article thumbnail

RSAC Fireside Chat: AT&T, WillJam Ventures partner to launch new MSSP — LevelBlue

The Last Watchdog

“Our job at Level Blue is to manage and mitigate these risks while supporting our clients’ growth and innovation while acting as a strategic extension of your team,” Lanowitz told me For a full drill down, please give the accompanying podcast a listen. I’ll keep watch and keep reporting.

article thumbnail

Congressional Movement on Cybersecurity in a Bill to Reauthorize the Homeland Security Act of 2002

Data Matters

Senate’s Homeland Security and Governmental Affairs Committee ­approved a bill ( SB 2825 ) reauthorizing the Homeland Security Act of 2002 and including key cybersecurity provisions affecting the Department of Homeland Security (DHS). SB 2825 requires that DHS routinely conduct cyber-risk assessments and issue risk reports to Congress.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: New ‘cyberthreat index’ shows SMBs cognizant of big risks, ill-prepared to deal with them

The Last Watchdog

Small and midsize businesses — so-called SMBs — face an acute risk of sustaining a crippling cyberattack. This appears to be even more true today than it was when I began writing about business cyber risks at USA TODAY more than a decade ago. There are so many more ways to subvert authentication.

Risk 182
article thumbnail

Patch Tuesday Fixes Actively Exploited MOTW Vulnerability

eSecurity Planet

“But with two zero days, it’s crucial that all IT departments deploy the recommended patches to reduce serious risk,” he said. Another key update, Leonard noted, patches CVE-2002-41076 , a critical remote code execution flaw in PowerShell with a CVSS score of 8.5.

Risk 130
article thumbnail

CISA adds 95 flaws to the Known Exploited Vulnerabilities Catalog

Security Affairs

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities , FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

article thumbnail

Webinar on the SAFETY Act and Cybersecurity: Protecting Your Reputation and Reducing Liability Risk

Hunton Privacy

In 2002, Congress enacted the Supporting Anti-Terrorism by Fostering Effective Technologies Act (“the SAFETY Act”) to limit the liabilities that energy, financial, manufacturing and other critical infrastructure companies face in the event of a serious cyber or physical security attack.

article thumbnail

CIPL Publishes Paper on the Draft ePrivacy Regulation to Inform Current Trilogue Discussions

Hunton Privacy

The ePR is intended to update the existing ePrivacy Directive ( Directive 2002/58/EC on privacy and electronic communications ). designate data protection authorities as sole regulators to avoid enforcement overlap and enable harmonization through the one-stop-shop mechanism.

Paper 81