The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecurity Framework

In the last two years, there have been increasingly public data breaches and cybersecurity costs. But, the recent news has also brought positive attention to the developments in the National Institute of Standards and Technology (NIST) Cybersecurity Framework. The NIST Framework is an important advancement in improving cybersecurity for all organizations. The Framework is a unifying single document that combines the best practices of preceding standards. The document itself consists of three main sections: Profile, Implementation Tiers, and Core. It is designed as a reference guide for organizations to conduct iterative cybersecurity evaluations and prioritize the areas that matter most according to their risk profile.

Spotlight

Prevailion

One Compromised Partner is All It Takes. Your Third Party Ecosystem may be your weakest link, compromised due to poor security practices or sophisticated malware. That lack of visibility is rampant among all organizations today. Prevailion has built the world’s first nation-state level solution for empirical proof of active, confirmed compromises. Leveraging our proprietary global passive sensor network we specifically target and infiltrate adversary Command-and-Control (C2) infrastructure, collecting tens of millions of pieces of evidence every day with a zero signal-to-noise ratio. That evidence is then organized, attributed, and made available to our customers via a dashboard and/or API subscription.

OTHER WHITEPAPERS
news image

Privileged Remote Access Security in Cloud Whitepaper

whitePaper | May 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving the efficiency and success of your organization with a better user experience.

Read More
news image

Adobe Operational Security Overview

whitePaper | December 30, 2022

With a cloud footprint that includes public and private clouds across different providers, the Adobe® multi-cloud strategy requires consistent and repeatable guardrails that are readily available to our product and service teams. To that end, our dedicated operational security team focuses on securing cloud resources at scale and helping ensure the safety and security of customer applications and data within our continually evolving cloud infrastructure operations.

Read More
news image

Revolutionizing cybersecurity

whitePaper | October 31, 2021

FINX, a platform established since 2018 that is enabled by blockchain technology to create the world’s 1st comprehensive decentralized banking platform. FINX aspires to resolve the problem of high banking costs imposed by conventional banks and serve the unbanked market in Southeast Asia.

Read More
news image

Cloud-Native Ransomware – How attacks on availability leverage cloud services

whitePaper | December 13, 2022

Ransomware is a financially motivated crime with the goal of inhibiting business systems and obtaining a ransom payment. Historically, ransoming data residing in traditional on-premises enterprise workloads and government systems have resulted in ample financial gain for assailants using ransomware attacks.

Read More
news image

Cross-Generational Security Of Mobile Telephony

whitePaper | August 4, 2022

Abstract— With the recent roll-outs of 5G networks and the rise of phones supporting the standard, it’s critical to examine the technical underpinnings of 5G system security. The fifth generation of 3GPP (3rd Generation Partnership Project) mobile telephony, the lack of understanding, outright hostility, and general confusion surrounding this roll-out is unmatched in the history of mobility. We aim to alleviate much of the confusion and hostility by providing an overarching description and security document.

Read More
news image

Multiverse Security: Easy, Built-in, Comprehensive and Continuous

whitePaper | December 12, 2022

In the evolution of Internet-based technologies, Web 2.0 introduced popular decentralized services that accelerated interactivity between websites and users. Looking to capitalize on this innovation, businesses rushed to launch applications to the market. However, both the Web 2.0 architecture and dependent businesses failed to incorporate key security principles into the design and implementation of these services, resulting in critical vulnerabilities.

Read More

Spotlight

Prevailion

One Compromised Partner is All It Takes. Your Third Party Ecosystem may be your weakest link, compromised due to poor security practices or sophisticated malware. That lack of visibility is rampant among all organizations today. Prevailion has built the world’s first nation-state level solution for empirical proof of active, confirmed compromises. Leveraging our proprietary global passive sensor network we specifically target and infiltrate adversary Command-and-Control (C2) infrastructure, collecting tens of millions of pieces of evidence every day with a zero signal-to-noise ratio. That evidence is then organized, attributed, and made available to our customers via a dashboard and/or API subscription.

Events