You are here

Cybersecurity

Passthrough – CISA Updates Public Safety Communications and Cyber Resiliency Toolkit

CISA recently updated its Public Safety Communications and Cyber Resiliency Toolkit with nine additional resources including an interactive graphic. The toolkit is designed to assist public safety agencies and others responsible for communications networks by providing the tools necessary to evaluate current resiliency capabilities.

Ransomware Resilience – NCSC Shares Guidance for Organizations Considering Payment in Ransomware Incidents

Analyst Comment (Jennifer Lyn Walker): The decision to pay or not to pay a ransomware extortion demand isn’t always as straightforward as we’d like. The NCSC puts forth some poignant considerations. Members are strongly encouraged to incorporate these considerations into ransomware response plans and discuss them with leadership BEFORE you experience a ransomware incident.

CISA ICS Vulnerability Advisories and Alerts, Updates, and Bulletins – May 14, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has published the following ICS vulnerability advisories, as well as alerts, updates, and bulletins:

ICS Vulnerability Advisories:

CISA Releases Four Industrial Control Systems Advisories

Products are used across multiple sectors, please check these latest advisories for specific equipment used across your ICS environments and address accordingly.

CISA Announces CVE “Vulnrichment” Program to Fill CVE Enrichment Gap

The recent slowdown in NIST’s National Vulnerability Database, which oversees CVE enrichment and provides the valuable cataloging of vulnerabilities that cyber professionals rely upon, has caused CISA to take action. NIST’s analysts have managed to analyze only 4523 of the 14,280 CVEs they received since the start of the year, making this an increasingly urgent problem. CISA has announced it is creating a new program, called “Vulnrichment,”, that aims to fill the CVE enrichment gap.

Security Awareness – The Importance of Adapting Phishing Training Methods

As has been the case since the dawn of the digital era, the world of cybersecurity is in constant transformation. Threat actors are always modifying their tactics as cybersecurity teams strive to maintain situational awareness. When it comes to social engineering and phishing, attackers are constantly refining their methods making it ever more important for organizations to update security awareness curriculum to incorporate information on the latest strategies.

Passthrough – CISA and Partners Release Secure by Design Guidance on Choosing Secure and Verifiable Technologies

Today, together with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and other international partners, CISA released the following guidance: “Secure-by-Design Choosing Secure and Verifiable Technologies.” This guidance was crafted to provide organizations with secure by design considerations when procuring digital products and services.

Pages

Subscribe to Cybersecurity