Increasing tensions between China and Taiwan have prompted U.S. lawmakers to introduce bipartisan legislation aimed at bolstering Taiwan's defenses against Chinese cyberattacks, The Hill reports.
The U.S. and South Korea have agreed to establish a "Strategic Cybersecurity Cooperation Framework," which seeks to crack down on cyber adversaries, especially North Korea, which has been leveraging illicit cyber activity proceeds to support its nuclear weapons program, according to The Record, a news site by cybersecurity firm Recorded Future.
The FBI has been working to better address mounting Chinese cyber operations amid increasing tensions between China and Taiwan and the upcoming U.S. presidential elections, reports The Record, a news site by cybersecurity firm Recorded Future.
DefenseScoop reports that the U.S. is likely to maintain authorized strategic intelligence disclosures it first leveraged during the Russia-Ukraine war as it looks to bolster intelligence efforts amid increasing tensions with China.
Today’s female cybersecurity leaders are paving the way for those now entering the profession. We asked members of the Cybersecurity Collaboration Forum’s Women in Cyber group where things stand for women in the industry, and what the next generation needs to know.
With decentralized identity management, access is distributed across multiple environments. Users must have different sets of credentials for any applications they access. Here's a quick take on decentralized identity:
Many organizations struggle to assess and patch systems fast enough to stay ahead of threats, spurring investment in more aggressive, proactive vulnerability management strategies during the last two years, according to findings in a survey conducted by CRA Business Intelligence in July. Here’s what security practitioners said about challenges they’ve faced in implementing vulnerability management programs in the last two years. Download the full report: Organizations Adopt Aggressive, More Proactive Vulnerability Management Strategies in 2022.
Many organizations struggle to assess and patch systems fast enough to stay ahead of threats, spurring investment in more aggressive, proactive vulnerability management strategies during the last two years, according to findings in a survey conducted by CRA Business Intelligence in July. Here’s what security practitioners said about changes they’ve made in their vulnerability management programs in the last two years.
Security executives understand that most business technology systems will be maintained in a cloud environment going forward, but concern abounds that security teams are not equipped to manage the associated risks. This is especially true for those using public cloud infrastructure.
Research from Ping Identity and Yubico found IT leaders across the globe want to eliminate passwords, including 94% who are concerned about passwords and half who worry they are too weak for security purposes.