You are here

Cybersecurity

Secure by Design – CISA and FBI Release Updated Guidance on Product Security Bad Practices

Last week, CISA released an update to the joint guidance “Product Security Bad Practices,” originally released in October last year. This guidance gives an overview of exceptionally risky product security practices for software manufacturers who produce software in support of critical infrastructure or national critical functions.

The bad practices are divided into three categories:

Report – KnowBe4 Research Indicates Effective Security Awareness Training Reduces Likelihood of Breaches

A recent report from Cybersecurity firm KnowBe4 indicates the effectiveness of security awareness training (SAT) on overall organizational security. The report, titled “Effective Security Awareness Training Really Does Reduce Breaches,” notes that organizations who implement effective SAT programs are 8.3 times less likely to appear on public data breach lists annually compared to general statistics.

CISA Releases the JCDC AI Cybersecurity Collaboration Playbook and Fact Sheet

Yesterday, CISA released the “JCDC AI Cybersecurity Collaboration Playbook and Fact Sheet” to enhance information sharing between the public and private sectors in response to AI-related cyber threats. Developed in conjunction with the FBI, NSA's AI Security Center, and various industry partners including Google, IBM, and Microsoft, the playbook aims to create a “unified approach” to managing these threats.

NYSIC Cyber Intelligence Bulletin – Best Practices to Mitigate Threat Actor Targeting of IP Cameras

The New York State Intelligence Center (NYSIC) recently released a TLP:CLEAR cyber intelligence bulletin titled “Best Practices to Mitigate Threat Actor Targeting of IP Cameras.” The report highlights how internet protocol (IP) cameras and other internet of things (IoT) connected devices pose a significant vulnerability for organizations that utilize them and emphasizes the need for these organizations to implement certain mitigation strategies.

Pages

Subscribe to Cybersecurity