Implementing Cybersecurity Best Practices

Data Breach Today

Andy Purdy, the chief security officer for Huawei Technologies USA who formerly worked on the White House staff and in the Department of Homeland Security, discusses cybersecurity best practices

Cybersecurity M&A Update: Five Firms Make Moves

Data Breach Today

Ivanti, Sophos, Deloitte, Cerberus Sentinel and Feedzai Announce Deals Cybersecurity acquisitions continue at an intense pace, with Ivanti, Sophos, Deloitte Risk & Financial Advisory, Cerberus Sentinel and Feedzai all making moves to bolster their security portfolios


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

OMB Spells Out Agencies' Cybersecurity Timelines

Data Breach Today

Federal Agencies Ordered to Identify 'Critical Software' That Must Then Be Protected The Office of Management and Budget is ordering federal agencies to begin identifying "critical software" that needs protection as part of the effort to fulfill President Biden's cybersecurity executive order.

ISMG Editors’ Panel: Government Cybersecurity Challenges

Data Breach Today

Also: Dealing With COVID-19 Business Recovery; Zynga Case Goes to Arbitration In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including improving federal agencies' cybersecurity and businesses recovering from the pandemic's impac

Your Team's Pragmatic Guide to Security

Speaker: Naresh Soni, CTO, Tsunami XR

The pandemic has led to new data vulnerabilities, and therefore new cybersecurity threats. As technology leaders, it's time to rethink some of your product security strategies. Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered.

How to 'Demystify' Cybersecurity

Data Breach Today

Ciaran Martin, Former UK Cybersecurity Chief, on Managing Cyber Risks To defend against cyberattacks, it's important to "demystify" cybersecurity and break it into risks that can be managed by any organization, says Ciaran Martin, the former director of the U.K.

2 State Cybersecurity, Data Privacy Laws Enacted

Data Breach Today

Connecticut Law Provides Security Incentives; Colorado Measure Addresses Consumers' Privacy Two states have recently taken steps to bolster cybersecurity and data privacy protections.

TSA Issues Cybersecurity Requirements for Pipelines

Data Breach Today

Agency Cites 'Ongoing Cybersecurity Threat' The U.S. Transportation Security Administration issued a directive Tuesday requiring owners and operators of oil and natural gas pipelines to implement several cybersecurity controls.

Cybersecurity Leadership: It’s About Cloud Security

Data Breach Today

How are cybersecurity leaders managing visibility, access and risk? CEOs and CISOs on Managing Visibility, Accessibility and Risk Almost every organization has adopted cloud computing to some extent, and with this great power comes great responsibility.

Cloud 158

Top Cybersecurity Companies for 2021

eSecurity Planet

As the demand for robust security defense grows by the day, the market for cybersecurity technology has exploded, as well as the number of available solutions. The Best Cybersecurity Companies. Syxsense Secure. Stop breaches with one endpoint security solution.

SEC Sanctions 8 Firms for 'Deficient Cybersecurity Procedures'

Data Breach Today

Securities and Exchange Commission sanctioned eight financial firms for alleged failures related to cybersecurity policies and procedures, each stemming from email account takeovers and related incident response, the regulator announced this week

Analysis: 'Cybersecurity Call to Arms'

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of British spy chief Jeremy Flemming’s "cybersecurity call to arms." Also featured: Insights on COVID-19 business continuity planning; the wisdom of the late Dan Kaminsky

DHS Unveils New Cybersecurity Requirements for Pipelines

Data Breach Today

Security Directive Issued Following Colonial Pipeline Ransomware Attack The Department of Homeland Security has issued a cybersecurity directive that requires the operators of oil and gas pipelines to report ransomware attacks and other security incidents to the government and take other security steps.

Capitol Breach: Cybersecurity Lessons to Apply

Data Breach Today

Brian Honan: Security Professionals Can Take Action to Minimize Risks The physical breach of the U.S.

Biden's Infrastructure Plan: 3 Cybersecurity Provisions

Data Breach Today

ENISA publishes Cybersecurity guide for SMEs

Security Affairs

ENISA publishes Cybersecurity guide for SMEs, a document that aims at providing suggestions to secure their business. ENISA published a guide to provide SMEs with practical 12 high-level recommendations on how to improve security of their infrastructure and their business.

Singapore Launches IoT Cybersecurity Labelling

Data Breach Today

Labels Will Indicate What Security Standards Products Meet Singapore has launched an IoT cybersecurity labelling program intended to improve the baseline security of internet-connected consumer products.

IoT 227

Bill Looks to Close Federal Cybersecurity Loopholes

Data Breach Today

Lawmakers Want to Restrict Agencies From Postponing Security Measures Sen. have introduced a bill designed to patch loopholes in the Federal Cybersecurity Enhancement Act of 2015 that they say allow federal agencies to easily avoid implementing required cybersecurity procedures

Teaching Cybersecurity to Children

Schneier on Security

Uncategorized children cybersecurity generations privacy security education

More Biden Cybersecurity Nominations

Schneier on Security

News : President Biden announced key cybersecurity leadership nominations Monday, proposing Jen Easterly as the next head of the Cybersecurity and Infrastructure Security Agency and John “Chris” Inglis as the first ever national cyber director (NCD).

Investments in Israel's Cybersecurity Sector Grow 70%

Data Breach Today

Exports Also Continue to Grow Pre-IPO investments in Israeli cybersecurity firms totaled $2.9 Security experts offer insights on the reasons behind the growth

ISMG Panel Discussion: Hot Cybersecurity Issues

Data Breach Today

Editors Address Exchange Hacks, Insider Threats and More Four editors at Information Security Media Group review the latest cybersecurity issues, including Microsoft Exchange server hacks, insider threat management and implementing a "collective defense

Biden Signs Sweeping Executive Order on Cybersecurity

Data Breach Today

Live Study Results Webinar: 2021 Cybersecurity Complexity Research Survey

Data Breach Today

Join the live discussion as we debut these results and more, gathered through the 2021 Cybersecurity Complexity Research Study conducted in H2 2021. What are trends toward plans to invest in cloud security and automation?

Weekly Roundup: Biden’s Cybersecurity Proposals and More

Data Breach Today

ISMG Editors Discuss Hot Topics, Including Health Data Breaches Four editors at Information Security Media Group discuss important cybersecurity issues, including President Biden’s latest cybersecurity proposals and large vendor-related breaches in healthcare

Thinking of a Cybersecurity Career? Read This

Krebs on Security

Thousands of people graduate from colleges and universities each year with cybersecurity or computer science degrees only to find employers are less than thrilled about their hands-on, foundational skills.

NEW TECH: Will ‘Secure Access Service Edge’ — SASE — Be the Answer to Secure Connectivity?

The Last Watchdog

Company networks have evolved rather spectacularly in just 20 years along a couple of distinct tracks: connectivity and security. And given a tangible network perimeter, cybersecurity evolved following the moat-and-wall principle. Related: The shared burden of securing the Internet of Things. Security, meanwhile, has morphed into a glut of point solutions that mostly serve to highlight the myriad gaps in an ever-expanding attack surface.

A Holistic Approach to Cybersecurity and Compliance

Data Breach Today

In a joint interview, Mike Ferris and Mike Brooks of Abacode, a managed cybersecurity and compliance provider, discuss how the MCCP model helps businesses implement a holistic, framework-based cybersecurity program that provides continuous security and compliance

AI and Cybersecurity

Schneier on Security

Ben Buchanan has written " A National Security Research Agenda for Cybersecurity and Artificial Intelligence." artificialintelligence attribution cybersecurity nationalsecuritypolicy reports

Does Abandoning Embassy in Kabul Pose Cybersecurity Risks?

Data Breach Today

Security Experts Size Up Impact of US Rush to Leave Afghanistan It's unlikely that the U.S. abandoning its embassy and other facilities in Afghanistan poses cyber risks, thanks to the emergency planning that was already in place, some security experts say

Risk 279

State Department Plans to Create Cybersecurity Office

Data Breach Today

Department of State has announced plans to create a Bureau of Cyberspace Security and Emerging Technologies to enhance its security and help it deal with international cybersecurity issues. But Will the Move Be Carried Out Under Biden Administration? The U.S.

Cybersecurity Firm McAfee Files for IPO

Data Breach Today

Separately, Ivanti Buys Security Firms MobileIron and Pulse Secure McAfee is set to become a public company once again, with the cybersecurity firm filing for an IPO with the U.S. Securities and Exchange Commission to trade under "MCFE" on the Nasdaq Stock Market.

Cybersecurity Regs for Pipelines Reportedly Coming Soon

Data Breach Today

Department of Homeland Security is preparing cybersecurity regulations for the oil and gas industry in the wake of the ransomware attack on Colonial Pipeline Co. Fresh Regulations Planned Following Colonial Pipeline Ransomware Attack The U.S.

A Cybersecurity Policy Agenda

Schneier on Security

The Aspen Institute’s Aspen Cybersecurity Group — I’m a member — has released its cybersecurity policy agenda for the next four years. Uncategorized cybersecurity national security policy reports risks

U.S. Department of Homeland Security Announces Additional Pipeline Cybersecurity Directive

Hunton Privacy

The Second Directive requires TSA-designated critical pipelines to: implement specific mitigation measures to protect against ransomware and other threats to information technology and operational technology systems; develop and implement a cybersecurity contingency and recovery plan; and.

SolarWinds Hires Chris Krebs to Reboot Its Cybersecurity

Data Breach Today

Hacked Firm Also Taps Former Facebook CSO as It Responds to Supply Chain Attack As security software firm SolarWinds investigates the supply chain attack involving its Orion software and looks to rebuild its security processes and reputation, it's hired former U.S.

Biden's $10 Billion Cybersecurity Proposal: Is It Enough?

Data Breach Today

Security Experts Say Proposal Amounts to a 'Down Payment' President-elect Joe Biden's $1.9 trillion plan for COVID-19 relief includes nearly $10 billion in cybersecurity and IT spending. Some security experts hope the amount as just a "down payment" toward a broader effort

EU leaders aim at boosting defense and security, including cybersecurity

Security Affairs

During a video conference of the members of the European Council, EU leaders agreed on a new strategy aimed at boosting defense and security. Participants are committed to providing secure European access to space, cyberspace and the high seas. SecurityAffairs – hacking, security).

Biden's Cybersecurity Executive Order: 4 Key Takeaways

Data Breach Today

White House Puts Focus on 'Zero Trust,' Software Standards, Information Sharing By issuing a sweeping cybersecurity executive order on Wednesday, the Biden administration is attempting to take a critical step to address security issues that have come to light after recent cyberattacks.

Cybersecurity Advice for the COVID-19 Era

Data Breach Today

CISA Adviser Joshua Corman Discusses Essential Steps Many healthcare organizations have under-resourced security teams, putting them at higher risk for cyber incidents during the COVID-19 pandemic that could result in patient harm, warns cybersecurity expert Joshua Corman