Information Security

2020 Cyber Threatscape report

EXECUTIVE SUMMARY In the past year, security strategies and practices have been tested like no other. Rapidly accelerated digital transformations, opportunistic phishing campaigns, discontinuity of information security operations and financial constraints are creating the perfect storm in a COVID-19-disrupted world. CISOs who understand these challenges and can pivot their security approach can help their organizations […]

2020 Cyber Threatscape report Read More »

Risk Management Framework Online Training

NIST has released an updated Risk Management Framework for Systems and Organizations Introductory Course to reflect guidance from NIST Special Publication (SP) 800-37, Revision 2.  The RMF was developed by NIST to help organizations manage information security and privacy risks to and from Information Technology (IT) systems more easily, efficiently and effectively. This three hour

Risk Management Framework Online Training Read More »

Risk Management Framework for Information Systems and Organizations

Abstract This publication describes the Risk Management Framework (RMF) and provides guidelines for applying the RMF to information systems and organizations. The RMF provides a disciplined, structured, and flexible process for managing security and privacy risk that includes information security categorization; control selection, implementation, and assessment; system and common control authorizations; and continuous monitoring. The

Risk Management Framework for Information Systems and Organizations Read More »

Cybersecurity Framework Version 1.1 Manufacturing Profile

This document provides the Cybersecurity Framework (CSF) Version 1.1 implementation details developed for the manufacturing environment. The “Manufacturing Profile” of the CSF can be used as a roadmap for reducing cybersecurity risk for manufacturers that is aligned with manufacturing sector goals and industry best practices. This Manufacturing Profile provides a voluntary, risk-based approach for managing

Cybersecurity Framework Version 1.1 Manufacturing Profile Read More »

Cyber Threat Analysis: User-friendly loaders and crypters simplify intrusions and malware delivery

Recorded Future analyzed current data from the Recorded Future® Platform, information security reporting, and other open source intelligence (OSINT) sources to identify loaders and crypters that facilitate threat actor campaigns. This report expands upon findings addressed in the report “Automation and Commoditization in the Underground Economy,” following reports on database breaches and on checkers and

Cyber Threat Analysis: User-friendly loaders and crypters simplify intrusions and malware delivery Read More »

KBKast

KBKast brings you interviews, discussions and presentations from global leaders across information security and emerging technology. We spend time, understanding what they do, and unpacking their thoughts on the constantly evolving technology and people elements in these industries, as they pertain to an executive audience.

KBKast Read More »

A Roadmap for Successful Regional Alliances and Multistakeholder Partnerships to Build the Cybersecurity Workforce

The cybersecurity workforce shortfall is well documented. According to CyberSeek.org, there were 313,735 open cybersecurity-related positions from September 2017 through August 2018. The 2017 Global Information Security Workforce Study states that 1.8 million more cybersecurity professionals will be needed to accommodate the predicted global shortfall by 2022. The National Initiative for Cybersecurity Education (NICE) is

A Roadmap for Successful Regional Alliances and Multistakeholder Partnerships to Build the Cybersecurity Workforce Read More »

State of the Phish 2020

Do you have a good sense of how well users understand cybersecurity terms and best practices? Do you know the top issues infosec teams are dealing with as a result of phishing attacks? How about the ways organisations are fighting phishing attacks and the successes (and struggles) they’re experiencing? Our sixth annual State of the

State of the Phish 2020 Read More »