DoD CIO debuts cybersecurity reciprocity playbook to streamline system authorizations, boost cybersecurity efficiency
Govt & Regulations

Cybersecurity Reciprocity Playbook (US DoD)

The DoD Cybersecurity Reciprocity Playbook is designed to provide clear, credible information on key Department priorities for employing cybersecurity reciprocity in DoD systems, consistent with DoD Instruction (DoDI) 8510.01, “Risk Management Framework for DoD Systems”
UK insurance associations join with NCSC to combat ransom payments, enhance cyber resilience
Govt & Regulations

Guidance for Organisations Considering Ransomware Payments (NCSC UK)

This guidance, developed by ABI, BIBA, IUA, and NCSC, is for organisations facing ransomware attacks and their partners. It aims to reduce business disruption and costs, the number of ransoms paid by UK victims, and the size of ransoms when payment is chosen.
CISA debuts encrypted DNS implementation guidance for federal agencies aligned with zero trust strategy
Govt & Regulations

Encrypted DNS Implementation Guidance (CISA)

This document is intended to provide implementation guidance for federal agencies to meet federal requirements related to encryption DNS traffic and enhance the cybersecurity posture of their IT networks, as set forth in OMB Memorandum M-22-09.1 The Memorandum sets forth a “zero trust” cybersecurity strategy for FCEB agencies.
Guides & frameworks
PAS (Hexagon PPM)
WALLIX
Darktrace

The Definitive Industrial Cyber Critical Infrastructure Handbook

The "Critical Infrastructure Industrial Cybersecurity Handbook" provides essential guidance on protecting the indispensable systems that support modern society—spanning energy, healthcare, transportation, and communications sectors. These infrastructures are not only crucial for economic and public welfare but are also integral to national security. This handbook addresses these challenges by outlining strategies for securing infrastructure, managing legacy systems, and enhancing resilience against cyber threats.
Transnational cybersecurity agencies release guidance on secure procurement of digital products, services
Govt & Regulations

Secure-by-Design (cyber.gov.au)

Choosing secure and verifiable technologies. Customers have the responsibility for evaluating the suitability, security and risks associated with acquiring and operating a digital product or service. However, it is important that customers increasingly demand manufacturers embrace and provide products and services that are secure-by-design and secure-by-default.
National Cybersecurity Strategy Implementation Plan (V2)
Govt & Regulations

National Cybersecurity Strategy Implementation Plan (V2)

This is the second iteration of the NCSIP, building upon the first version released in July 2023.  The NCSIP Version 2 describes 100 high-impact initiatives requiring executive visibility and interagency coordination that the Federal Government is pursuing to achieve the Strategy’s objectives. These initiatives carry over from, add to, and build upon the initiatives described in the first NCSIP, and advance the nation closer toward the Strategic Objectives sought in the National Cybersecurity Strategy.
Forescout analyzes 90,000 unknown vulnerabilities, risk blind spots that live in the wild
Threats and vulnerabilities
Forescout

Exposing the Exploited – Analysis of vulnerabilities under the radar (Forescout)

The process for naming security vulnerabilities is flawed, with many issues overlooked. Some vendors discreetly fix problems, while others do not address them at all, leading to no comprehensive source of information on all exploited vulnerabilities. This causes delays and reduces security team effectiveness. Our research provides insights into vulnerabilities exploited beyond standard catalogs, highlighting the real-world landscape of security threats.
Vendor
Invictux

OT Penetration Testing – Invictux

Invictux offers comprehensive OT penetration testing services to identify and address vulnerabilities within operational technology environments, enhancing their resilience against cyber threats.
Vendor
Invictux

OT Risk Assessment – Invictux

Invictux offers Gap/Compliance Assessments to identify potential cybersecurity threats, followed by Vulnerability Assessments to pinpoint weaknesses. Subsequently, our Risk Assessment services evaluate the level of risk, prioritizing mitigation efforts. Finally, we provide Penetration Testing to ensure the resilience of operational technology environments.