It’s undeniable that Machine Learning (ML) is changing the game for securing cloud infrastructure. Security vendors have rapidly adopted ML as part of their solutions, and for good reason: By analyzing massive quantities of data, it can help identify threats, speed incident response, and ease the burden on over-taxed security operations teams.
Country-by-country analysis of major and emerging travel security risks
December 28, 2020
G4S published its Asia Emerging Risks report, which provides a comprehensive tactical overview of the preeminent risks impacting 19 of Asia’s top destinations to enable organizations to deploy risk-mitigation strategies to protect their employees and assets, especially during travel.
Shifting to a remote environment may have benefitted businesses, but not without introducing new cybersecurity risks. A data-backed strategy can help security leaders manage those risks.
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) published the Resilient Positioning, Navigation, and Timing (PNT) Conformance Framework today. PNT services, such as the Global Positioning System (GPS), is a national critical function that enables many applications within the critical infrastructure sectors. This framework will inform the design and adoption of resilient PNT systems and help critical infrastructure become more resilient to PNT disruptions, such as GPS jamming and spoofing.
As we have done in previous years, the Security magazine team compiled our favorite articles from this year. As we head into 2021, we hope you take a moment to review some of 2020’s top articles about lessons learned, thought leadership, security challenges and good practices.
FEMA and the U.S. Department of Labor (DOL) signed a Memorandum of Understanding (MOU) creating the Job Corps Emergency Management Advance Training Program (EMATP) recently. This program consists of approximately 12 weeks of advanced emergency management training for Job Corps students to become mission-ready emergency management specialists. The MOU establishes a framework for emergency management capacity building between the two agencies.
The Institute for Security and Technology (IST) — in partnership with a broad coalition of experts in industry, government, law enforcement, nonprofits, cybersecurity insurance, and international organizations — is launching a new Ransomware Task Force (RTF) to tackle this increasingly prevalent and destructive type of cybercrime.
CISA has updated AA20-352A: Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations, originally released December 17. This update states that CISA has evidence of, and is currently investigating, initial access vectors in addition to those attributed to the SolarWinds Orion supply chain compromise. This update also provides new mitigation guidance and revises the indicators of compromise table; it also includes a downloadable STIX file of the IOCs.
Meet Issak Davidovich, Vice President of Research and Development at C2A Security. According to Davidovich, the implementation of driver assistance technologies and cybersecurity goes hand-in-hand, and the auto industry is taking its first steps on creating in-vehicle security standards. Here, we talk to him about what this means for automotive cybersecurity.
Risk management firm Crisis24, a GardaWorld company, released its annual Global Forecast report and Risk Maps that provide expert insight and analysis of various threats for 2021 for businesses and organizations seeking to protect their people and operations, no matter their location or circumstances.