CYBER THIS WEEK – MAR 24, 2024
The Path to Stronger Cyber Defenses: A Blueprint for State and Local Governments
Establishing a comprehensive cyber defense strategy has become an indispensable requirement for state and local governments.
The Path to Stronger Cyber Defenses: A Blueprint for State and Local Governments – CPO Magazine
NCSC guidance to help CEOs work through cyber incidents
The NCSC has published in-depth guidance on how business leaders should respond to a cyber-attack or data breach. Learn about some of the key steps you will need to follow
NCSC guidance to help CEOs work through cyber incidents | Computer Weekly
Downtime Cost of Cyberattacks and How to Reduce It
Cyberattacks wreak havoc across organizations. But the costs of downtime are under-discussed. How do we quantify and correct them?
Downtime Cost of Cyberattacks and How to Reduce It (informationweek.com)
8 Strategies for Enhancing Code Signing Security
Strong code-signing best practices are an invaluable way to build trust in the development process and enable a more secure software supply chain.
8 Strategies for Enhancing Code Signing Security (darkreading.com)
Revolutionize cybersecurity with proactive vulnerability intelligence
The cybersecurity industry has been moving from that reactive model to the adoption of a proactive vulnerability management system (VMS), which relies on the use of proactive vulnerability intelligence (VI).
Revolutionize cybersecurity with proactive vulnerability intelligence | SC Media (scmagazine.com)
Open source developer tools have won: That’s a supply chain risk
Developer tools are the ultimate supply chain attack vector. Any successful attacks would be exposing not just a productivity tool that holds sensitive data, but one that is used to write and build software.
Open source developer tools have won: That’s a supply chain risk | Security Magazine
Understanding Cybersecurity Validation And Exposure Management
With enterprises seeking greater efficiency, service providers are shifting from fragmented tools to integrated security offerings.
Understanding Cybersecurity Validation And Exposure Management (forbes.com)
5 ways private organizations can lead public-private cybersecurity partnerships
Public-private partnerships like the US Joint Cyber Defense Collaborative are often led by public agencies, but private-led cybersecurity partnerships might be more effective.
5 ways private organizations can lead public-private cybersecurity partnerships | CSO Online
How I got started: Ransomware negotiator
Ransomware negotiators are becoming more and more crucial. These negotiators operate on the front lines of cyber defense, engaging directly with cyber criminals to mitigate the impact of ransomware attacks on organizations.
How I got started: Ransomware negotiator (securityintelligence.com)
NVD slowdown leaves thousands of vulnerabilities without analysis data
The United States National Institute of Standards and Technology (NIST) has almost completely stopped adding analysis to Common Vulnerabilities and Exposures (CVEs) listed in the National Vulnerability Database. That means big headaches for anyone using CVEs to maintain their security.
NVD slowdown leaves thousands of vulnerabilities without analysis data • The Register