Topic: Information Security

2020 Cyber Threatscape report

EXECUTIVE SUMMARY In the past year, security strategies and practices have been tested like no other. Rapidly accelerated digital transformations, opportunistic phishing campaigns, discontinuity of information security operations and financial constraints are creating the perfect storm in a COVID-19-disrupted world. CISOs who understand these challenges and can pivot their security approach can help their organizations …

2020 Cyber Threatscape report Read More »

Risk Management Framework Online Training

NIST has released an updated Risk Management Framework for Systems and Organizations Introductory Course to reflect guidance from NIST Special Publication (SP) 800-37, Revision 2.  The RMF was developed by NIST to help organizations manage information security and privacy risks to and from Information Technology (IT) systems more easily, efficiently and effectively. This three hour …

Risk Management Framework Online Training Read More »

Risk Management Framework for Information Systems and Organizations

Abstract This publication describes the Risk Management Framework (RMF) and provides guidelines for applying the RMF to information systems and organizations. The RMF provides a disciplined, structured, and flexible process for managing security and privacy risk that includes information security categorization; control selection, implementation, and assessment; system and common control authorizations; and continuous monitoring. The …

Risk Management Framework for Information Systems and Organizations Read More »

Cybersecurity Framework Version 1.1 Manufacturing Profile

This document provides the Cybersecurity Framework (CSF) Version 1.1 implementation details developed for the manufacturing environment. The “Manufacturing Profile” of the CSF can be used as a roadmap for reducing cybersecurity risk for manufacturers that is aligned with manufacturing sector goals and industry best practices. This Manufacturing Profile provides a voluntary, risk-based approach for managing …

Cybersecurity Framework Version 1.1 Manufacturing Profile Read More »

The State of Cloud Native Security

As the engine that powers business, science, education, government and so many other human endeavours, computing has evolved enormously over the past few decades – and that evolution is accelerating. Today, the focus is less on the hardware underlying computing and more on the application itself – the thing that delivers actual value. We abstract …

The State of Cloud Native Security Read More »

Cyber Threat Analysis: User-friendly loaders and crypters simplify intrusions and malware delivery

Recorded Future analyzed current data from the Recorded Future® Platform, information security reporting, and other open source intelligence (OSINT) sources to identify loaders and crypters that facilitate threat actor campaigns. This report expands upon findings addressed in the report “Automation and Commoditization in the Underground Economy,” following reports on database breaches and on checkers and …

Cyber Threat Analysis: User-friendly loaders and crypters simplify intrusions and malware delivery Read More »

ForgeRock Consumer Identity Breach Report

Executive Summary In 2019, Gartner estimated worldwide spending on information security-related products and services would be $124 billion1 – increasing 8% from 2018. And the number of consumers and organizations impacted by breaches and malicious attacks continues to grow. For the second year of this report, personally identifiable information (PII) was the most targeted data …

ForgeRock Consumer Identity Breach Report Read More »

KBKast

KBKast brings you interviews, discussions and presentations from global leaders across information security and emerging technology. We spend time, understanding what they do, and unpacking their thoughts on the constantly evolving technology and people elements in these industries, as they pertain to an executive audience.

A Roadmap for Successful Regional Alliances and Multistakeholder Partnerships to Build the Cybersecurity Workforce

The cybersecurity workforce shortfall is well documented. According to CyberSeek.org, there were 313,735 open cybersecurity-related positions from September 2017 through August 2018. The 2017 Global Information Security Workforce Study states that 1.8 million more cybersecurity professionals will be needed to accommodate the predicted global shortfall by 2022. The National Initiative for Cybersecurity Education (NICE) is …

A Roadmap for Successful Regional Alliances and Multistakeholder Partnerships to Build the Cybersecurity Workforce Read More »

State of the Phish 2020

Do you have a good sense of how well users understand cybersecurity terms and best practices? Do you know the top issues infosec teams are dealing with as a result of phishing attacks? How about the ways organisations are fighting phishing attacks and the successes (and struggles) they’re experiencing? Our sixth annual State of the …

State of the Phish 2020 Read More »

Scroll to Top