The Path to Stronger Cyber Defenses: A Blueprint for State and Local Governments

Establishing a comprehensive cyber defense strategy has become an indispensable requirement for state and local governments.

The Path to Stronger Cyber Defenses: A Blueprint for State and Local Governments – CPO Magazine

NCSC guidance to help CEOs work through cyber incidents

The NCSC has published in-depth guidance on how business leaders should respond to a cyber-attack or data breach. Learn about some of the key steps you will need to follow

NCSC guidance to help CEOs work through cyber incidents | Computer Weekly

Downtime Cost of Cyberattacks and How to Reduce It

Cyberattacks wreak havoc across organizations. But the costs of downtime are under-discussed. How do we quantify and correct them?

Downtime Cost of Cyberattacks and How to Reduce It (informationweek.com)

8 Strategies for Enhancing Code Signing Security

Strong code-signing best practices are an invaluable way to build trust in the development process and enable a more secure software supply chain.

8 Strategies for Enhancing Code Signing Security (darkreading.com)

Revolutionize cybersecurity with proactive vulnerability intelligence

The cybersecurity industry has been moving from that reactive model to the adoption of a proactive vulnerability management system (VMS), which relies on the use of proactive vulnerability intelligence (VI).

Revolutionize cybersecurity with proactive vulnerability intelligence | SC Media (scmagazine.com)

Open source developer tools have won: That’s a supply chain risk

Developer tools are the ultimate supply chain attack vector. Any successful attacks would be exposing not just a productivity tool that holds sensitive data, but one that is used to write and build software.

Open source developer tools have won: That’s a supply chain risk | Security Magazine

Understanding Cybersecurity Validation And Exposure Management

With enterprises seeking greater efficiency, service providers are shifting from fragmented tools to integrated security offerings.

Understanding Cybersecurity Validation And Exposure Management (forbes.com)

5 ways private organizations can lead public-private cybersecurity partnerships

Public-private partnerships like the US Joint Cyber Defense Collaborative are often led by public agencies, but private-led cybersecurity partnerships might be more effective.

5 ways private organizations can lead public-private cybersecurity partnerships | CSO Online

How I got started: Ransomware negotiator

Ransomware negotiators are becoming more and more crucial. These negotiators operate on the front lines of cyber defense, engaging directly with cyber criminals to mitigate the impact of ransomware attacks on organizations.

How I got started: Ransomware negotiator (securityintelligence.com)

NVD slowdown leaves thousands of vulnerabilities without analysis data

The United States National Institute of Standards and Technology (NIST) has almost completely stopped adding analysis to Common Vulnerabilities and Exposures (CVEs) listed in the National Vulnerability Database. That means big headaches for anyone using CVEs to maintain their security.

NVD slowdown leaves thousands of vulnerabilities without analysis data • The Register

Share: