Browsing category

cyber security

Computer Security, cyber security, hacking, Network Security, Security Hacker, SOC, SOC Defense, SOC Resources,

SOC Third Defense Phase – Understanding Your Organization Assets

In our first phase, we have seen the basic defense mechanisms which was recommended in organizations. In our second phase, we have seen the understanding and the importance of the behaviors of modern-day malware to encounter. In this third phase, we are going to see the importance of understanding your organization assets to provide better […]

The post SOC Third Defense Phase – Understanding Your Organization Assets appeared first on GBHackers On Security.

Antivirus, Cyber Attack, cyber security, Cyber Security News, hackers, hacking, Hacking Techniques, Hacking tool, Hacking Tools, Hacks, Infosec- Resources, Malware, Security Hacker, VPN,

8 Common Hacking Techniques & 3 Ways to Avoid Them All

Hacking Techniques

Hackers comes in many forms with sophisticated Hacking Techniques, While there has been a lot of discussion about online security in recent years, many people are still unfamiliar with the types of attacks they are most likely to be targeted by. Knowing what’s out there is clearly important when it comes to keeping yourself safe […]

The post 8 Common Hacking Techniques & 3 Ways to Avoid Them All appeared first on GBHackers On Security.

Computer Security, Cyber Attack, Cyber Crime, cyber security, cyber security companies, Cyber Security News, hacking, Information Security Risks, Rising of cybercriminals, Security,

Different Reasons why most of the Companies are Moving towards Cyber Security

Moving towards Cyber Security

For a business to become successful, the management ought to concentrate on the sales, the talents of the employees and the growth in general. However, most of the big companies rarely concentrate on the tech-savvy of the companies. This is because most of the cyber-crimes are targeted to the smaller businesses. In the end, the […]

The post Different Reasons why most of the Companies are Moving towards Cyber Security appeared first on GBHackers On Security.

Big Data, big data analytics, big data hadoop, cyber security, Cybersecurity, data analytics, Hadoop, Infosec- Resources,

Protecting Big Data with Hadoop: A Cyber Security Protection Guide

big data

Big Data analytics is emerging from today’s technology as people are demanding better ways to protect their Big data. Keep reading to find out how Hadoop via cybersecurity methods in this post. What is Hadoop? Hadoop is a Java-based, open source programming system that allows users to store and process Big Data sets in a computing […]

The post Protecting Big Data with Hadoop: A Cyber Security Protection Guide appeared first on GBHackers On Security.

Cyber Defense, cyber security, Incident Response, Tools,

Most Important Cyber Incident Response Tools List for Ethical Hackers and Penetration Testers

Incident Response

Cyber Incident Response Tools are more often used by security industries to test the vulnerabilities and provide an emergency incident response to compromised network and applications and helps to take the appropriate mitigation steps. Here you can find the Comprehensive Cyber Incident Response Tools list that covers to use in various types of incident response […]

The post Most Important Cyber Incident Response Tools List for Ethical Hackers and Penetration Testers appeared first on GBHackers On Security.

C-Suite, Chief Information Security Officer (CISO), CISO, cyber security, cyber threat, Education, Security Awareness, Security Training,

New NIST Guidebook Says Cybersecurity Is Everyone’s Job — Here’s Why

Every member of a digitally integrated enterprise has a role to play in keeping organizations safe across lines of business — up and down the organizational chart. Not every company has caught up to this line of thought, however. What’s more, those that have may not have a clear idea of what those roles should look like.

The National Institute of Standards and Technology (NIST) released a guidebook draft to help bridge this gap: “Cybersecurity is Everyone’s Job.” The NIST guidebook was created for business owners and leaders, but it’s also helpful for those serving functional roles in human resources (HR), IT, legal — and even sales and marketing.

The Importance of a Cybersecurity Culture

The NIST guidebook stresses the importance of a culture of cybersecurity in safeguarding the data that enables organizations to compete and thrive in the digital age.

The reality: Employees represent the “largest attack surface” of most organizations. Common business activities — such as product and service delivery, payroll, accounts payable, communicating with customers and suppliers and resource management — frequently expose organizations to cyber risk, which is why a cybersecurity culture is so critical.

Tone and close involvement from the organization’s leaders dictate whether efforts to impact culture are successful or short-lived experiments. Mindset is also a key driver of human behavior — so proper attention must be paid to evaluating and addressing employees’ mindsets as part of a broader security-awareness campaign. Additionally, due to the rise in attacks leveraging social engineering, organizations should seek to “harden” their employees to such attacks.

Leadership, Planning and Governance Are Key

The NIST guidebook directly addresses directors, chairmen and chairwomen, presidents, partners, founders and the like: “You matter to the organization because, without you, the organization lacks direction and cohesion. You are the hub of the wheel — connecting to, coordinating and driving the many parts of the business.”

This includes managing all cyber-related business risks, prioritizing and ensuring proper funding for cybersecurity projects, building a culture of security and ensuring proper governance controls are in place.

The NIST’s recommendations for action include:

  • Understanding cybersecurity well enough to enable sound decision making;

  • Including cyber risks in the enterprise risk management (ERM) process;

  • Developing and maintaining organizational information security policies and standards;

  • Promoting the development of effective cross-functional teams to accomplish cybersecurity goals for the organization; and

  • Protecting sensitive strategic, financial, legal and risk information.

People in these roles might often find themselves with the difficult responsibility of making decisions about a subject with which they are neither comfortable nor familiar. From the summit of a businesses’ accountability, leaders are encouraged to ask questions and access timely and relevant information that will allow them to make sound cyber risk decisions.

The Role of Finance and Administration

As players who “are responsible for ensuring that each part of the organization has the ability to pay for goods and services, operate within a budget, track revenues and expenditure and conduct business with external entities,” as well as handling massive banks of proprietary data, finance and administration departments function with a particular connection to cybersecurity.

This area often includes ERM, and possibly internal audit and compliance functions. “You matter to the organization because nothing can happen without the ability to maintain financial health, perform essential transactions, manage business risks and support the planning and governance function,” the guidebook stresses. There are many systems and sources of data people in this function own, manage or use, including Internal Revenue Service (IRS) data, balance sheets, budgets, Securities and Exchange Commission (SEC) filing data, ERM tools, audit reports, contracts and more.

Regarding cybersecurity specifically, the guidebook reminds professionals in finance and administration of their responsibility to “ensure that cyber risks are integrated into the enterprise risk management process” — including the ability to identify cyber risks early when initiating new projects or strategies, as well as the need to properly gauge the range of threats to which the business is subject.

Another major responsibility of people in this role is to “provide sufficient funding to enable the success of the organization’s cybersecurity strategy” and to ensure alignment of resources with strategy and risk appetite.

The bottom line: A holistic, broadly integrated (and deeply ingrained) approach to cybersecurity is the best way to fortify against risk and respond informedly and timely to incidents when they occur.

The post New NIST Guidebook Says Cybersecurity Is Everyone’s Job — Here’s Why appeared first on Security Intelligence.

This post appeared first on Security Intelligence
Author: Christophe Veltsos