• One of the biggest challenges cybersecurity teams face, aside from constantly having to foil threat actors, is to integrate data from the various tools they use to protect their organizations. But relief may be on the way in the form of the Open Cybersecurity Schema Framework (OCSF), which aims to establish an interoperability standard. News of the creation of OCSF came during Black Hat USA 2022 in Last Vegas last week. The framework boasts participation from 18 of the IT industry’s biggest names, including Amazon AWS, IBM, Palo Alto Networks, Splunk and Salesforce. Such a standard would simplify the lives of cybersecurity professionals, who have complained for years about ineffective manual processes to integrate different tools. The lack of interoperability

    Aug 17,
  • The Small Business Cybersecurity Act, S.4701 has been introduced by U.S. Sen. Maggie Hassan, D- N.H. Designed to bolster small businesses' cybersecurity by providing funding to Small Business Development Centers. In 2020, Senator Hassan worked to secure federal funding to such centers including the New Hampshire Small Business Development Center's Cybersecurity Review program. The funds can be used to help Small Business Development Centers provide cybersecurity training for small business employees and administer reviews of small business's cybersecurity. The bill would authorize $20 million in 2023 and every year thereafter to the Small Business Administration (SBA). Key aspects of the bill include establishing a federal program to provide direct grants to Small Business Development Centers to create or continue cybersecurity

    Aug 16,
  • By Jagadish Paranthaman, CISSP, Global Cybersecurity Solutions Architect at Avanade Zero Trust is a cybersecurity model centered around an end-to-end approach for resource and data protection with a principle not to trust completely but conduct continual verification. Zero Trust assumes the non-existence of a perimeter. It is not a product but a collection of architectural premises and security patterns encompassing identity, endpoints, networks and hosting infrastructure, applications, and data.    Zero Trust Architecture is achieved through solutions that sit between requesting subject (identity) and a fulfilling resource (service or application). Solutions can be a combination of agent-based, cloud-based or enterprise deployment which varies based on the location of a business process/service (Cloud: North to South or Organisation Perimeter: East to

    Aug 15,
  • Cyberattacks hit global companies, critical vulnerabilities discovered in top tech products and the top malware strains of 2021 make headlines this week. Here are the latest cybersecurity threats and advisories for the week of August 12, 2022. Threat Advisories and Alerts CISA and ACSC List the Top Malware Strains of 2021 A joint cybersecurity advisory has been released by CISA and ACSC. The advisory names the top malware strains of 2021, which include Agent Tesla, AZORult, Formbook, GootLoader, LokiBot, MOUSEISLAND, NanoCore, Qakbot, Remcos, TrickBot and Ursnif. The malware strains consist of ransomware, information stealers, trojans (RATS) and banking trojans. To protect organizations, the advisory recommends user training, the application of timely patches, offline data backups, multifactor authentication and securing Remote

    Aug 12,
  • Build confidence for exam day or expand your knowledge by attending Official (ISC)² Pre-Conference Training the weekend ahead of (ISC)² Security Congress. Participate by arriving in Las Vegas a couple of days early or maximize your time by joining in online on Saturday, October 8 and Sunday, October 9.  Learn from (ISC)² Authorized Instructors and gain a holistic understanding of the essential topics in the course of your choice. Your instructor – who holds the certification they are teaching – provides expert knowledge with experience from practice. You will engage in thought-provoking discussions within your class and expand your education by applying certification fundamentals to real-world applications. Full day on-site sessions include complimentary breakfast, lunch and break snacks. This year, we

    Aug 11,