CSA – Cloud Security Framework

A few weeks ago, an article on the new CIS 18 framework was published on this site. CIS is one of the go to frameworks for security assessments, but the cloud has its own set of controls and a framework developed by the Cloud Security Alliance (CSA). They have recently released a new version of their framework as well. This article will introduce the CSA and its security framework.

Read more...

Cyberattacks Shine Spotlight on Operational Technology Vulnerabilities for Every Industry

Recent high-profile ransomware and cyberattacks expose vulnerabilities in commercial buildings that are far too widespread. In fact, the same headline-making exposures of late can be faced by any company that uses operational technology (OT) and information technology (IT).
Smart leaders across the nation and around the world should be thinking: “Maybe it could happen here.” The question becomes how to prevent similar attacks and how to position your organization to meet upcoming cybersecurity mandates with wide-ranging implications. Those of us in the cybersecurity business are aware of many such incidents, including some stories from my experience.

Read more...

Cybersecurity Rising Among America’s Infrastructure Priorities

Less than a month ago, President Biden released his proposed budget for Fiscal Year 2022 that includes $9.8 billion in funding for cybersecurity enhancements. Cyberbreaches are making the headlines too often – almost on a weekly basis – and those are only the attacks that are reported. Not only are the breaches costly, but they also are dangerous. Potential threats to public safety as a result of cyberbreaches, in fact, are daunting. The Administration has made it clear that the Federal government intends to provide as much protection to the nation’s overall infrastructure as possible.

Read more...

10 Small Business Cyber Security Statistics That You Should Know – And How To Improve Them

All enterprises have to handle customer data, including PII, but often small businesses do not have the resources to effectively safeguard against cyber threats.

In the latest Cybersecurity Magazine article, Ashley Lukehart offers 10 important cybersecurity statistics regarding the reality of cyberattacks on small businesses, and gives some tips on how small businesses should approach cybersecurity attack prevention

Read more...

Zero Trust Security Best Practices

Since the start of the COVID19 pandemic, enterprises worldwide have adopted the work-from-home model. This shift has resulted in an increase in cyberattacks, and some traditional models of security are becoming ineffective as employees increasingly access resources remotely and use personal devices.
In the latest Cybersecurity Magazine article, Varin Khera argues for the use of ‘zero-trust’ security models and examines the best practices for adopting such a model.

Read more...

What Does 5G Mean for Global DDoS Vulnerability?

As the rollout of 5G continues, we look to the variety of applications it invites.
However, with such innovation also comes an increased risk for DDoS security.
Ramil Khantimirov, Stormwall, discusses how the global 5G coverage in tandem with IoT spurs novel cybersecurity vulnerabilities and outlines some steps the industry should take to prepare.

Read more...

From Ransomware To Recovery – The Role Of Continuous Data Protection

Ransomware has become one of the most high profile cybersecurity problems, with a huge rise in the number of ransomware attacks in the past years as business attempt to deal with the operational flux brought by the pandemic. Steve Blow, Zerto, discusses the impact of ransomware and argues for a more modern mindset and use of Continuous Data Protection.

Read more...