article thumbnail

Why metrics are crucial to proving cybersecurity programs’ value

CSO Magazine

The National Institute of Standards and Technology (NIST) has pioneered information security performance measurement model s that can produce metrics. Note: NIST’s work in this area is now being updated.)

article thumbnail

Measure Security Performance, Not Policy Compliance

The Falcon's View

I'm convinced the answer to this query lies in stretching the "security as code" notion a step further by focusing on security performance metrics for everything and everyone instead of security policies. are performing and make better-informed decisions about where to focus investments for improvements.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Simplifying Decryption With Cisco’s Secure Firewall 7.7

Cisco Security

Decryption Policy Wizard: Key Features and Capabilities Cisco Secure Firewall 7.7 These features make it easier to create effective policies while maintaining security, performance, and privacy. This information helps in identifying the application, even when the payload is encrypted.

article thumbnail

NetSecOPEN names founding members, appoints inaugural board of directors

The Last Watchdog

11, 2018 – NetSecOPEN , the first industry organization focused on the creation of open, transparent network security performance testing standards, today announced that 11 prominent security vendors, test solutions and services vendors, and testing laboratories have joined the organization as founding members. Alex Samonte, Sr.

article thumbnail

Global Cybersecurity Rating System for Supply Chain Risk Management

SecureWorld News

Each supplier would be given a score based on their security performance. Monitoring suppliers: Businesses could use the ratings to monitor the security posture of their suppliers over time and act if necessary. This would help to raise awareness of risks and encourage suppliers to take steps to mitigate them.

Risk 108
article thumbnail

Boffins found a bug in Apple AirDrop that could leak users’ personal info

Security Affairs

Experts found a bug in Apple’s wireless file-sharing protocol Apple AirDrop that could expose user’s contact information. PrivateDrop is based on optimized cryptographic private set intersection protocols that can securely perform the contact discovery process between two users without exchanging vulnerable hash values.”

Wireless 104
article thumbnail

3CX data exposed, third-party to blame

Security Affairs

The exposed instances, which the company closed after we contacted them, contained information attackers could have used to spy on 3CX clients or make preparations for larger, more sophisticated attacks. Additional information could allow them to conclude what was discussed during the calls. Cybernews researchers said.