National Cyber Warfare Foundation (NCWF) Policy / Governance cybersecurity industry news, cyber warfare, collaboration, chat, forums, threat intellignce, known hacking entities, CVEs, ncwf en-us Study finds 31% of third-party vendors could cause significant damage to organizations if breached Duke Energy announces new CSO and other leadership changes It's time for banks to rethink how they secure customer information The Yellow Brick Road to Risk Management UK unveils National Cyber Force of hackers to target foes digitally - The Guardian New Proposed DNS Security Features Released What Hyperautomation Means for Identity and Data Governance Safeguard Identity Data at the Source Over 80% companies re-structured their cybersecurity infrastructure in 2020 Employees Have Access to an Average of 10 Million Files Voting security experts refute Trump claims of voting machine hacking - Ars Technica Fairfield University unveils new cybersecurity lab to prepare the next generation of information security professionals De SLA a XLA: de servicios a experiencias Operationalize the NIST Cybersecurity Framework Without Pulling All Your Hair Out Five tips for chief information security officers to increase their strategic value to the CEO and board of directors Uncovered: APT 'Hackers For Hire' Target Financial, Entertainment Firms Total Cost of Ownership: Why It s Important for Businesses Attackers vs. Hackers Two *Very* Different Animals Security Innovation Takes Center Stage at SACON CISO Platform - GlobeNewswire The Double-Edged Sword of Cybersecurity Insurance US bank regulators issue best practices to improve operational resilience Price Dropped on Hacked Educational RDP Details The future of security operations Camilo Sandoval assumes position as Federal CISO NSS Labs' Abrupt Shutdown Leaves Many Unanswered Questions How to manage your personal information for your Google account How to manage personal information for your Google account Better Intelligence, Better Anti-Money Laundering Compliance The critical role of CUI in federal supply chain security The One Critical Element to Hardening Your Employees' Mobile Security Customer Story: Fortune 500 Health Insurance Provider Makes F5 ADC Infrastructure Agile with ADC+ American Media Conglomerate Reduces TCO (Total Cost of Ownership) of F5 ADC Devices By 55% With ADC+ Prepare for the Unexpected: Costs to Consider in Security Budgets 5 minutes with Ian Pratt - Designing enterprise-level security for the work from anywhere world, from the hardware up Survey: Cybersecurity Skills Shortage is ‘Bad,’ But There’s Hope Discrepancy In Security Beliefs vs. Security Practice In Pursuit of Diversity Microsoft: Iranian hacking group targeting attendees of major international security conferences TheHill - The Hill Cybersecurity policy is a must in government Government should make cybersecurity policy a priority Identity Management for Developers: Why it s required more than ever Security firm identifies 5 biggest cybersecurity risks for hospitals and healthcare organizations Amazon Warns Users of Insider Disclosing Details to Third Party Fired Amazon employee shared customer email addresses with third party Key IT trends during the shift to remote work 7 key IT trends during the shift to remote work Enterprises confident Chief Sustainability Officer (CSO) will improve cybersecurity Law Firms Risk of Emotet Malware Infection Mental health warning in cybersecurity: CISOs across the industry reporting high levels of stress End that Zoom call and take a step back Iran targeting the US election DigiCert Secure Software Manager Modernizes PKI Automation to Enable Frictionless Secure Code Signing, Private Key Management Trump signs legislation making hacking voting systems a federal crime TheHill - The Hill Distorting the truth: The roots of online political disinformation campaigns Cost of non-compliance: 8 largest data breach fines and penalties IoT Security Foundation Launches Vulnerability Disclosure Platform CISOs are split on whether to favor worker productivity or corporate security with remote-work policies IoT Vulnerability Disclosure Platform Launched TikTok launched a public bug bounty program Windows 10: Microsoft's key new security feature helps to protect your information Facebook to Stop Political Ads Post-Election | Avast Banning TikTok and Chinese apps is a national security red herring October 2020: On the move Norway blames Russia for cyberattack on parliament UAE s Information Assurance Regulation How to Achieve Compliance ManagedMethods Named Data Security Solution of the Year in the 2020 CyberSecurity Breakthrough Awards Openness and support: Discussions on why diverse representation in cybersecurity matters Executive overconfidence is a security risk Coalition Pokes Five Eyes on Call for Backdoors The Law Comes for John McAfee - WIRED CISOs Planning on Bigger Budgets: Report COVID-19 budgets, data security, and automation are concerns of IT leaders and staff Uber Sued for Legal Fees by Ex-Security Chief Charged Over Hack - Bloomberg Law Podcast: Taking the unconventional career path in cybersecurity Rise in mercenary hacking groups and cyber espionage Threat of fines, not FUD, drives board decisions on cybersecurity spend 5 strategies for CISOs during a time of rapid business transformation The New War Room: Cybersecurity in the Modern Era US gov t warns against paying off ransomware attackers Only 1 in 4 global organizations keep cardholder payment data secure How Netflix Makes Security Decisions: A Peek Inside the Process Paying Evil Corp Ransomware Might Land You a Big Federal Fine Security magazine announces the Top Cybersecurity Leaders contest Singapore Asks Big Cybersecurity Questions to Improve National Defense US Treasury Warns of Sanctions Violations for Paying Ransomware Attackers Technical and Cost Concerns of Passwordless Authentication Bother Security Leaders What Legal Language Should I Look Out for When Selecting Cyber Insurance? What Legal Language Should I Be Aware of When Choosing Cyber Insurance? Six core characteristics that next-generation CISO s exhibit The state of security and the evolving role of CISOs in a pandemic How to handle cybersecurity amid a tight IT budget GRC leaders lack confidence in security data they provide to regulators Tinker Tailor Business Spy: What entrepreneurs don t know (that can hurt them) Seven in ten CISOs believe cyberwarfare is an imminent threat to their organizations Supply chain weak security link for 92 percent of US companies Challenging the Status Quo, and Conquering the Fear of Failure 5 Cyber Basics for the C Suite From the Outside In Shopify Insiders Attempted to Steal Customer Transactional Records Nearly 70% of IT & Security Pros Hone Their Cyber Skills Outside of Work 60% of US businesses have adopted automation approaches across their networks Stretched and stressed: Best practices for protecting security workers' mental health SecOps Teams Wrestle with Manual Processes, HR Gaps CISOs struggling to prepare for upcoming security compliance audits CISOs top traits revealed in report: Improvement needed Data governance trends in 2020: New risks, new rewards of remote work DDoS Attacks Hit 1 Tbps in 2020 Skills and traits of a business-savvy CISO Crowdstrike: "More Cyberattacks in the First Half of 2020 Than in All of 2019" When Phishing And Disinformation Meet CISOs are struggling to prepare for security compliance audits Security Through an Economics Lens: A Guide for CISOs Get to Know the Standards Advancing Cybersecurity Think You're Spending Enough on Security? Towards smarter security 7 Cybersecurity Priorities for Government Agencies & Political Campaigns SMBs Invest in Cybersecurity Budget and Firewall Technology 10 value-adds that CISOs can deliver White House publishes a cyber-security rulebook for space systems What SMBs and startups can learn from securing a presidential campaign Army Unveils Hacker HQ For Offensive Cyber, Info War - Breaking Defense MIT launches SCRAM, a tool to help enterprise security prioritize investments Cybersecurity Incidents Account for a Third of ICO Reports in 2020 Love, hate and cybersecurity 5 Ways for Cybersecurity Teams to Work Smarter, Not Harder Homeland Security to Propose Biometric Collection Rules U.S. Agencies Must Adopt Vulnerability-Disclosure Policies by March 2021 The Hidden Costs of Losing Security Talent CISA orders agencies to set up vulnerability disclosure programs How insider threats pose risks and challenges to any organization Creating Your Team of Security Intelligence Champions 3 Out of 4 CEOs to be Personally Liable for Hacking Events by 2024: Report - http: Redefining What CISO Success Looks Like US Army Cyber Command to get new uniformed deputy How CISOs Can Play a New Role in Defining the Future of Work What to Expect When You’re Electing: Special Podcast Episode 5 Minutes with Mohit Tiwari Higher Education CISOs Share COVID-19 Response Stories New research finds that the IT security skills gap is getting bigger John Felker, former head of DHS s cyberthreat center, to retire from the department in September The cybersecurity skills shortage is getting worse Wells Fargo adds teams of Chief Risk Managers and Chief Compliance Officer Huawei Phones Unlikely to Receive Security Updates as Trade Ban Begins How a new federal policy for telling election officials about cyber-intrusions got put to use Getting started with security automation Proofpoint appoints Andrew Rose as Resident CISO for EMEA region Conducting Risk Prioritization and Remediation to Combat Challenges in The Distributed Workforce A Cyberattack Doesn't Have to Sink Your Stock Price - Harvard Business Review Why organizations are turning to security automation to address alert overload State-backed hacking, cyber deterrence, and the need for international norms - Help Net Security Zero trust is critical, but very underused Why the Baltic states are reconfiguring their electric grids - The Economist Germany launches cybersecurity agency Incident Response Exercises Not Taken Seriously by Business Leaders Cybersecurity and remote support are top goals for CIOs in 2020 How cybersecurity has changed since the coronavirus outbreak began, and what it means for businesses Hacking It as a CISO: Advice for Security Leadership - Dark Reading Hacking It as a CISO: Advice for Security Leadership 93% of security professionals lack the necessary tools to detect security threats How CISOs Can Effectively Measure and Report Security Operations Maturity How COVID-19 Has Changed Business Cybersecurity Priorities Forever How to lead an economical and efficient infosec program Hiring a CISO: The evolving role of your security executive I hired an infamous hacker here's how he helped us succeed - Fast Company ‘We want to have more protection’: Arrested pen testers push for Good Samaritan law Arrested Coalfire pen testers push for Good Samaritan law Russian Election Interference: What's Next? Building Cybersecurity Strategies in Sub-Saharan Africa Why create more cyber units when talent might be lacking, wonders senator First EU Sanctions for Cyberattacks Point to Alignment With US on Foreign Hacking - Wall Street Journal 20% of workers don t follow company security policies all the time CISA releases guide to vulnerability reporting for America s election administrators Cybersecurity Budget Rose in 2019, Uncertainty Prevails in 2020 Trump says he will ban popular Chinese video app TikTok in the US CVE-2020-8204 (pulse_connect_secure, pulse_policy_secure) CVE-2020-8217 (pulse_connect_secure, pulse_policy_secure) CVE-2020-8206 (pulse_connect_secure, pulse_policy_secure) CVE-2020-8218 (pulse_connect_secure, pulse_policy_secure) CVE-2020-8216 (pulse_connect_secure, pulse_policy_secure) Building A Telework Health Scorecard To Meet Surge Requirements And Long-Term Resiliency Who should be responsible for critical infrastructure s cybersecurity? How to make the most of Microsoft s new Compliance Score Console CISA announces second annual President s Cup Cybersecurity competition Future Bright for CISOs Despite Budget and Transformation Challenges, Say Security Leaders “Don’t fire the CISO”, with Quentyn Taylor The way forward with Risk Operations Centers Future of CISOs Positive Despite Budget and Transformation Challenges, Say Security Leaders Wake-up Call: New Study from PWC Exposes Terrifying End-User Security Practices that will Keep Your CISO Up at Night CISA announces second annual President s Cup Cybersecurity competition How IT leaders were unprepared for the security challenges posed by COVID-19 How to make the most of Microsoft s new Compliance Score Console Bank of Ireland fined 1.66 million after being tricked by fraudster Who should be responsible for critical infrastructure s cybersecurity? Latest Microsoft Windows security update options explained Why security professionals are facing more work stress Lindy Cameron named CEO of the UK National Cyber Security Centre Andrew Daniels joins Druva as CIO and CISO Andrew Daniels joins Druva as CIO and CISO Academics smuggle 234 policy-violating skills on the Alexa Skills Store CISOs share their stories Security Recruiter Directory Collaborative Imaging announces new CISO Q&A: How Systemic Racism Weakens Cybersecurity Twitter Cracks Down on QAnon. Your Move, Facebook Microsoft 365 Updated with New Security, Risk, Compliance Tools 5 Minutes with Chris Kennedy, CISO at AttackIQ Winning business: CISOs chime in on the cyber vendor dating game Three-Quarters of UK Businesses Facing Compliance Problems Following Lockdown Winning business: CISOs chime in on the cyber vendor dating game CISOs value peer advice most when researching cyber solutions CISOs discuss cybersecurity in the COVID-19 environment 7 VPN firms with no-logs policy end up exposing 1.2 TB of user data PCI DSS explained: Requirements, fines, and steps to compliance NSA on Securing VPNs VPN firm that claims zero logs policy leaks 20 million user logs NSA on Securing VPNs Park Place Technologies Appoints Security and Army Veteran as its First CISO John Parlee named CISO for Park Place Technologies Dr. Allen Harper joins T-Rex Solutions as Executive Vice President of Cybersecurity 5 Minutes with Charles Blauner, CISO in Residence, Team8 Here are the hurdles that will face Biden s new CISO Biden Campaign Hires 2 Top Cybersecurity Executives Google updates policies to ban any ads for surveillance solutions and services U.S. Cybersecurity Policy, Strategy and Initiatives: Director Needed? Steven Salar named Chief Risk Officer at Nonprofits Insurance Alliance Google bans stalkerware ads Qualys appoints Ben Carr as Chief Information Security Officer Steve Krameisen joins American Portfolios as CISO SMB Cybersecurity: The Real Benefits of a Top-Down Approach Security leadership: Women on the frontline Security leadership: Women on the frontline Profile of the Post-Pandemic CISO 10 essential negotiation tactics CISOs should know BrandPost: Top 5 Myths About SMB Security Stephen Tycer named CISO at the University of Arkansas Union Pacific tracks cyber risk via its own probability modeling methodology Union Pacific tracks cyber risk via its own probability modeling methodology Firms Plan Hiring Spree to Bolster Remote Working Security Zoom taps Salesforce s Jason Lee as CISO Zoom Hires Former Salesforce SVP as New CISO The DoD Cybersecurity Policy Chart Party City celebrates IT risk assessment program; reveals keys to success Jason Lee named CISO at Zoom Party City celebrates IT risk assessment program; reveals keys to success Zoom hires Jason Lee from Salesforce to serve as new CISO CyberSC s Vogel offers insider s guide to becoming a vCISO Bethany De Lude named CISO at Cred The impact of a diverse cybersecurity team The impact of a diverse cybersecurity team Risk assessments reveal businesses remain deficient in security compliance, training 10 security changes post-COVID-19