According to the recent FBI and CISA Cybersecurity Advisory on Microsoft Exchange Server vulnerabilities, these vulnerabilities allow an attacker to access a victims’ Exchange Servers, enabling them to gain persistent system access and control of an enterprise network. It has the potential to affect tens of thousands of systems in the United States and provides adversaries with access to networks containing valuable research, technology, personally identifiable information (PII), and other sensitive information from entities in multiple U.S. sectors.
As shared by the Commissioner for Data Protection, Helen Dixon, “The progress the DPC has made in 2020 provides a solid platform on which to build across our enforcement and complaint-handling functions in particular. The GDPR must be understood as a project for the now, but equally for the longer-term. The DPC intends to continue as a leader in its full implementation.”
Consisting of analysis from 524 organizations that experienced data breaches between August 2019 and April of 2020, the Cost of Data Breach Report 2020 from the Ponemon Institute shares key information, findings, and data points harvested from more than 3,200 interviews on areas ranging from global data breach costs to data breach lifecycles in influential countries and industry sectors.
According to the recently released cybersecurity guidance from the National Security Agency (NSA), as cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the mindset necessary to deploy and operate a system engineered according to Zero Trust principles can better position them to secure sensitive data, systems, and services.
According to HaystackID’s Senior Vice President and General Manager for Review Service, Matt Daimler, “Security has always been an essential part of our remote review. But since we first offered it in 2014, we have had to adapt to rapidly changing security risks. Now increased cyber threats and exponential growth in remote work due to the pandemic have driven the need for even greater protection. Our 3.0 platform is the next step in that evolution using cutting-edge, next-generation technology.”
According to the European Commission, the Digital Services Act is a comprehensive set of new rules, which regulate the responsibilities of digital services. Together with the Digital Markets Act, it will create a safer digital space for users of digital services, protecting their fundamental rights online. The Acts will also create a level playing field so that digital businesses can grow within the single market and compete globally.
The Cyber Law Toolkit is a dynamic interactive web-based resource for legal professionals who work with matters at the intersection of international law and cyber operations. At its heart, the Toolkit currently consists of 19 hypothetical scenarios. Each scenario contains a description of cyber incidents inspired by real-world examples, accompanied by detailed legal analysis. The aim of the analysis is to examine the applicability of international law to the scenarios and the issues they raise. The Toolkit was formally launched on 28 May 2019 in Tallinn, Estonia. Its first general annual update was published on October 2, 2020.
NIST has released NISTIR 8286, Integrating Cybersecurity and Enterprise Risk Management (ERM). This report promotes greater understanding of the relationship between cybersecurity risk management and ERM, and the benefits of integrating those approaches.
“Estonia is a cyber country of excellence with a robust cyber defensive system in terms of technology and people. Given their deep expertise, I believe they will have substantial lessons to share, which will be enormously helpful in finding efficiencies in our science and technology efforts while understanding how best to defend against cyber warfare,” said Robert Kimball, the C5ISR Center’s senior research scientist for cyber security. Kimball also noted Estonia is home to the NATO Cyber Defense Center and Cyber Range.
According to NIST in its recently published paper on forensic science challenges and the cloud, “Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted.” The paper goes on to highlight that, “One of the most daunting new challenges is how to perform digital forensics in various types of cloud computing environments. The challenges associated with conducting forensics in different cloud deployment models, which may cross geographic or legal boundaries, have become an issue.” The complete paper, NIST Cloud Computing Forensic Science Challenges, published in August of 2020, aggregates, categorizes, and discusses the forensics challenges faced by experts when responding to incidents that have occurred in a cloud-computing ecosystem.