Compliance

Complete Guide to Industrial Secure Remote Access

Complete Guide to Industrial Secure Remote Access

Critical infrastructure relies heavily on the effective functioning of industrial control systems. To ensure their optimal performance and constant availability, it is necessary to shield these systems from both intentional and unintentional disruptions that could adversely affect their operations.  Historically, the safeguarding of these systems involved maintaining a clear separation between operational platforms and external

Complete Guide to Industrial Secure Remote Access Read More »

Simplifying NIST cybersecurity Standards & Framework

Simplifying NIST Cybersecurity Standards & Framework

Now that cybercrime is becoming more advanced, how can cybersecurity protocols evolve to keep fighting against cyber theft? The National Institute of Standards and Technology’s (NIST) Cybersecurity Framework or CSF was created to help businesses combat cybercrime by providing a standard that they can follow to keep their online resources protected. Even now, the NIST is constantly

Simplifying NIST Cybersecurity Standards & Framework Read More »

Is the US on the cusp of a major regulatory overhaul around cybersecurity 1

US is on the cusp of a major regulatory overhaul around cybersecurity 

According to these publications, the US is working on revamping the cybersecurity regulatory framework to move away from a regime that is currently based on voluntary threat assessment and management to one that is based on regulations enforced by the federal government. The move comes in wake of increasing cyberthreats to IT, IoT, and OT-based

US is on the cusp of a major regulatory overhaul around cybersecurity  Read More »

Is NIST working on a potential cybersecurity framework update

NIST working on potential cybersecurity framework update, seeks inputs   

As per the findings of the latest edition of Sectrio’s IoT and OT threat landscape report, cyberattacks are on the rise. There has been a significant improvement in the quality of cyberattacks as well since 2020 (or in the days following the onset of the pandemic) as hacking tools that were formerly with state-backed threat

NIST working on potential cybersecurity framework update, seeks inputs    Read More »

Everything you need to know about SECs proposed new cybersecurity reporting rules

Everything you need to know about the SEC’s newly proposed cybersecurity reporting rules   

The Securities and Exchange Commission (SEC) has proposed an amendment to enhance and standardize the compliance mandates surrounding cybersecurity risk management, strategy, governance, and incident reporting by public companies. The new rules will require publicly traded companies to be more open and forthcoming about cybersecurity events and puts a framework in place to asses incidents

Everything you need to know about the SEC’s newly proposed cybersecurity reporting rules    Read More »

NIST revises security and privacy control assessment methods

NIST revises security and privacy control assessment methods

The NIST (National Institute of Standards and Technology) has announced the release of a new Special Publication revision to verify the veracity of the implementation of security and privacy controls. Special Publication (SP) 800-53A Revision 5 includes updates that correspond to the security and privacy controls mentioned in SP 800-53. Primarily this revision provides a

NIST revises security and privacy control assessment methods Read More »

Build institutional cyber resilience with Facility Cybersecurity Plan and Checklist

Build institutional cyber resilience with facility security plan and checklist

Cyber security policies and practices should be deployed at the most micro level possible to improve its effectiveness. This is one way in which your organization can build and deepen cyber resilience and improve its ability to respond to cyber-attacks promptly. To do this, you need to have a tool that can help you build

Build institutional cyber resilience with facility security plan and checklist Read More »

Scroll to Top