FedRAMP 20x Initiative Promises Major Changes for Federal Cloud Service Providers

The General Services Administration (GSA) has rolled out the “FedRAMP 20x” initiative aimed at overhauling the Federal Risk and Authorization Management Program. This aims to make it easier for cloud service providers (CSPs) to gain necessary authorisations and streamline processes to improve efficiency. Source: Original Article Key Points FedRAMP 20x focuses on automating validation of […]

Read More →

Cybersecurity Isn’t Just for Big Business Anymore—SensCy Steps In to Support the Rest

In a recent interview, David Behen, Chief Strategy Officer at SensCy, highlighted an overlooked crisis: the cybersecurity challenges that small and medium organisations (SMOs) are facing. As attacks on these entities increase, it’s crucial to understand the gravity of the situation. Key Points Cyberattacks on SMOs have risen 400% year-on-year. Only 40% of SMOs have […]

Read More →

AI-Driven Ransomware Can Be Thwarted With Zero-Trust Networking

Summary State and local governments are urged to modernise their legacy systems and cybersecurity measures to prepare for the next wave of AI-driven ransomware attacks. As seen in a recent advisory by multiple cybersecurity agencies, the rising threat from sophisticated ransomware like Ghost necessitates immediate action. Vulnerabilities that attackers exploit are often outdated, putting sensitive […]

Read More →

Why Privileged Access Management (PAM) is Essential for Protecting State, Local, and Education Data (SLED)

Privileged Access Management (PAM) is becoming a buzzword, but it’s genuinely crucial. With state, local, and educational organisations (SLED) often handling large troves of sensitive data, strong access management is vital to guard against today’s cyber threats. Cybercriminals are always on the hunt, targeting these organisations to probe for weaknesses that can lead to data […]

Read More →
Pro

Just Because You Passed an Audit Doesn’t Mean You Are Cyber-Secure

Imagine sitting in a boardroom, surrounded by your team, ready to toast a successful audit completion. The report reads: “No significant findings,” and “Compliant with all standards.” It’s tempting to assume that this marks a win for your organisation and a high point in your career as a CIO. But are you truly secure, or are you just playing the compliance game?

Read More →

The history and evolution of ransomware attacks

The History and Evolution of Ransomware Attacks Ransomware is a buzzword in the headlines as individuals and companies continue to suffer from attacks that have a surprisingly long and twisted history. From the early days of floppy disks to sophisticated cybercrimes demanding cryptocurrency, the evolution of ransomware is a tale worth knowing. Source: Article URL […]

Read More →

Chris Krebs, who debunked 2020 election lies, vows full-time fight against Trump

Chris Krebs, who debunked 2020 election lies, vows full-time fight against Trump Summary Chris Krebs, the former director of the Cybersecurity and Infrastructure Security Agency (CISA), has left his position at SentinelOne to focus on opposing the Trump administration after being targeted in a recent executive order. This move comes after Krebs was dismissed by […]

Read More →

House panel to hold May hearing on reauthorization of 2015 information sharing law

House panel to hold May hearing on reauthorisation of 2015 information sharing law The House Homeland Security cyber subcommittee is gearing up for a May hearing aimed at reauthorising the Cybersecurity Information Sharing Act (CISA) of 2015. This act, according to Chairman Andrew Garbarino (R-NY), plays a crucial role in enhancing cybersecurity measures, especially in […]

Read More →

National Academies report offers recommendations for improving Justice Dept. cyber crime metrics

National Academies report offers recommendations for improving Justice Dept. cyber crime metrics The National Academies of Sciences, Engineering and Medicine has put forward a new report aimed at reforming cyber crime measurement for the Justice Department. This framework aims to enhance the metrics of cyber incident reporting as growing concerns about cybercrime escalate with the […]

Read More →

Consumer Technology Association emphasizes benefits of IoT cyber labeling program to new FCC chair

Consumer Technology Association emphasizes benefits of IoT cyber labeling program to new FCC chair The Consumer Technology Association is getting vocal about the advantages of the FCC’s Internet of Things cyber labeling programme, as they address Chairman Brendan Carr directly. This initiative is crucial for bolstering national security in our increasingly connected world. Source: InsideCyberSecurity.com […]

Read More →