Category: EN

CISA Publishes SCuBA Hybrid Identity Solutions Guidance

CISA has published Secure Cloud Business Applications (SCuBA) Hybrid Identity Solutions Guidance (HISG) to help users better understand identity management capabilities and securely integrate their traditional on-premises enterprise networks with cloud-based solutions. This initial publication reflects feedback gathered during its…

Cloud security training: Build secure cloud systems

The cloud’s potential is undeniable – but securing it remains a daunting challenge. A recent SC Magazine survey revealed a troubling statistic: one in four companies cite a critical cloud security skills gap. This gap leaves organizations vulnerable, as attackers…

CISA’s OT Attack Response Team Understaffed: GAO

GAO study finds that CISA does not have enough staff to respond to significant OT attacks in multiple locations at the same time. The post CISA’s OT Attack Response Team Understaffed: GAO appeared first on SecurityWeek. This article has been…

EquiLend Ransomware Attack Leads to Data Breach

EquiLend is informing its employees that their personal information was compromised in a January ransomware attack. The post EquiLend Ransomware Attack Leads to Data Breach  appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…

Read the Latest NIST Cybersecurity Framework Updates

This blog reviews NIST cybersecurity framework 2.0 updates, and the difference between the CSF and NIST’s data privacy framework. The post Read the Latest NIST Cybersecurity Framework Updates appeared first on Security Boulevard. This article has been indexed from Security…

Rubrik EPE secures enterprise data from cyberattacks

Artificial intelligence (AI), digital transformation, and the Internet of Things have caused a data explosion, leading organizations to grapple with a surging amount of fragmented data where it lives. Rubrik released Rubrik Enterprise Proactive Edition (EPE), a data security product…

VCURMS: A Simple and Functional Weapon

ForitGuard Labs uncovers a rat VCURMS weapon and STRRAT in a phishing campaign. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: VCURMS: A Simple and Functional Weapon

Mitigating Lurking Threats in the Software Supply Chain

The first step to addressing software supply chain vulnerabilities and threats is to understand the most common attacks. Here’s where to start. The post Mitigating Lurking Threats in the Software Supply Chain appeared first on Security Boulevard. This article has…