article thumbnail

The NIS2 Directive: why cyber-resilience is the new normal for European organisations

CIO

Due to be adopted as law by member states by October 2024, the EU Network and Information Systems (NIS2) Directive is the most important cybersecurity legislation ever enacted across member states. At that time, cybersecurity was seen primarily as a problem faced by individual organizations. This is hugely ambitious.

article thumbnail

Cybersecurity Snapshot: NSA Picks Top Cloud Security Practices, while CNCF Looks at How Cloud Native Can Facilitate AI Adoption

Tenable

Check out the NSA’s 10 key best practices for securing cloud environments. 1 - Ten best practices for beefing up cloud security Looking for advice on boosting the security of your cloud environment? 1 - Ten best practices for beefing up cloud security Looking for advice on boosting the security of your cloud environment?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

Wireless 232
article thumbnail

[Webinars] Tech due diligence, IAST, and government software

Synopsys

Learn about web services and APIs in tech due diligence, the magic of IAST, and software risks for DoD and government agencies in our upcoming webinars. The post [Webinars] Tech due diligence, IAST, and government software appeared first on Software Integrity Blog.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. Today’s technology leaders play a more strategic role in establishing cybersecurity strategy for their organizations. In the U.S. alone, cyber losses totaled $10.3 billion in 2022.

article thumbnail

[Webinars] Tech due diligence and AppSec tools for developers

Synopsys

Learn how to manage your software asset risk in tech due diligence, and discover AppSec tools and techniques to enable your developers to build security in. The post [Webinars] Tech due diligence and AppSec tools for developers appeared first on Software Integrity Blog.

article thumbnail

Cybersecurity Snapshot: Cyber Agencies Offer Secure AI Tips, while Stanford Issues In-Depth AI Trends Analysis, Including of AI Security

Tenable

Check out recommendations for securing AI systems from the Five Eyes cybersecurity agencies. Plus, Stanford University offers a comprehensive review of AI trends. Check out the AI security recommendations jointly published this week by cybersecurity agencies from the Five Eyes countries: Australia, Canada, New Zealand, the U.K.