article thumbnail

Cybersecurity Snapshot: U.K. Cyber Agency Urges Software Vendors To Boost Product Security, While U.S. Gov’t Wants Info on Banks’ AI Use

Tenable

Check out the NCSC’s call for software vendors to make their products more secure. 1 - NCSC issues “code of practice” for software makers Software vendors improve the security of their products. 1 - NCSC issues “code of practice” for software makers Software vendors improve the security of their products.

article thumbnail

Cybersecurity Snapshot: U.S. Gov’t Revises, Seeks Input on Security Assessment Questionnaire for Software Vendors

Tenable

Uncle Sam wants your input on the latest version of the “Secure Software Development Attestation Form” that federal agencies will use to assess the security of software vendors. government will evaluate the security practices of its software vendors – and offer your two cents. In addition, there’s a new zero trust certification.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Use a Firewall for Network Traffic Analysis and Behavioral Detection

Palo Alto Networks

On March 17, we’ll host a webinar called “ Leverage Your Firewall to Expose Attackers Hiding in Your Network ” to share tips on how you can use your firewall for network traffic analysis. Cortex XDR also groups related alerts into incidents to reduce the number of individual alerts that security analysts need to review. .

article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

Cyber Safety Review Board published a 50-plus page report on the Log4j event, and a key takeaway was that Log4Shell is an “endemic vulnerability” that’ll be around for a decade — or perhaps longer. . 4 - Cybersecurity looms large in SMB software purchases. have made cybersecurity a key factor in their software purchasing decisions.

article thumbnail

Cybersecurity Snapshot: Cyber Pros Taxed by Overwork, Understaffing and Lack of Support, as Stress Takes a Toll

Tenable

1 - Study: Being a cyber pro is tough, and it ain’t getting any easier Most cybersecurity professionals feel their jobs are getting harder, due to factors like staffing shortages, tighter budgets, growing compliance requirements and increasingly complex attacks. Dive into six things that are top of mind for the week ending September 8.

article thumbnail

The 8 Best Practices for Reducing Your Organization’s Attack Surface

Ivanti

The code that makes up your software applications is another area where complexity contributes to the size of your attack surface. Work with your development team to identify where opportunities exist to minimize the amount of executed code exposed to malicious actors, which will thereby also reduce your attack surface. #2:

article thumbnail

Cybersecurity Snapshot: U.S., U.K. Governments Offer Advice on How To Build Secure AI Systems 

Tenable

Spencer Mott, Booking.com CISO (Security Weekly) Becoming a CISO: Leading Transformation (SANS Institute) 5 - CISA to vendors: Boost security of your web management interfaces Software vendors should make their web management interfaces secure by design, instead of putting the onus on their customers. Here’s a sampling of entries.