Strategy Roadmap for CIS Control #1: Inventory and Control of Hardware Assets

security of their data

A cybersecurity framework lays the foundation for your entire program and one of the keys for CISO to succeed. It not only helps CISO to streamline the cybersecurity activities but also helpful in communicating the state of cybersecurity to top management. But there is no black and white answer to which framework to choose. HIGH-LEVEL CYBERSECURITY STRATEGY Frank […]

Security Experts On Instagram bug lets hackers ‘snoop on you through your phone’ by sending a single image file

Security researchers at Check Point published research today, identifying a Remote Control Execution (RCE) vulnerability in Instagram. The attacker would only need a single, malicious image to execute the attack. Check Point researchers summarised the attack method to three steps: The attacker sends an image to a target victim’s email, WhatsApp or other media exchange platform. […]

IoT Cybersecurity Improvement Act Of 2020 – Expert Source

The House recently passed the IoT Cybersecurity Improvement Act of 2020, requiring IoT devices purchased by the government to meet minimum security requirements based on guidelines developed by the National Institute of Standards and Technology (NIST). Experts Comments September 25, 2020 Ellen Boehm + Follow Me – UnFollow Me Senior Director of IoT Product Management […]

Security Experts On Historic NIST SP 800-53

The final version of NIST SP 800-53 Revision 5 was released yesterday, in what NIST calls an “historic” update to its flagship security and privacy guidance, Special Publication (SP) 800-53, Security and Privacy Controls for Information Systems and Organizations. Experts Comments September 25, 2020 Jayant Shukla + Follow Me – UnFollow Me CTO and Co-Founder […]