Remove threat-intelligence cybersecurity-drives-improvements-in-business-goals
article thumbnail

Biden Cybersecurity Strategy: Big Ambitions, Big Obstacles

eSecurity Planet

The White House’s National Cybersecurity Strategy unveiled yesterday is an ambitious blueprint for improving U.S. cybersecurity and threat response, but some of the more ambitious items will take time to implement, and could face opposition from Congress.

article thumbnail

Leveraging CISA Known Exploited Vulnerabilities: Why attack surface vulnerability validation is your strongest defenseĀ 

IBM Big Data Hub

These teams are given the impossible task of driving down risk by patching software across their organization, with the hope that their efforts will help to prevent a cybersecurity breach. Does reducing the number of critical CVEs significantly reduce the risk of a breach?

Risk 76
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is Cybersecurity Risk Management?

eSecurity Planet

As data and IT infrastructure become more valuable by the day, cybersecurity risk management is increasingly important for enterprises with a steep cost for noncompliance or extensive, unaddressed vulnerabilities. What is Cybersecurity Risk Management? What IT Assets Need Protection? Maintaining Regulatory Compliance.

Risk 140
article thumbnail

EU to Force IoT, Wireless Device Makers to Improve Security

eSecurity Planet

In an amendment to the EUā€™s 2014 Radio Equipment Directive (RED), the European Commission noted that as wireless devices, from mobile phones to fitness trackers to smart watches, become increasingly embedded into everyday consumer and business life, they also become a greater security risk. They are increasingly complex and adaptable.

IoT 108
article thumbnail

The IoT Cybersecurity Act of 2020: Implications for Devices

eSecurity Planet

Last month’s passage of the IoT Cybersecurity Improvement Act of 2020 means all IoT devices used by government agencies will soon have to comply with strict NIST standards. Lastly, we touch on the political rationale of how the landmark IoT cybersecurity legislation came to be. In 2019, there were an estimated 9.9

IoT 145
article thumbnail

SBOMs: Securing the Software Supply Chain

eSecurity Planet

As threat actors aim at IT supply chains , enhanced cybersecurity has been the recent driving force for industry adoption of the Software Bill of Materials (SBOM) framework. This article looks at software bills of materials, file data, existing standards, benefits, use cases, and what SBOMs mean for cybersecurity.

Security 134
article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

As 2023 draws to an end and cybersecurity budgeting is nearly complete, it helps to consider the yearā€™s events and try to predict next yearā€™s trends. After receiving input from industry experts and doing my own analysis of the yearā€™s driving forces, I identified five major cybersecurity trends.