You are here

Cybersecurity

CISA Launches StopRansomware Initiative

CISA launched a StopRansomware initiative to bring greater awareness to this global cyber threat epidemic. The newly refreshed page has been rebranded and reorganized, and offers consolidated ransomware resources from all federal government agencies. While CISA did register a separate domain (stopransomware.gov) – presumably so they control it and so it’s not taken over by miscreants – the new domain redirects to a cisa.gov root domain (at least for the moment).

CISA’s Analysis of FY20 Risk and Vulnerability Assessments

The U.S. Department of Homeland Security Cybersecurity and Information Security Agency (CISA) released its Analysis of FY20 Risk and Vulnerability Assessments along with an infographic mapping from 37 of its Risk and Vulnerability Assessments (RVAs) conducted in Fiscal Year 2020 to the MITRE ATT&CK® Framework. The report identifies routinely successful attack paths CISA observed during RVAs conducted across multiple sectors.

OT/ICS Security – What Threats are Impacting ICS Endpoints?

Based on its extensive visibility into OT environments, TrendMicro recently released a report highlighting the threats to ICS endpoints. The 2020 Report: ICS Endpoints as Starting Points for Threats shares the status of global industrial systems in terms of security against both known and new threats that hound ICS endpoints. TrendMicro looked at the data from ICS endpoints that are part of the IT/OT network, specifically industrial automation suites and Engineering Workstations.

CISA’s CSET Now Includes Module for Assessing Ransomware Readiness

The Cybersecurity and Infrastructure Security Agency (CISA) has announced the addition of a new module to its Cyber Security Evaluation Tool (CSET) intended to help organizations address the threat of ransomware. Like the overall CSET, the new module - the Ransomware Readiness Assessment (RRA) – is a self-assessment for organizations to determine their cybersecurity practices on their networks, in this case how well equipped they are to defend and recover from a ransomware incident.

Pages

Subscribe to Cybersecurity