article thumbnail

NIST Cybersecurity Framework 2.0

Schneier on Security

of the Cybersecurity Framework: The CSF 2.0, which supports implementation of the National Cybersecurity Strategy , has an expanded scope that goes beyond protecting critical infrastructure, such as hospitals and power plants, to all organizations in any sector. Some news articles. NIST has released version 2.0

article thumbnail

What Exactly is CyberSecurity?

Joseph Steinberg

CyberSecurity. From a practical standpoint, cybersecurity means quite different things to different people in different situations, a phenomenon that leads not only to extremely varied cybersecurity policies, procedures, and practices, but also to different understandings of the word cybersecurity itself.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Prison for cybersecurity expert selling private videos from inside 400,000 homes

Graham Cluley

A Korean cybersecurity expert has been sentenced to prison for illegally accessing and distributing private photos and videos from vulnerable "wallpad" cameras in 400,000 private households. Read more in my article on the Hot for Security blog.

article thumbnail

New SEC Rules around Cybersecurity Incident Disclosures

Schneier on Security

The US Securities and Exchange Commission adopted final rules around the disclosure of cybersecurity incidents. There are two basic rules: Public companies must “disclose any cybersecurity incident they determine to be material” within four days, with potential delays if there is a national security risk. News article.

article thumbnail

Insufficient Internal Network Monitoring in Cybersecurity

Security Boulevard

This article is part of a series where we look at a recent NSA/CISA Joint Cybersecurity Advisory on the top cybersecurity issues identified during red/blue team exercises operated by these organizations. The post Insufficient Internal Network Monitoring in Cybersecurity appeared first on Security Boulevard.

article thumbnail

Improper Separation of User/Administrator Privilege in Cybersecurity

Security Boulevard

This article is part of a series where we look at a recent NSA/CISA Joint Cybersecurity Advisory on the top cybersecurity issues identified during red/blue team exercises operated by these organizations. The post Improper Separation of User/Administrator Privilege in Cybersecurity appeared first on Security Boulevard.

article thumbnail

10 Myths about Cybersecurity You Shouldn’t Believe

Tech Republic Security

The first step to increasing your business’ cybersecurity is to educate yourself about any misconceptions so you understand the very real consequences of a cyberattack. This TechRepublic Premium article, written by Kara Sherrer, breaks down the top 10 most common myths.