en Ransomware Slams Healthcare, Logistics, Energy Firms By www.inforisktoday.asia Published On :: Attacks Traced to Gangs Wielding Nefilim, Snake StrainsRansomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic. Full Article
en Zoom's NY Settlement Spells Out Security Moves By www.inforisktoday.asia Published On :: Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption CompanyZoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company. Full Article
en Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny' By www.inforisktoday.eu Published On :: Terminology Shift Announced by Britain's National Cyber Security CenterForget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow? Full Article
en Continuity Amid COVID-19: Ensuring Secure Business Continuity By www.inforisktoday.eu Published On :: Full Article
en Your Phone and Your Face: Anchoring Users to Real Identities By www.inforisktoday.eu Published On :: Full Article
en ENISA Launches Guide on Building Effective IT Security Public Private Partnerships By www.inforisktoday.eu Published On :: The European Network and Information Security Agency has released a new guide on building effective IT security public private partnerships. Full Article
en ENISA: Technical Guidelines on Minimum Security Measures By www.inforisktoday.eu Published On :: ENISA has issued guidance to national telecom regulatory authorities about the implementation of Article 13a, in particular about the security measures that providers of public communications networks must take to ensure security and integrity of these networks. Full Article
en ENISA: Guidelines on Incident Reporting By www.inforisktoday.eu Published On :: ENISA has issued guidelines to national telecom regulatory authorities about the implementation of Article 13a, in particular, the two types of incident reporting mentioned in Article 13a: the annual summary reporting of significant incidents to ENISA and the European Commission and ad hoc notification of incidents to other NRAs in case of cross-border incidents. Full Article
en ENISA: Cybersecurity Aspects in the Maritime Sector By www.inforisktoday.eu Published On :: ENISA has published the first EU report ever on cybersecurity challenges in the Maritime sector. This principal analysis highlights essential key insights, as well as existing initiatives, as a baseline for cybersecurity. Finally, high-level recommendations are given for addressing these risks. Full Article
en Ransomware Slams Healthcare, Logistics, Energy Firms By www.inforisktoday.eu Published On :: Attacks Traced to Gangs Wielding Nefilim, Snake StrainsRansomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic. Full Article
en Zoom's NY Settlement Spells Out Security Moves By www.inforisktoday.eu Published On :: Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption CompanyZoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company. Full Article
en Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny' By www.bankinfosecurity.co.uk Published On :: Terminology Shift Announced by Britain's National Cyber Security CenterForget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow? Full Article
en What We've Learned About Business Resiliency By www.bankinfosecurity.co.uk Published On :: Business resiliency and the supply chain - they both were tested by the disruptions we've all experienced. But Patrick Potter of RSA says there are lessons to be learned from the response, and they will guide us as we prepare for the next evolution of our business climate. Full Article
en Live Webinar | The Fast Lane to Smart Content Governance: How Data-Centric Security Can Help You Survive (and thrive) in a Remote Work World By www.bankinfosecurity.co.uk Published On :: Full Article
en Continuity Amid COVID-19: Ensuring Secure Business Continuity By www.bankinfosecurity.co.uk Published On :: Full Article
en Your Phone and Your Face: Anchoring Users to Real Identities By www.bankinfosecurity.co.uk Published On :: Full Article
en ENISA Launches Guide on Building Effective IT Security Public Private Partnerships By www.bankinfosecurity.co.uk Published On :: The European Network and Information Security Agency has released a new guide on building effective IT security public private partnerships. Full Article
en ENISA Launches Information Security Awareness Videos By www.bankinfosecurity.co.uk Published On :: The European Network and Information Security Agency [ENISA] has launched information security awareness videos in 23 European languages. Full Article
en ENISA: Technical Guidelines on Minimum Security Measures By www.bankinfosecurity.co.uk Published On :: ENISA has issued guidance to national telecom regulatory authorities about the implementation of Article 13a, in particular about the security measures that providers of public communications networks must take to ensure security and integrity of these networks. Full Article
en ENISA: Guidelines on Incident Reporting By www.bankinfosecurity.co.uk Published On :: ENISA has issued guidelines to national telecom regulatory authorities about the implementation of Article 13a, in particular, the two types of incident reporting mentioned in Article 13a: the annual summary reporting of significant incidents to ENISA and the European Commission and ad hoc notification of incidents to other NRAs in case of cross-border incidents. Full Article
en Ransomware Slams Healthcare, Logistics, Energy Firms By www.bankinfosecurity.co.uk Published On :: Attacks Traced to Gangs Wielding Nefilim, Snake StrainsRansomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic. Full Article
en Zoom's NY Settlement Spells Out Security Moves By www.bankinfosecurity.co.uk Published On :: Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption CompanyZoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company. Full Article
en Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny' By www.databreachtoday.com Published On :: Terminology Shift Announced by Britain's National Cyber Security CenterForget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow? Full Article
en Live Webinar | Strong Customer Authentication: The role of Biometrics in PSD2 By www.databreachtoday.com Published On :: Full Article
en Live Webinar | Third-Party Risk Management: How to Mature Your Program Beyond Just Outside-In Scanning By www.databreachtoday.com Published On :: Full Article
en ENISA: Software vulnerability prevention initiatives By www.databreachtoday.com Published On :: The European Network and Information Security Agency, ENISA, has compiled a list of existing initiatives focused on finding and preventing software vulnerabilities. Full Article
en FFIEC Final Authentication Guidance By www.databreachtoday.com Published On :: The Final FFIEC Guidance has been issued and its main intent is to reinforce the 2005 Guidance's risk management framework and update the Agencies' expectations regarding customer authentication, layered security, or other controls in the increasingly hostile online environment. Full Article
en Zoom's NY Settlement Spells Out Security Moves By www.databreachtoday.com Published On :: Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption CompanyZoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company. Full Article
en Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny' By www.inforisktoday.co.uk Published On :: Terminology Shift Announced by Britain's National Cyber Security CenterForget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow? Full Article
en Live Webinar | The Fast Lane to Smart Content Governance: How Data-Centric Security Can Help You Survive (and thrive) in a Remote Work World By www.inforisktoday.co.uk Published On :: Full Article
en Continuity Amid COVID-19: Ensuring Secure Business Continuity By www.inforisktoday.co.uk Published On :: Full Article
en Your Phone and Your Face: Anchoring Users to Real Identities By www.inforisktoday.co.uk Published On :: Full Article
en ENISA Launches Guide on Building Effective IT Security Public Private Partnerships By www.inforisktoday.co.uk Published On :: The European Network and Information Security Agency has released a new guide on building effective IT security public private partnerships. Full Article
en ENISA: Technical Guidelines on Minimum Security Measures By www.inforisktoday.co.uk Published On :: ENISA has issued guidance to national telecom regulatory authorities about the implementation of Article 13a, in particular about the security measures that providers of public communications networks must take to ensure security and integrity of these networks. Full Article
en ENISA: Guidelines on Incident Reporting By www.inforisktoday.co.uk Published On :: ENISA has issued guidelines to national telecom regulatory authorities about the implementation of Article 13a, in particular, the two types of incident reporting mentioned in Article 13a: the annual summary reporting of significant incidents to ENISA and the European Commission and ad hoc notification of incidents to other NRAs in case of cross-border incidents. Full Article
en ENISA: Cybersecurity Aspects in the Maritime Sector By www.inforisktoday.co.uk Published On :: ENISA has published the first EU report ever on cybersecurity challenges in the Maritime sector. This principal analysis highlights essential key insights, as well as existing initiatives, as a baseline for cybersecurity. Finally, high-level recommendations are given for addressing these risks. Full Article
en Ransomware Slams Healthcare, Logistics, Energy Firms By www.inforisktoday.co.uk Published On :: Attacks Traced to Gangs Wielding Nefilim, Snake StrainsRansomware attacks hit at least four large organizations around the world this week, including a hospital group in Europe that has been battling the COVID-19 pandemic. Full Article
en Zoom's NY Settlement Spells Out Security Moves By www.inforisktoday.co.uk Published On :: Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption CompanyZoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company. Full Article
en Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny' By www.bankinfosecurity.com Published On :: Terminology Shift Announced by Britain's National Cyber Security CenterForget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow? Full Article
en Network and Security Transformation - Enabling your Digital Business By www.bankinfosecurity.com Published On :: Vistra Energy, a Texas-based power generation firm, recently underwent a network transformation project. CISO Paul Reyes, joined by Zscaler's Dan Shelton, opens up on how to make the move to cloud-based models and what it can do to support your business. Full Article
en Live Webinar | Strong Customer Authentication: The role of Biometrics in PSD2 By www.bankinfosecurity.com Published On :: Full Article
en Live Webinar | Third-Party Risk Management: How to Mature Your Program Beyond Just Outside-In Scanning By www.bankinfosecurity.com Published On :: Full Article
en FDIC: Supervisory Approach to Payment Processing Relationships with Merchant Customers By www.bankinfosecurity.com Published On :: The FDIC is clarifying its policy and supervisory approach related to facilitating payment processing services directly, or indirectly through a third party, for merchant customers engaged in higher-risk activities. Full Article
en FFIEC: Statement on End of Microsoft Support for Windows XP By www.bankinfosecurity.com Published On :: The FFIEC on Oct. 7 issued a joint statement concerning Microsoft's discontinuation of support for its Windows XP operating system as of April 8, 2014. Full Article
en FDIC: Institutions Encouraged to Work with Borrowers Impacted by Shutdown By www.bankinfosecurity.com Published On :: Five federal regulatory agencies encourage financial institutions to work with customers affected by the federal government shutdown. Full Article
en Zoom's NY Settlement Spells Out Security Moves By www.bankinfosecurity.com Published On :: Meanwhile, Video Conferencing Firm Acquires Start-Up Encryption CompanyZoom has reached a settlement with the N.Y. attorney general's office to provide better security and privacy controls for its video conferencing platform. Meanwhile, the company announced it's acquiring a start-up encryption company. Full Article
en Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny' By www.careersinfosecurity.asia Published On :: Terminology Shift Announced by Britain's National Cyber Security CenterForget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow? Full Article
en Bangladesh CIRT to Build Sensor Network for Banks By www.careersinfosecurity.asia Published On :: The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy. Full Article
en Ensuring Secure Business Continuity Amid COVID-19 Chaos By www.careersinfosecurity.asia Published On :: Full Article
en Your Phone and Your Face: Anchoring Users to Real Identities By www.careersinfosecurity.asia Published On :: Full Article