A new report says cultural and technical divides are hindering industrial organizations from developing a fully mature security program – a problem that limits visibility throughout the organization and underscores the need for a unified IT/OT security strategy.
This week, Dr. Doug talks: Elon buys my motorcycle, Lyceum, Buzz word security, PS5, Puny Code, Palo Alto, and Small biz, and the show wrap ups on the Security Weekly News Wrap Up show!
Assessing risk, earning buy-in, implementing tools to track assets, documenting processes and maintaining transparency are all important components of a strong insider threat strategy, said Code42's Todd Thorsen at this week's InfoSec World conference.
Report says the rapid adoption of cloud services and microservices architectures is resulting in dangerously complex API ecosystems. The possible solution: dynamic and automated testing and documentation.
Legacy systems’ lack of vendor support makes them particularly vulnerable to cyberattacks, warned the Department of Health and Human Services Office for Civil Rights.
House legislation will have a powerful supporter in CISA Director Jen Easterly, who said this week that she endorses bill and is already working to incorporate some of the concepts into existing agency operations.