Joint “CYPRES” Report on Incident Response Released by FERC

Earlier this month, the Federal Energy Regulatory Commission (FERC) published a joint report entitled “Cyber Planning Response and Recovery Study” (CYPRES) in partnership with the North American Electric Reliability Corporation (NERC) and ...

Effective Threat Intelligence Through Vulnerability Analysis

Vulnerabilities are weaknesses leveraged by adversaries to compromise the confidentiality, availability or integrity of a resource. The vulnerability ecosystem has matured considerably in the last few years. A significant amount of effort ...

The COVID-19 Pandemic Dominates the Cybersecurity World

Cybersecurity is not a static world. You can say that it is a social system, it affects and is affected by its surrounding environment. For example, back in 2018, it was the ...
As UK Data Breach Reports Drop, Britain’s Privacy Watchdog Reveals Surge in Other Cyber Incidents

As UK Data Breach Reports Drop, Britain’s Privacy Watchdog Reveals Surge in Other Cyber Incidents

The latest report from the UK’s Information Commissioner’s Office (ICO), reveals a steady drop in data security incidents between January and March 2020. When comparing the first quarter of 2020 to the ...
Screenshot of Threat Intelligence Report page 5

Attacks Targeting ICS & OT Assets Grew 2000% Since 2018, Report Reveals

The digital threat landscape is always changing. This year is an excellent (albeit extreme) example. With the help of Dimensional Research, Tripwire found out that 58% of IT security professionals were more ...
corporate networks

Report: More Unknown Devices on Corporate Networks

A report published this week by Sepio Systems suggests the number of devices being attached to corporate networks since the start of the COVID-19 pandemic began has increased sharply. Sepio Systems, a ...
Security Boulevard
ManagedMethods 2019 State of K-12 Cybersecurity Infographic Reveals Cybersecurity Incidents Impacting School Districts Increased 185%

ManagedMethods 2019 State of K-12 Cybersecurity Infographic Reveals Cybersecurity Incidents Impacting School Districts Increased 185%

BOULDER, Colo.—March 3, 2020—ManagedMethods, a leading Google G Suite and Microsoft Office 365 data security and student safety platform for K-12 school districts, today released its State of K-12 Cybersecurity infographic, in ...
™

The Statement of Applicability in ISO 27001

The SoA (Statement of Applicability) is one of the key documents when it comes to ISO 27001 compliance. It identifies the controls you have selected to address information security risks, explains why ...
HashiCorp

WhiteHat Report: DevSecOps Adoption on the Rise

More organizations have embraced best DevSecOps practices, according to a report published by WhiteHat Security, a subsidiary of NTT Security focused on application security. However, the report also notes that although more ...
Security Boulevard
Security Digital Transformation

Security a Challenge in Digital Transformation

Most organizations are now engaged in some form of digital transformation project or initiative, but security is a top concern for firms as they invest in new technology to grow business. This ...
Security Boulevard