Remove 12
article thumbnail

12 cyber security questions to ask your CISO

IT Governance

Armed with the right information, the board can play an essential role in preventing problems before they arise. Our team of experts have identified the top questions that you need to ask your chief information security officer, and compiled our advice in a free brochure. How to implement a holistic cyber security programme.

article thumbnail

NYDFS Cybersecurity Regulations: First Annual Compliance Certification Due February 15, 2018

Data Matters

Companies that are subject to New York’s Cybersecurity Regulation are moving quickly to finalize their compliance obligations under the Cybersecurity Regulation, as the second “due date” quickly approaches – February 15, 2018. They also became obligated to report cybersecurity events to the NYDFS. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apr 10 – Apr 16 Ukraine – Russia the silent cyber conflict

Security Affairs

Threat actors are targeting Ukrainian government organizations with exploits for XSS vulnerabilities in Zimbra Collaboration Suite (CVE-2018-6882). April 12 – Russia-linked Sandworm APT targets Ukrainian energy facilities with wipers. Mar 06- Mar 12 Ukraine – Russia the silent cyber conflict. To nominate, please visit:?

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

This week, in our last podcast of the year, we revisit some of the biggest information security stories from the past 12 months. Hello and welcome to the final IT Governance podcast of 2018. For more information on each story, simply follow the links in the transcript on our blog. Well, that’ll do for 2018.

article thumbnail

Weekly podcast: A recap of the top stories of 2017 and a look ahead to 2018

IT Governance

This week, we look back at the big news from last year, and consider what the next 12 months have in store. Hello and welcome to the first IT Governance podcast of 2018. As it’s the first one, let’s have a brief recap of some of last year’s biggest stories, and then look ahead to what we can expect from the next 12 months.

article thumbnail

CISA JCDC Will Focus on Energy Sector

Security Affairs

This effort began with the 2018 establishment of the Cybersecurity and Infrastructure Security Agency (CISA) , a Department of Homeland Security division. Taking note of the pervasive threat landscape, the US government has devoted more resources to building a team to protect citizens and businesses.

article thumbnail

Mirai code re-use in Gafgyt

Security Affairs

In this blog, we’ll take a look at some of the re-used Mirai modules , their functionality, and the Uptycs EDR detection capabilities of Gafgyt. Gafgyt also uses some of the existing exploits (CVE-2017-17215, CVE-2018-10561) to download the next stage payloads, which we will discuss further on. executes the payload. in Figure 8).

IoT 121