Aggregator
Developer Velocity & Security: Can You Get Out of the Way in Time?
助力区域创新发展系列活动|“工业征途·安全守护”工业领域数据安全实践与创新论坛成功举办
Redline、Meta infostealer 恶意软件操作的网络基础设施被查获
11月特别活动来啦!首杀奖励+实物好礼+新人专享活动
A Threat Actor Has Allegedly Leaked Data of Gobierno Regional de Áncash
A Threat Actor is Allegedly Selling Data of Israeli Air Force
Интернет-провайдеры выступили против введения цифровой конституции
henrymans0n Has Allegedly Breached Various Government and Educational Domains in Israel
Вирусы на Android: подробное руководство по обеспечению безопасности
CVE-2024-7456 | lunary-ai lunary up to 1.4.2 /api/v1/external-users orderByClause sql injection
Next Level!斗象OBS旁路流量处置能力升级至100Gbps
Пять лет в тени: обнаружена глобальная шпионская кампания Китая
万圣夜惊魂,凌晨四点被跨国大巴扔在斯洛文尼亚高速加油站
More From Our Main Blog: The Good, the Bad and the Ugly in Cybersecurity – Week 44
Police seize Redline and Meta infostealers, fraudsters launch election-themed scams, and DPRK threat actors collaborate with Play ransomware.
The post The Good, the Bad and the Ugly in Cybersecurity – Week 44 appeared first on SentinelOne.
Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security
Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.
Dive into six things that are top of mind for the week ending Nov. 1.
1 - Securing OT/ICS in critical infrastructure with zero trustAs their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.
That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.
While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.
The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate.
Among the topics covered are:
- Critical infrastructure’s unique threat vectors
- The convergence of IT/OT with digital transformation
- Architecture and technology differences between OT and IT
The guide also outlines this five-step process for implementing zero trust in OT/ICS environments:
- Define the surface to be protected
- Map operational flows
- Build a zero trust architecture
- Draft a zero trust policy
- Monitor and maintain the environment
A zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.
To get more details, read:
- The report’s announcement “New Paper from Cloud Security Alliance Examines Considerations and Application of Zero Trust Principles for Critical Infrastructure”
- The full report “Zero Trust Guidance for Critical Infrastructure”
- A complementary slide presentation
For more information about OT systems cybersecurity, check out these Tenable resources:
- “What is operational technology (OT)?” (guide)
- “Discover, Measure, and Minimize the Risk Posed by Your Interconnected IT/OT/IoT Environments” (on-demand webinar)
- “How To Secure All of Your Assets - IT, OT and IoT - With an Exposure Management Platform” (blog)
- “Blackbox to blueprint: The security leader’s guidebook to managing OT and IT risk” (white paper)
- “Tenable Cloud Risk Report 2024” (white paper)
Startup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).
To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.
“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.
These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:
- Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.
- Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.
- Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.
- Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.
- Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection.
“Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.
To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:
- The announcement “Five Eyes Launch Shared Security Advice Campaign for Tech Startups”
- The main guides:
- These complementary documents:
Employees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.
“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.
To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?
(Source: Vanson Bourne’s “AI Barometer: October 2024”)
Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.
On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.
While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.
For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:
- “Do You Think You Have No AI Exposures? Think Again” (Tenable)
- “Shadow AI poses new generation of threats to enterprise IT” (TechTarget)
- “10 ways to prevent shadow AI disaster” (CIO)
- “Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach” (Tenable)
- “Shadow AI in the ‘dark corners’ of work is becoming a big problem for companies” (CNBC)
VIDEO
Shadow AI Risks in Your Company
4 - NCSC explains nuances of multi-factor authentication
Multi-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.
To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.
“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog.
In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.
Topics covered include:
- Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methods
- The importance of using strong MFA to secure users’ access to sensitive data
- The role of trusted devices in boosting and simplifying MFA
- Bad practices that weaken MFA’s effectiveness, such as:
- Retaining weaker, password-only authentication protocols for legacy services
- Excluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenient
To get more details, read:
- The NCSC blog “Not all types of MFA are created equal”
- The NCSC guide “Multi-factor authentication for your corporate online services”
For more information about MFA:
- “Multifactor Authentication Cheat Sheet” (OWASP)
- “Deploying Multi Factor Authentication – The What, How, and Why” (SANS Institute)
- “How MFA gets hacked — and strategies to prevent it” (CSO)
- “How Multifactor Authentication Supports Growth for Businesses Focused on Zero Trust” (BizTech)
- “What is multi-factor authentication?” (TechTarget)
The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.
In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:
- Ensure the U.S. is the leader in the development of safe, secure and trustworthy AI
- Leverage advanced AI technologies to boost national security
- Advance global AI consensus and governance
“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement.
The NSM’s directives to federal agencies include:
- Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.
- Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.
- Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights.
The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.
6 - State CISOs on the frontlines of AI securityAs the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.
That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.
Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.
However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.
None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.”
Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).
At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.
Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:
- 4 in 10 state CISOs feel their budget is insufficient.
- Almost half of respondents rank cybersecurity staffing as one of the top challenges.
- In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.
- More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.
For more information about CISO trends:
- “What’s important to CISOs in 2024” (PwC)
- “The CISO’s Tightrope: Balancing Security, Business, and Legal Risks in 2024” (The National CIO Review)
- “State of CISO Leadership: 2024” (SC World)
- “4 Trends That Will Define the CISO's Role in 2024” (SANS Institute)
Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security
Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the CSA says. Meanwhile, the Five Eyes countries offer cyber advice to tech startups. Plus, a survey finds “shadow AI” weakening data governance. And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy.
Dive into six things that are top of mind for the week ending Nov. 1.
1 - Securing OT/ICS in critical infrastructure with zero trustAs their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles.
That’s the key message of the Cloud Security Alliance’s “Zero Trust Guidance for Critical Infrastructure,” which focuses on applying zero trust methods to OT and industrial control system (ICS) systems.
While OT/ICS environments were historically air gapped, that’s rarely the case anymore. “Modern systems are often interconnected via embedded wireless access, cloud and other internet-connected services, and software-as-a-service (SaaS) applications,” reads the 64-page white paper, which was published this week.
The CSA hopes the document will help cybersecurity teams and OT/ICS operators enhance the way they communicate and collaborate.
Among the topics covered are:
- Critical infrastructure’s unique threat vectors
- The convergence of IT/OT with digital transformation
- Architecture and technology differences between OT and IT
The guide also outlines this five-step process for implementing zero trust in OT/ICS environments:
- Define the surface to be protected
- Map operational flows
- Build a zero trust architecture
- Draft a zero trust policy
- Monitor and maintain the environment
A zero trust strategy boosts the security of critical OT/ICS systems by helping teams “keep pace with rapid technological advancements and the evolving threat landscape,” Jennifer Minella, the paper’s lead author, said in a statement.
To get more details, read:
- The report’s announcement “New Paper from Cloud Security Alliance Examines Considerations and Application of Zero Trust Principles for Critical Infrastructure”
- The full report “Zero Trust Guidance for Critical Infrastructure”
- A complementary slide presentation
For more information about OT systems cybersecurity, check out these Tenable resources:
- “What is operational technology (OT)?” (guide)
- “Discover, Measure, and Minimize the Risk Posed by Your Interconnected IT/OT/IoT Environments” (on-demand webinar)
- “How To Secure All of Your Assets - IT, OT and IoT - With an Exposure Management Platform” (blog)
- “Blackbox to blueprint: The security leader’s guidebook to managing OT and IT risk” (white paper)
- “Tenable Cloud Risk Report 2024” (white paper)
Startup tech companies can be attractive targets for hackers, especially if they have weak cybersecurity and valuable intellectual property (IP).
To help startups prevent cyberattacks, the Five Eyes countries this week published cybersecurity guides tailored for these companies and their investors.
“This guidance is designed to help tech startups protect their innovation, reputation, and growth, while also helping tech investors fortify their portfolio companies against security risks," Mike Casey, U.S. National Counterintelligence and Security Center Director, said in a statement.
These are the top five cybersecurity recommendations from Australia, Canada, New Zealand, the U.S. and the U.K. for tech startups:
- Be aware of threat vectors, including malicious insiders, insecure IT and supply chain risk.
- Identify your most critical assets and conduct a risk assessment to pinpoint vulnerabilities.
- Build security into your products by managing intellectual assets and IP; monitoring who has access to sensitive information; and ensuring this information’s protection.
- Conduct due diligence when choosing partners and make sure they’re equipped to protect the data you share with them.
- Before you expand abroad, prepare and become informed about these new markets by, for example, understanding local laws in areas such as IP protection and data protection.
“Sophisticated nation-state adversaries, like China, are working hard to steal the intellectual property held by some of our countries’ most innovative and exciting startups,” Ken McCallum, Director General of the U.K.’s MI5, said in a statement.
To get more details, check out these Five Eyes’ cybersecurity resources for tech startups:
- The announcement “Five Eyes Launch Shared Security Advice Campaign for Tech Startups”
- The main guides:
- These complementary documents:
Employees’ use of unauthorized AI tools is creating compliance issues in a majority of organizations. Specifically, it makes it harder to control data governance and compliance, according to almost 60% of organizations surveyed by market researcher Vanson Bourne.
“Amid all the investment and adoption enthusiasm, many organisations are struggling for control and visibility over its use,” reads the firm’s “AI Barometer: October 2024” publication. Vanson Bourne polls 100 IT and business executives each month about their AI investment plans.
To what extent do you think the unsanctioned use of AI tools is impacting your organisation's ability to maintain control over data governance and compliance?
(Source: Vanson Bourne’s “AI Barometer: October 2024”)
Close to half of organizations surveyed (44%) believe that at least 10% of their employees are using unapproved AI tools.
On a related front, organizations are also grappling with the issue of software vendors that unilaterally and silently add AI features to their products, especially to their SaaS applications.
While surveyed organizations say they’re reaping advantages from their AI usage, “such benefits are dependent on IT teams having the tools to address the control and visibility challenges they face,” the publication reads.
For more information about the use of unapproved AI tools, an issue also known as “shadow AI,” check out:
- “Do You Think You Have No AI Exposures? Think Again” (Tenable)
- “Shadow AI poses new generation of threats to enterprise IT” (TechTarget)
- “10 ways to prevent shadow AI disaster” (CIO)
- “Never Trust User Inputs -- And AI Isn't an Exception: A Security-First Approach” (Tenable)
- “Shadow AI in the ‘dark corners’ of work is becoming a big problem for companies” (CNBC)
VIDEO
Shadow AI Risks in Your Company
4 - NCSC explains nuances of multi-factor authentication
Multi-factor authentication (MFA) comes in a variety of flavors, and understanding the differences is critical for choosing the right option for each use case in your organization.
To help cybersecurity teams better understand the different MFA types and their pluses and minuses, the U.K. National Cyber Security Centre (NCSC) has updated its MFA guidance.
“The new guidance explains the benefits that come with strong authentication, while also minimising the friction that some users associate with MFA,” reads an NCSC blog.
In other words, what type of MFA method to use depends on people’s roles, how they work, the devices they use, the applications or services they’re accessing and so on.
Topics covered include:
- Recommended types of MFA, such as FIDO2 credentials, app-based and hardware-based code generators and message-based methods
- The importance of using strong MFA to secure users’ access to sensitive data
- The role of trusted devices in boosting and simplifying MFA
- Bad practices that weaken MFA’s effectiveness, such as:
- Retaining weaker, password-only authentication protocols for legacy services
- Excluding certain accounts from MFA requirements because their users, usually high-ranking officials, find MFA inconvenient
To get more details, read:
- The NCSC blog “Not all types of MFA are created equal”
- The NCSC guide “Multi-factor authentication for your corporate online services”
For more information about MFA:
- “Multifactor Authentication Cheat Sheet” (OWASP)
- “Deploying Multi Factor Authentication – The What, How, and Why” (SANS Institute)
- “How MFA gets hacked — and strategies to prevent it” (CSO)
- “How Multifactor Authentication Supports Growth for Businesses Focused on Zero Trust” (BizTech)
- “What is multi-factor authentication?” (TechTarget)
The White House has laid out its expectations for how the federal government ought to promote the development of AI in order to safeguard U.S. national security.
In the country’s first-ever National Security Memorandum (NSM) on AI, the Biden administration said the federal government must accomplish the following:
- Ensure the U.S. is the leader in the development of safe, secure and trustworthy AI
- Leverage advanced AI technologies to boost national security
- Advance global AI consensus and governance
“The NSM’s fundamental premise is that advances at the frontier of AI will have significant implications for national security and foreign policy in the near future,” reads a White House statement.
The NSM’s directives to federal agencies include:
- Help improve the security of chips and support the development of powerful supercomputers to be used by AI systems.
- Help AI developers protect their work against foreign spies by providing them with cybersecurity and counterintelligence information.
- Collaborate with international partners to create a governance framework for using AI in a way that is ethical, responsible and respects human rights.
The White House also published a complementary document titled “Framework To Advance AI Governance and Risk Management in National Security,” which adds implementation details and guidance for the NSM.
6 - State CISOs on the frontlines of AI securityAs the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.
That’s according to the “2024 Deloitte-NASCIO Cybersecurity Study,” which surveyed CISOs from all 50 states and the District of Columbia.
Specifically, 88% of state CISOs reported being involved in the development of a generative AI strategy, while 96% are involved with creating a generative AI security policy.
However, their involvement in AI cybersecurity matters isn’t necessarily making them optimistic about their states’ ability to fend off AI-boosted attacks.
None said they feel “extremely confident” that their state can prevent AI-boosted attacks, while only 10% reported feeling “very confident.” The majority (43%) said they feel “somewhat confident” while the rest said they are either “not very confident” or “not confident at all.”
Naturally, most state CISOs see AI-enabled cyberthreats as significant, with 71% categorizing them as either “very high threat” (18%) or “somewhat high threat” (53%).
At the same time, state CISOs see the potential for AI to help their cybersecurity efforts, as 41% are already using generative AI for cybersecurity, and another 43% have plans to do so by mid-2025.
Other findings from the "2024 Deloitte-NASCIO Cybersecurity Study" include:
- 4 in 10 state CISOs feel their budget is insufficient.
- Almost half of respondents rank cybersecurity staffing as one of the top challenges.
- In the past two years, 23 states have hired new CISOs, as the median tenure of a state CISO has dropped to 23 months, down from 30 months in 2022.
- More state CISOs are taking on privacy protection duties — 86% are responsible for privacy protection, up from 60% two years ago.
For more information about CISO trends:
- “What’s important to CISOs in 2024” (PwC)
- “The CISO’s Tightrope: Balancing Security, Business, and Legal Risks in 2024” (The National CIO Review)
- “State of CISO Leadership: 2024” (SC World)
- “4 Trends That Will Define the CISO's Role in 2024” (SANS Institute)
The post Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security appeared first on Security Boulevard.
Cybersecurity Insights with Contrast CISO David Lindner | 11/1/24
The EU recently updated its Product Liability Directive (PDF) to reflect the critical role of software in modern society. This means software vendors are now liable for defects that cause harm, including personal injury, property damage or data loss. This change emphasizes the growing importance of prioritizing safety and security in software development. Companies must proactively review their processes, strengthen security measures and embrace a new era of accountability for the software they create.
Insight #2: Most CISOs fear getting axed over data breaches
A recent survey revealed that 77% of CISOs feel significant pressure to prevent data breaches, often to the point of fearing for their jobs. This highlights a critical need to shift the organizational mindset from blame to shared responsibility. Instead of making the CISO the sole scapegoat, companies should foster a culture of collaboration where security is everyone's priority and where CISOs have the support and resources they need to succeed.
Insight #3: Outdated software is the grim reaper in your security nightmareDon't let outdated software become a security nightmare. Outdated software is a prime target for attackers. Make it a priority to regularly check for updates and replace any software that's reached its end of life. This simple step can significantly reduce your risk of a security breach.
The post Cybersecurity Insights with Contrast CISO David Lindner | 11/1/24 appeared first on Security Boulevard.