CYBER.ORG announced the kickoff of a new pilot program created to recruit a diverse body of K-12 students to pursue undergraduate cybersecurity degrees and bolster the U.S. cybersecurity workforce. Through a $250,000 grant provided by the National Security Agency (NSA), CYBER.ORG will develop a K-12 feeder program for Grambling State University (GSU) in Northern Louisiana, a Historically Black College and University (HBCU) and the first university in the state to create a cybersecurity undergraduate degree. The goal is to replicate this model between school districts and HBCU’s across the country.
To help software vendors and customers defend against these attacks, CISA and the National Institute for Standards and Technology (NIST) have released Defending Against Software Supply Chain Attacks. This new interagency resource provides an overview of software supply chain risks and recommendations. The publication also provides guidance on using NIST’s Cyber Supply Chain Risk Management (C-SCRM) framework and the Secure Software Development Framework (SSDF) to identify, assess, and mitigate risks.
Marking the 40th Anniversary of National Crime Victims’ Rights Week (NCVRW), the Justice Department’s Hate Crimes Enforcement and Prevention Initiative announced newly translated hate crimes resources in eight languages for the department’s hate crimes website, www.justice.gov/hatecrimes.
Data breach and privacy incidents occur daily at organizations of all sizes. It happens all too frequently. And while it is obvious that breaches continue impacting hundreds of thousands of lives, legal and compliance teams are not always brought in to manage each breach. With increased focus from regulators and law enforcement agencies to ensure organizations fulfill their obligations for post-breach notifications, legal teams can help quickly coordinate internal processes, and take swift action to begin the process of remediating damage and initiate immediate legal steps to protect the enterprise, and comply fully with all regulatory obligations. Here, we talk to AJ Samuel, co-Founder and Chief Product Officer at Exterro, about the many benefits of retaining legal counsel, who can better protect the integrity and confidentiality of the incident response.
Many companies are struggling to adapt their security strategy to accommodate the new normal. With remote working now an ongoing reality, there has been a rush to adopt and integrate a slew of new tools and cloud platforms to facilitate collaboration and maintain productivity. However, in the race to connect everyone, security implications are often overlooked. This, coupled with the fact that relying solely on a corporate firewall is no longer a sound security strategy, puts many organizations at risk.
So, what should companies do now to adjust their security strategy? Here are five factors to adhere to that will prevent cybercriminals from taking advantage of the virtual business environment.
Tracy Hill is promoted to Director of Security at SGMC. Hill has been with SGMC since 2005, and has worked within the security field for over 25 years.
Once it is safe to do so, will employees return to the office full-time or will companies opt for hybrid scenarios in which some time is still spent working from home? And how will organizations be able to make informed decisions that are safe for their employees and respect their bottom line?
Technological innovations representing new, advanced solutions to a previously unforeseen problem. Advancements that, even once the pandemic is finally dealt with, will continue to change not only their respective industries but also the world. The fields in which such innovation is most prevalent are, not surprisingly, healthcare and the public sector. Here are just a few ways in which this has manifested.
In the run-up to Prince Harry and Meghan Markle's much-anticipated royal wedding, the local Thames Valley Police (TVP) force knew that it had to make this high-profile event as secure as possible. The same security level would have to be maintained for Princess Eugene and Jack Brooksbank's royal wedding five months later, located at Windsor Castle. The police knew that both events would carry significant risk to the attendees and the general public without full security measures. Therefore, the police had to ensure that threats would be identified as soon as possible, before, after, and during the events. In fact, it was estimated that the security operation cost was in excess of $41,701,500, or £30 million, becoming one of the biggest UK operations ever.
Kaspersky recently conducted a study based on anonymized OS metadata provided by consenting Kaspersky Security Network users. The survey found that almost one quarter (22%) of PC users are still using the end-of-life OS Windows 7, which stopped receiving mainstream support in January 2020 by way of the vendor no longer sending software updates including critical security fixes.