or

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




or

Why Are We So Stupid About RDP Passwords?

Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol Endpoints
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.




or

Live Webinar | Take Control: Complete Visibility and Unmatched Security for Unmanaged and IoT Devices




or

Live Webinar | Best Practices for Securing Unmanaged and IoT Devices at Massive and Growing Scale




or

Live Webinar | How to avoid the security dangers with working from home (WFH)




or

ENISA Launches Information Security Awareness Videos

The European Network and Information Security Agency [ENISA] has launched information security awareness videos in 23 European languages.




or

ENISA: Guidelines on Incident Reporting

ENISA has issued guidelines to national telecom regulatory authorities about the implementation of Article 13a, in particular, the two types of incident reporting mentioned in Article 13a: the annual summary reporting of significant incidents to ENISA and the European Commission and ad hoc notification of incidents to other NRAs in case of cross-border incidents.




or

ENISA: Cybersecurity Aspects in the Maritime Sector

ENISA has published the first EU report ever on cybersecurity challenges in the Maritime sector. This principal analysis highlights essential key insights, as well as existing initiatives, as a baseline for cybersecurity. Finally, high-level recommendations are given for addressing these risks.




or

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




or

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




or

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




or

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




or

Why Are We So Stupid About RDP Passwords?

Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol Endpoints
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.




or

Bangladesh CIRT to Build Sensor Network for Banks

The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy.




or

Telework Leads to Changes in India's 2020 Cybersecurity Policy

India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.




or

Your Phone and Your Face: Anchoring Users to Real Identities




or

Live Webinar | How to avoid the security dangers with working from home (WFH)




or

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




or

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




or

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




or

Why Are We So Stupid About RDP Passwords?

Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol Endpoints
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.




or

Bangladesh CIRT to Build Sensor Network for Banks

The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy.




or

Telework Leads to Changes in India's 2020 Cybersecurity Policy

India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.




or

Your Phone and Your Face: Anchoring Users to Real Identities




or

Live Webinar | How to avoid the security dangers with working from home (WFH)




or

ENISA: App-Store Security - The Five Lines of Defense

The European Network and Information Security Agency published a new report on app-store security where it advocates for a baseline set of "five lines of defense" against malware.




or

HKMA: Statements Issued by Financial Action Task Force on Money Laundering

The Hong Kong Monetary Authority has issued an announcement regarding two updated statements by the Financial Action Task Force on Money Laundering.




or

HKMA: Banking (Amendment) Ordinance 2012

The Hong Kong Monetary Authority is informing authorized institutions that on Feb. 29, 2012, the Banking (Amendment) Ordinance 2012 bill was passed by the Legislative Council.




or

HKMA: United Nations Sanctions Ordinance

The Hong Kong Monetary Authority has issued a statement on the Chief Executive-in-Council approving United Nations sanctions on Libya and Afghanistan.




or

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




or

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




or

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




or

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




or

Why Are We So Stupid About RDP Passwords?

Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol Endpoints
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.




or

Live Webinar | The Fast Lane to Smart Content Governance: How Data-Centric Security Can Help You Survive (and thrive) in a Remote Work World




or

Your Phone and Your Face: Anchoring Users to Real Identities




or

Live Webinar | How to avoid the security dangers with working from home (WFH)




or

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




or

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




or

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?




or

Why Are We So Stupid About RDP Passwords?

Ransomware Gangs Keep Pwning Poorly Secured Remote Desktop Protocol Endpoints
In honor of World Password Day, here's a task for every organization that uses remote desktop protocol: Ensure that all of your organization's internet-facing RDP ports have a password - and that it's complex and unique.




or

Bangladesh CIRT to Build Sensor Network for Banks

The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy.




or

Telework Leads to Changes in India's 2020 Cybersecurity Policy

India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.




or

Your Phone and Your Face: Anchoring Users to Real Identities




or

Live Webinar | How to avoid the security dangers with working from home (WFH)




or

RBI: Information Security Framework Released

The Institute for Development and Research in Banking Technology has prepared an information security framework to help banks in benchmarking their systems and enhancing information security.




or

APT Group Wages 5-Year Cyber-Espionage Campaign: Report

Naikon Hacking Group Targeted Asia-Pacific Countries With New RAT
Over the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research.




or

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




or

Digital Contact-Tracing Apps: Hype or Helpful?

Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn Against
Technology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective.




or

Forget Whitelists and Blacklists: Go for 'Allow' or 'Deny'

Terminology Shift Announced by Britain's National Cyber Security Center
Forget "whitelists" and "blacklists" in cybersecurity. So recommends Britain's National Cyber Security Center, in a bid to move beyond the racial connotations inherent to the terminology. Henceforth, NCSC - part of intelligence agency GCHQ - will use the terms "allow list" and "deny list." Will others follow?