article thumbnail

The NIS2 Directive: why cyber-resilience is the new normal for European organisations

CIO

Due to be adopted as law by member states by October 2024, the EU Network and Information Systems (NIS2) Directive is the most important cybersecurity legislation ever enacted across member states. At that time, cybersecurity was seen primarily as a problem faced by individual organizations. This is hugely ambitious.

article thumbnail

Cybersecurity Snapshot: Latest MITRE ATT&CK Update Offers Security Insights on GenAI, Identity, Cloud and CI/CD

Tenable

In addition, why AI cyberthreats aren’t impacting CISOs’ budgets. 1 - New version of MITRE ATT&CK adds guidance on generative AI, cloud threats Information about malicious use of generative AI tools. Advice about securing cloud environments. And much more! Dive into six things that are top of mind for the week ending April 26.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: U.S. Gov’t Revises, Seeks Input on Security Assessment Questionnaire for Software Vendors

Tenable

Uncle Sam wants your input on the latest version of the “Secure Software Development Attestation Form” that federal agencies will use to assess the security of software vendors. government will evaluate the security practices of its software vendors – and offer your two cents. In addition, there’s a new zero trust certification.

article thumbnail

Cybersecurity Snapshot: CISOs Say Breaches Are Down, but Staffing Remains Difficult

Tenable

Plus, the free cloud security tools CISA recommends you use. That’s according to the annual “Information Security Maturity Report” report from ClubCISO, a private forum of over 800 cybersecurity leaders. Budgets stayed flat for 35% of respondents, and dropped for 13% of them. And much more!

article thumbnail

Cybersecurity Snapshot: Are SBOMs on Your Supply Chain Security Radar Screen? Check Out New Recommendations from CISA and NSA

Tenable

1 - CISA, NSA push SBOM adoption to beef up supply chain security As the Log4Shell bug and SolarWinds hack made clear, cybersecurity teams must continuously assess and mitigate risks in their organizations’ software supply chain. It can also be used by software buyers to assess their supply chain security practices.

article thumbnail

Cybersecurity Snapshot: Cyber Pros Taxed by Overwork, Understaffing and Lack of Support, as Stress Takes a Toll

Tenable

Life is getting harder for cybersecurity pros, but there are ways to improve working conditions. Meanwhile, there’s a new, free attack-emulation tool for OT security teams. 2 - OT security teams get new adversary-emulation tool Are you tasked with securing your organization’s operational technology (OT) systems?

article thumbnail

Cybersecurity Snapshot: NIST Unpacks Cyberattacks Against AI Systems, as FBI Strikes ALPHV/Blackcat Ransomware Gang

Tenable

Plus, new granular configuration recommendations for securing Microsoft 365 are out. 1 - NIST categorizes cyberattacks against AI systems Are you involved with securing the artificial intelligence (AI) tools and systems your organization uses? In addition, the cost of cyber incidents is rising. And much more!