Feds Issue Guide for Change Health Breach Reporting Duties

HHS' Office for Civil Rights in new "frequently asked questions" guidance issued Friday night said it has not yet received breach reports from Change Healthcare, UHG, or any other affected covered entities pertaining to the incident.

NSA Shares Best Practices for Secure AI Systems

The guidance offers a wide range of best practices, including that organizations adopt a zero trust mindset, actively monitor the AI model’s behavior, and require the primary developer of the AI system to provide a threat model for their system.

CISA, FBI, and ODNI Release Guidance for Securing Election Infrastructure Against the Tactics of Foreign Malign Influence Operations

The guidance document details the latest tactics employed in foreign malign influence operations to shape U.S. policies, decisions, and discourse and could be used to target America’s election infrastructure.

UK: NCSC Warns of Hackers Hitting High-Risk Individuals' Personal Accounts

Britain's National Cyber Security Center is warning that criminals and nation-state hacking groups, confronted with well-managed corporate cybersecurity defenses, have turned their sights to individual personal devices and accounts.

UK Privacy Watchdog Updates Guidance on Data Protection Fines

After suffering a data breach, organizations in the United Kingdom that work closely and transparently with regulators and cybersecurity officials will be treated with greater leniency if their case results in penalties and a fine.

CISA Urges Software Devs to Weed out SQL Injection Vulnerabilities

Parameterized queries are a better option for a secure-by-design approach compared to input sanitization techniques because the latter can be bypassed and are difficult to enforce at scale.

US Government Releases New DDoS Attack Guidance for Public Sector

The joint advisory from the CISA, the FBI, and the MS-ISAC, highlighted three main types of DDoS attacks public sector entities must be prepared for, including Volume-based attacks, Protocol-based attacks, and Application layer-based attacks.

UK: NCSC Releases Cloud SCADA Security Guidance

The NCSC released guidance for operational technology (OT) organizations on migrating their SCADA systems to the cloud. This guidance aims to help organizations assess the benefits and risks of cloud-hosted SCADA to make informed decisions.

CISA, NSA Share Best Practices for Securing Cloud Services

The NSA and CISA have issued five joint bulletins outlining best practices for securing cloud environments, covering identity and access management, key management, encryption, data security, and mitigating risks from managed service providers.

NSA Shares Zero-Trust Guidance to Limit Adversaries on the Network

Organizations need to gradually advance through specific maturity levels in various components of the zero-trust architecture to effectively build a resilient security environment.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags