his/her specialty, to access at any time the data of the clients of a hospital. This was considered as violating the principle of "need to know" and the principle of "minimization of data."
There were 985 users associated with the profile "doctor," but in the official hospital human resources charts there are only 296 doctors in that hospital.
Maintenance of useless profiles for doctors who no longer provide services to the hospital.
There were only 18 user accounts that were inactive and the last one was deactivated in November 2016.
The defendant acted in a free and voluntary way and consciously knowing that its acts are prohibited by law.
There was no document containing the correspondence between the functional competences of the users and the profiles for access to the information (including to clinical information).
There was also no document defining the rules for creating users of the hospital's information system.
Nine technical employees enjoyed the level of access reserved for the medical group, which resulted in the indiscriminate possibility of such employees consulting the clinical processes of all hospital users.
Existence of access credentials which allowed any doctor, regardless of his/her specialty, to access at any time the data of the clients of a hospital. This was considered as violating the principle of "need to know" and the principle of "minimization of data."
There were 985 users associated with the profile "doctor," but in the official hospital human resources charts there are only 296 doctors in that hospital.
Maintenance of useless profiles for doctors who no longer provide services to the hospital.
There were only 18 user accounts that were inactive and the last one was deactivated in November 2016.
The defendant acted in a free and voluntary way and consciously knowing that its acts are prohibited by law.
Forwarded from RUSCADASEC news: Кибербезопасность АСУ ТП (RUSCADASEC-bot)
Хороший обзор того что делает Siemens и ее партнеры по кибербезопасности. Показывает уровень зрелости вендора, а также тенденции рынка industrial cybersecurity и его участников
Долгосрочные исследования Siemens по кибербезопасности
- Self-securing systems design;
- Security validation for digital twin;
- Next-generation patching;
- Security for cooperative, autonomous systems;
- Post-quantum cryptography
- Homomorphic encryption
- Automated forensics and malware analysis;
- Secure, cloud-based, real-time control; and
- Supply-chain security.
Сервисы компании TÜV изначально специализировавшейся на сервисах промышленной безопасности
- Digital footprint of an entity;
- Automated and manual red teaming
- Device fingerprinting based on AI;
- OSINT-based digital reputation;
- Intelligence-led penetration testing;
- Critical asset identification; and
- Top management risk reports
https://www.controlglobal.com/industrynews/2019/siemens-partners-strive-for-security/
Долгосрочные исследования Siemens по кибербезопасности
- Self-securing systems design;
- Security validation for digital twin;
- Next-generation patching;
- Security for cooperative, autonomous systems;
- Post-quantum cryptography
- Homomorphic encryption
- Automated forensics and malware analysis;
- Secure, cloud-based, real-time control; and
- Supply-chain security.
Сервисы компании TÜV изначально специализировавшейся на сервисах промышленной безопасности
- Digital footprint of an entity;
- Automated and manual red teaming
- Device fingerprinting based on AI;
- OSINT-based digital reputation;
- Intelligence-led penetration testing;
- Critical asset identification; and
- Top management risk reports
https://www.controlglobal.com/industrynews/2019/siemens-partners-strive-for-security/
Control Global
Siemens, partners strive for security
Siemens AG and 16 of its primary industrial partners, who recently signed their jointly developed Charter of Trust, which is seeking to present a united front and standardized protections against cyber threats, intrusions and attacks. As part of their efforts…
Учитывая, что siemens в топ-20 по вложениям в r&d, шансы очень неплохие, что исследования закончатся значимым итогом.
Forwarded from Proeconomics
Компании - мировые лидеры по затратам на НИОКР в 2018 году. В лидеры выбился Samsung. Излишне говорить, что в Топ-50 российских компаний нет
В США запустили информационную кампанию по порьбе с целевыми атаками. Кампания ориентирована на частный сектор.
Интересна сводная статистика по целевым атакам за 2018 год.
КНР: 45 компаний и ФОИВ.
Иран: более чем 144 университета.
Материалы предназначены для борьбы со следующими угрозами исходящими от:
1. Цепочка поставок.
2. Спиарфишинг.
3.социальные медиа и ложные новости.
4. Зарубежные путешествия.
National Counterintelligence and Security Center Launches Campaign to Help Private Industry Guard Against Threats from Nation State Actors
https://www.dni.gov/index.php/ncsc-newsroom/item/1938-national-counterintelligence-and-security-center-launches-campaign-to-help-private-industry-guard-against-threats-from-nation-state-actors
Интересна сводная статистика по целевым атакам за 2018 год.
КНР: 45 компаний и ФОИВ.
Иран: более чем 144 университета.
Материалы предназначены для борьбы со следующими угрозами исходящими от:
1. Цепочка поставок.
2. Спиарфишинг.
3.социальные медиа и ложные новости.
4. Зарубежные путешествия.
National Counterintelligence and Security Center Launches Campaign to Help Private Industry Guard Against Threats from Nation State Actors
https://www.dni.gov/index.php/ncsc-newsroom/item/1938-national-counterintelligence-and-security-center-launches-campaign-to-help-private-industry-guard-against-threats-from-nation-state-actors
www.dni.gov
National Counterintelligence and Security Center Launches Campaign to Help Private Industry Guard Against Threats from Nation…
NEWS RELEASE FOR IMMEDIATE RELEASE ODNI News Release No. 01-19 January 7, 2019 National Counterintelligence and Security Center Launches...
Сами материалы кампании размещены здесь:
NCSC Awareness Materials
https://www.dni.gov/index.php/ncsc-how-we-work/ncsc-know-the-risk-raise-your-shield/ncsc-awareness-materials
NCSC Awareness Materials
https://www.dni.gov/index.php/ncsc-how-we-work/ncsc-know-the-risk-raise-your-shield/ncsc-awareness-materials
Tech skills in most demand this year: data, cloud and cybersecurity | ZDNet
https://www.zdnet.com/article/tech-skills-in-the-most-demand-this-year-data-cloud-and-cybersecurity/
https://www.zdnet.com/article/tech-skills-in-the-most-demand-this-year-data-cloud-and-cybersecurity/
ZDNet
Tech skills in most demand this year: data, cloud and cybersecurity
Salaries and skills surveys by Foote Partners and Hays finds insatiable demand for people who can build AI systems and those who can secure them.
"In terms of cybersecurity, Foote indicates "that 12 of the 25 top-paying certifications are related to information/cybersecurity. Almost every job in tech now requires security awareness and basic know-how."
Пентагон решил определить этические принципы использования ИИ в вооружении.
Pentagon Seeks a List of Ethical Principles for Using AI in War - Defense One
https://www.defenseone.com/technology/2019/01/pentagon-seeks-list-ethical-principles-using-ai-war/153940/
Pentagon Seeks a List of Ethical Principles for Using AI in War - Defense One
https://www.defenseone.com/technology/2019/01/pentagon-seeks-list-ethical-principles-using-ai-war/153940/
Defense One
Pentagon Seeks a List of Ethical Principles for Using AI in War
An advisory board is drafting guidelines that may help shape worldwide norms for military artificial intelligence — and woo Silicon Valley to defense work.
Forwarded from Пост Лукацкого
Блиц-обзор новостей по ИБ за прошедшие праздники https://t.co/XzUQextYM5
— Alexey Lukatsky (@alukatsky) January 9, 2019
— Alexey Lukatsky (@alukatsky) January 9, 2019
Blogspot
Блиц-обзор новостей по ИБ за прошедшие праздники
Блог Алексея Лукацкого "Бизнес без опасности"
MS подвез новых патчей для критических уязвимостей.
Обратите внимание:
CVE-2019-0547 is a memory corruption vulnerability in the Windows DHCP client that exists when an attacker sends specially crafted DHCP responses to a client. An attacker could gain the ability to run arbitrary code on the client machine if they successfully exploit this vulnerability
https://vulners.com/talosblog/TALOSBLOG:7E9E33CAB0FFF41F91CB12E204945F7F
Обратите внимание:
CVE-2019-0547 is a memory corruption vulnerability in the Windows DHCP client that exists when an attacker sends specially crafted DHCP responses to a client. An attacker could gain the ability to run arbitrary code on the client machine if they successfully exploit this vulnerability
https://vulners.com/talosblog/TALOSBLOG:7E9E33CAB0FFF41F91CB12E204945F7F
Vulners Database
Microsoft Patch Tuesday — January 2019: Vulnerability disclosures and Snort coverage
Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 49 vulnerabilities, seven of which are rated “critical,” 40 that are considered “important” and one that…
Немецкий ФСТЭК ждет увеличение штата и принятие нового закона по кибербезопасности.
http://d-russia.ru/v-svyazi-s-hakerskim-skandalom-v-germanii-obyavleno-o-skorom-prinyatii-akta-ob-it-bezopasnosti-2-0.html
http://d-russia.ru/v-svyazi-s-hakerskim-skandalom-v-germanii-obyavleno-o-skorom-prinyatii-akta-ob-it-bezopasnosti-2-0.html
Digital Russia
В связи с хакерским скандалом в Германии объявлено о скором принятии «Акта об IT-безопасности 2.0» | Digital Russia
Учащийся одной из гимназий Гессена после ареста в понедельник признался во взломе аккаунтов сотен известных граждан Германии – политиков, деятелей
Подборка штрафов за нарушение GDPR (и не только) за 2018 год
https://www.itweek.ru/security/news-company/detail_print.php?ID=204797&print=Y
https://www.itweek.ru/security/news-company/detail_print.php?ID=204797&print=Y
itWeek
ИТ-гиганты в 2018 году проштрафились на 246,8 млн. долл. за утечку данных
2018 год прошел под знаком штрафов. Поступили первые квитанции по GDPR, но основные штрафы наложила не Еврокомиссия, а другие регуляторы. Аналитики «СёрчИнформ» подсчитали ущерб от неумелого обращения с данными и с законом. Спойлер: российские компании
Опубликовано европейское исследование взаимодействия подразделений реагирования на инциденты(сsirt), правоохранительных органов, судов и прокуроров.
Supporting the Fight Against Cybercrime: ENISA report on CSIRTs and Law Enforcement Cooperation — ENISA
https://www.enisa.europa.eu/news/enisa-news/supporting-the-fight-against-cybercrime-enisa-report-on-csirts-and-law-enforcement-cooperation
Supporting the Fight Against Cybercrime: ENISA report on CSIRTs and Law Enforcement Cooperation — ENISA
https://www.enisa.europa.eu/news/enisa-news/supporting-the-fight-against-cybercrime-enisa-report-on-csirts-and-law-enforcement-cooperation
www.enisa.europa.eu
Supporting the Fight Against Cybercrime: ENISA report on CSIRTs and Law Enforcement Cooperation — ENISA
The fight against cybercrime, requires the involvement of Law Enforcement Agencies, which supported by CSIRTS are likely to be better positioned to investigate complex criminal structures.
Сценарии настольных игр по кибербезопасности от CIS
https://www.cisecurity.org/white-papers/six-tabletop-exercises-prepare-cybersecurity-team/
https://www.cisecurity.org/white-papers/six-tabletop-exercises-prepare-cybersecurity-team/
CIS
Six Tabletop Exercises to Help Prepare Your Cybersecurity Team
Tabletop exercises are used to help cybersecurity teams develop tactical strategies for securing their systems. Review six scenarios to prepare your team.
Грядущая новая сертификация облачных провайдеров в Евросоюзе на требования по безопасности
CSPCERT
https://ec.europa.eu/digital-single-market/en/blogposts/free-flow-data-eu-pathway-cloud
CSPCERT
https://ec.europa.eu/digital-single-market/en/blogposts/free-flow-data-eu-pathway-cloud
Digital Single Market
Free flow of data in the EU – a pathway into the cloud
New proposals on the free flow of non-personal data will give greater certainty to businesses and consumers alike and create an EU data sector that is fit-for-purpose for the 21st century.