National Cyber Warfare Foundation (NCWF) Policy / Governance cybersecurity industry news, cyber warfare, collaboration, chat, forums, threat intellignce, known hacking entities, CVEs, ncwf en-us Data privacy good governance and controls Intel Illustrates Its Focus on Transparency in Security with 2020 Product Security Report Armis Use Cases for Healthcare, Part 1: The Importance of Device and Asset Visibility DoE gives Greg Sisson permanent CISO title Design, Security, Tech Is the New Stack You Should Be Building Tech & Learning Names ManagedMethods a 2021 Awards of Excellence for Remote Learning Winner archTIS Launches US Federal and Defense Sales and Channel Practice WSJ Executive Forum: Advancing security in the new business environment 2021 Top Cybersecurity Leaders - Derrick A. Butts 2021 Top Cybersecurity Leaders - Heather Gantt-Evans 2021 Top Cybersecurity Leaders - Shawn Harris The 2021 Top Cybersecurity Leaders Survey says few employee wellbeing caregiving programs are effective Cyberlaw wonks squint at NotPetya insurance smackdown: Should war exclusion clauses apply to network hacks? (The Register) Security consultant hired by Foreign Office linked to string of hacking complaints - The Guardian The hidden business costs of working remotely How application protection helps HIPAA compliance New York Cyber Task Force launches report revealing national cybersecurity response readiness David Walliams 'upset' and 'angered' by phone hacking - Yahoo Sports David Walliams 'upset' and 'angered' by phone hacking - Yahoo! Voices Laura Juanes Micas joins Constella Intelligence as Chief Privacy and Compliance Officer Biden Wants International Rules to Combat Alleged Russian, Chinese Cyberattacks How to Succeed as a CISO in 2021 These two areas are CISOs' top priorities this year Laura Juanes Micas joins Constella as Chief Privacy and Compliance Officer How insight-driven security builds business resiliency Risk and compliance: A 2021 comeback strategy Hacker claims to have stolen files from law firm tied to Trump: WSJ TheHill - The Hill Cybersecurity trends affecting cybersecurity stocks in 2021 New CISO Priorities of 2021 Credit Cards, Cash and Compliance, Oh My! Eliminating Audit Fatigue in The Financial Services Sector After SolarWinds hacking, cybersecurity needs coordinated, unified action across all federal bureaucracy (Ed - Bitglass Security Spotlight: Major Provider of Network Security Discloses Breach Can your organization obtain reasonable cybersecurity? Yes, and here's how Developing a risk-based cybersecurity approach NCC sees increased demand for cyber security as hacking risks increase - Proactive Investors UK Salt Security Report Reveals API Security Concerns are Inhibiting Business Innovation Qualys Introduces SaaS Detection and Response to Manage the Security Posture and Risk of the SaaS Application Stack 5 Things Every CEO Should Know About Cybersecurity Less Than 25% of Firms Have Solid Security Access Control Edge Poll: Hook, Line, and Sinker US Needs Comprehensive Policy to Combat China on IP Theft 3 Cybersecurity Resolutions to Survive 2021 83% of IT leaders look to outsource security to MSPs in 2021 Trickbot is Targeting the Legal Sector How to show an ROI on cybersecurity spends Ransomware Payoffs Surge by 311% to Nearly $350 Million New CISOs Survey Reveals How Small Cybersecurity Teams Can Confront 2021 Lawmakers Take Aim at Insidious Digital Dark Patterns Schneider Partners with Immersive Labs to Launch Virtual Training Platform How to Write a Vulnerability Management Policy How to shut down bad bots once and for all Fighting the Rapid Rise of Cyber Warfare in a Changing World Governors hear about the dangers of a lackluster cybersecurity response, need for FBI coordination Small Security Teams Have Big Security Fears, CISOs Report Five reasons every CISO needs SOAR 5 minutes with Curt Dalton - Embedding cybersecurity into the organization Looking for cybersecurity experts? Consider hiring veterans Cybersecurity pros can't handle all the threat tasks alone, expert says New proposed rule requires banks to notify regulators within 36 hours of a cybersecurity incident Misinformation campaigns will dominate cybersecurity headaches in 2021 Insider Threats Are on the Rise and Growing More Costly. You Need the Right Tools to Detect Them IAM Best Practices For DevOps The Most Pressing Concerns Facing CISOs Today New AI software can turn regular security cameras into COVID-19 policy enforcement points Out today: Defending against critical threats: A 12 month roundup New Educational Video Series for CISOs with Small Security Teams Malware protection is easy Malinformation protection is hard How to Achieve Collaboration Tool Compliance A hundred-year-old secret is key to fighting cyberattacks Who Is Responsible for Protecting Physical Security Systems From Cyberattacks? 5 minutes with Ellen Benaim, CISO of Templafy: Security leadership and diversity CISOs Prep For COVID-19 Exposure Notification in the Workplace Security Operations Struggle to Defend Value, Keep Workers Some ransomware gangs are going after top execs to pressure companies into paying A Look Ahead at 2021: SolarWinds Fallout and Shifting CISO Budgets - Threatpost State Department creates bureau to reduce 'likelihood of cyber conflict' Heather Hinton joins RingCentral as CISO Considering the value of leveraging a virtual chief information security officer (vCISO) Cybersecurity spending to increase following SolarWinds hacking - SecurityBrief New Zealand Cybersecurity spending to increase following SolarWinds hacking - ChannelLife Australia Cybersecurity spending to increase following SolarWinds hacking - SecurityBrief Asia Cybersecurity spending to increase following SolarWinds hacking - SecurityBrief Europe Where Next For Government Cybersecurity in Colorado? InQuest Deployed by DISA in the Joint Regional Security Stack (JRSS) SEO Spam Links in Nulled Plugins Biden accuses Trump's defense department and budget office of 'obstruction' - Business Insider - Business Insider Vaccine rollout and remote working will make 2021 a prosperous year for cybercriminals 10 Benefits of Running Cybersecurity Exercises SolarWinds Hackers "Impacting" State and Local Governments How to make a QR code to accept Bitcoin while keeping it secure Don't let miscommunication lead to lapses in cybersecurity When strength in numbers is on the wrong side The kids are not alright: How some Millennials and Gen Zers are cybersecurity liabilities The Top 21 Security Predictions for 2021 What we know and still don t about the worst-ever US government cyber attack - The Guardian Lessons From CIO Virtual Summit Key questions to ask to effectively recover from a cyberattack Five worthy reads: Decision intelligence for critical business moments New report helps enterprises move beyond compliance 5 common decision-making biases in cybersecurity Security Stories review of the year, with Fareedah Shaheed and Ben Munroe Social engineering: How psychology and employees can be part of the solution SSO and MFA Are Only Half Your Identity Governance Strategy 5 minutes with Jake Kouns - K-12 cybersecurity challenges during the pandemic Grandpa s New Shoes or How Compliance Learned to Love Adversary Emulation DHS, CISA and NCSC Issue Warnings After SolarWinds Attack Top 10 in-demand cybersecurity skills for 2021 Network Discovery Using AppViewX The Three Branches of Identity Governance Security moves from blocker to driver of open source adoption 'Tis the Season to Confront Third-Party Risk Cyberconflict: How it can reach beyond government systems, and how to protect your business Vade Secure Appoints Ex-Israeli Military Staff Sergeant Maya Gershon as CRO Data Loss Reports to ICO Increase Once Again Navigating the Security Maze in a New Era of Cyberthreats Standalone 5G is more secure than previous network generations Trump Signs IoT Security Bill into Law Add Security Events to Your Monitoring Tools Intel Doubles Down on Emerging Technologies for Sharing and Using Data Securely From FUD to Fix: Why the CISO-Vendor Partnership Needs to Change Now Ulta Beauty and Dollar Tree cyber executives elected to RH-ISAC Board of Directors The Supreme Court will finally rule on controversial US hacking law - Ars Technica FBI warns of BEC scammers using email forwarding Salesforce Set to Acquire Slack for $27bn IPAM Security Policy App: gain consistent security policy management; and Vulnerability Mitigation App Enhancements Can't Afford a Full-time CISO? Try the Virtual Version Remote Workers Admit Lack of Security Training Amazon Sidewalk, Federal IoT Security Law, Facebook Messenger Bug Phoenix CISO Shannon Lawson Shares Top Cyberstrategies Changing Employee Security Behavior Takes More Than Simple Awareness Fines Less of a Concern than Reputational Damage for Public Sector Security Study finds 31% of third-party vendors could cause significant damage to organizations if breached Duke Energy announces new CSO and other leadership changes It's time for banks to rethink how they secure customer information The Yellow Brick Road to Risk Management UK unveils National Cyber Force of hackers to target foes digitally - The Guardian New Proposed DNS Security Features Released What Hyperautomation Means for Identity and Data Governance Safeguard Identity Data at the Source Over 80% companies re-structured their cybersecurity infrastructure in 2020 Employees Have Access to an Average of 10 Million Files Voting security experts refute Trump claims of voting machine hacking - Ars Technica Fairfield University unveils new cybersecurity lab to prepare the next generation of information security professionals De SLA a XLA: de servicios a experiencias Operationalize the NIST Cybersecurity Framework Without Pulling All Your Hair Out Five tips for chief information security officers to increase their strategic value to the CEO and board of directors Uncovered: APT 'Hackers For Hire' Target Financial, Entertainment Firms Total Cost of Ownership: Why It s Important for Businesses Attackers vs. Hackers Two *Very* Different Animals Security Innovation Takes Center Stage at SACON CISO Platform - GlobeNewswire The Double-Edged Sword of Cybersecurity Insurance US bank regulators issue best practices to improve operational resilience Price Dropped on Hacked Educational RDP Details The future of security operations Camilo Sandoval assumes position as Federal CISO NSS Labs' Abrupt Shutdown Leaves Many Unanswered Questions How to manage your personal information for your Google account How to manage personal information for your Google account Better Intelligence, Better Anti-Money Laundering Compliance The critical role of CUI in federal supply chain security The One Critical Element to Hardening Your Employees' Mobile Security American Media Conglomerate Reduces TCO (Total Cost of Ownership) of F5 ADC Devices By 55% With ADC+ Customer Story: Fortune 500 Health Insurance Provider Makes F5 ADC Infrastructure Agile with ADC+ Prepare for the Unexpected: Costs to Consider in Security Budgets 5 minutes with Ian Pratt - Designing enterprise-level security for the work from anywhere world, from the hardware up Survey: Cybersecurity Skills Shortage is ‘Bad,’ But There’s Hope Discrepancy In Security Beliefs vs. Security Practice In Pursuit of Diversity Microsoft: Iranian hacking group targeting attendees of major international security conferences TheHill - The Hill Cybersecurity policy is a must in government Government should make cybersecurity policy a priority Identity Management for Developers: Why it s required more than ever Security firm identifies 5 biggest cybersecurity risks for hospitals and healthcare organizations Amazon Warns Users of Insider Disclosing Details to Third Party Fired Amazon employee shared customer email addresses with third party Key IT trends during the shift to remote work 7 key IT trends during the shift to remote work Enterprises confident Chief Sustainability Officer (CSO) will improve cybersecurity Law Firms Risk of Emotet Malware Infection Mental health warning in cybersecurity: CISOs across the industry reporting high levels of stress End that Zoom call and take a step back Iran targeting the US election DigiCert Secure Software Manager Modernizes PKI Automation to Enable Frictionless Secure Code Signing, Private Key Management Trump signs legislation making hacking voting systems a federal crime TheHill - The Hill Distorting the truth: The roots of online political disinformation campaigns Cost of non-compliance: 8 largest data breach fines and penalties IoT Security Foundation Launches Vulnerability Disclosure Platform CISOs are split on whether to favor worker productivity or corporate security with remote-work policies IoT Vulnerability Disclosure Platform Launched TikTok launched a public bug bounty program Windows 10: Microsoft's key new security feature helps to protect your information Facebook to Stop Political Ads Post-Election | Avast Banning TikTok and Chinese apps is a national security red herring October 2020: On the move Norway blames Russia for cyberattack on parliament UAE s Information Assurance Regulation How to Achieve Compliance ManagedMethods Named Data Security Solution of the Year in the 2020 CyberSecurity Breakthrough Awards Openness and support: Discussions on why diverse representation in cybersecurity matters Executive overconfidence is a security risk Coalition Pokes Five Eyes on Call for Backdoors The Law Comes for John McAfee - WIRED CISOs Planning on Bigger Budgets: Report COVID-19 budgets, data security, and automation are concerns of IT leaders and staff Uber Sued for Legal Fees by Ex-Security Chief Charged Over Hack - Bloomberg Law Podcast: Taking the unconventional career path in cybersecurity Rise in mercenary hacking groups and cyber espionage Threat of fines, not FUD, drives board decisions on cybersecurity spend 5 strategies for CISOs during a time of rapid business transformation The New War Room: Cybersecurity in the Modern Era US gov t warns against paying off ransomware attackers Only 1 in 4 global organizations keep cardholder payment data secure How Netflix Makes Security Decisions: A Peek Inside the Process Paying Evil Corp Ransomware Might Land You a Big Federal Fine Security magazine announces the Top Cybersecurity Leaders contest Singapore Asks Big Cybersecurity Questions to Improve National Defense US Treasury Warns of Sanctions Violations for Paying Ransomware Attackers Technical and Cost Concerns of Passwordless Authentication Bother Security Leaders What Legal Language Should I Look Out for When Selecting Cyber Insurance? What Legal Language Should I Be Aware of When Choosing Cyber Insurance? Six core characteristics that next-generation CISO s exhibit The state of security and the evolving role of CISOs in a pandemic How to handle cybersecurity amid a tight IT budget Tinker Tailor Business Spy: What entrepreneurs don t know (that can hurt them) GRC leaders lack confidence in security data they provide to regulators Seven in ten CISOs believe cyberwarfare is an imminent threat to their organizations Supply chain weak security link for 92 percent of US companies Challenging the Status Quo, and Conquering the Fear of Failure 5 Cyber Basics for the C Suite From the Outside In Shopify Insiders Attempted to Steal Customer Transactional Records Nearly 70% of IT & Security Pros Hone Their Cyber Skills Outside of Work 60% of US businesses have adopted automation approaches across their networks Stretched and stressed: Best practices for protecting security workers' mental health SecOps Teams Wrestle with Manual Processes, HR Gaps CISOs struggling to prepare for upcoming security compliance audits CISOs top traits revealed in report: Improvement needed Data governance trends in 2020: New risks, new rewards of remote work DDoS Attacks Hit 1 Tbps in 2020 Skills and traits of a business-savvy CISO Crowdstrike: "More Cyberattacks in the First Half of 2020 Than in All of 2019" When Phishing And Disinformation Meet CISOs are struggling to prepare for security compliance audits Security Through an Economics Lens: A Guide for CISOs Get to Know the Standards Advancing Cybersecurity Think You're Spending Enough on Security? Towards smarter security 7 Cybersecurity Priorities for Government Agencies & Political Campaigns SMBs Invest in Cybersecurity Budget and Firewall Technology 10 value-adds that CISOs can deliver White House publishes a cyber-security rulebook for space systems