PacketNut; Confessions of an Enterprise Information Security Architect

A blog for Security Architects, CISOs and anyone else responsible for protecting their organisation's information assets

Useful Info

  • Home
  • Companies that interest me

Friday, 8 May 2020

NIST Zero Trust Architecture

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207-draft2.pdf

Posted by Tony Brown at 09:24 2 comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest

Identity Defined Security Alliance

https://www.idsalliance.org



Posted by Tony Brown at 08:27 No comments:
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Security News

  • IT SECURITY GURU
    The Human Side of Cybersecurity – KnowBe4
    17 minutes ago
  • The Hacker News
    New 'FabricScape' Bug in Microsoft Azure Service Fabric Impacts Linux Workloads
    25 minutes ago
  • The Register - Security
    Microsoft postpones shift to New Commerce Experience subscriptions
    2 hours ago
  • Cybersecurity Insiders
    Kubernetes misconfiguration may lead to data hacks
    3 hours ago
  • Security Boulevard
    The Role of IAM in Maintaining Cloud Security
    5 hours ago
  • Techdirt.
    Dairy Queen Loses On ‘Blizzard Water’ Trademark Suit With W. B. Mason
    6 hours ago
  • Risky Business
    Risky Business #669 -- Finally, an ICS attack that made stuff explode!
    8 hours ago
  • Latest news and stories from BleepingComputer.com
    Windows 10 KB5014666 update brings new printing features, bug fixes
    10 hours ago
  • Dark Reading:
    Facebook Business Pages Targeted via Chatbot in Data-Harvesting Campaign
    11 hours ago
  • SecurityWeek RSS Feed
    Normalyze Announces $22 Million for DSPM Technology
    13 hours ago
  • Light Reading:
    Colt, Versa team up on SASE
    13 hours ago
  • Krebs on Security
    The Link Between AWM Proxy & the Glupteba Botnet
    14 hours ago
  • Cisco Blog
    How to Invest in Middle Mile Networks to Bridge the Digital Divide
    15 hours ago
  • Latest Security Articles from ComputerworldUK
    BrandPost: Does your PC fleet fully support your remote users?
    15 hours ago
  • Daniel Miessler
    The Cybersecurity Skills Gap is Another Instance of Late-stage Capitalism
    15 hours ago
  • ComputerWeekly: IT security
    hardware security
    16 hours ago
  • Graham Cluley
    Carnival Cruises bruised by $6.25 million fine after series of cyberattacks
    16 hours ago
  • CSO Online
    Russian DDoS attack on Lithuania was planned on Telegram, Flashpoint says
    17 hours ago
  • SearchSecurity: Security Wire Daily News
    Cisco Talos techniques uncover ransomware sites on dark web
    17 hours ago
  • Latest topics for ZDNet in Security
    Dragonbridge influencers targets rare earth miners, encourages protests to disrupt production
    18 hours ago
  • Threatpost | The first stop for security news
    Top Six Security Bad Habits, and How to Break Them
    19 hours ago
  • Schneier on Security
    When Security Locks You Out of Everything
    21 hours ago
  • IBTimes.co.uk : Technology
    Murdered Rapper's Song Pulled From YouTube In India
    1 day ago
  • Troy Hunt
    Weekly Update 301
    4 days ago
  • Motherboard US - Hacking US
    Microsoft Compares Russian Hacks of Ukraine to Assassination That Started World War I
    4 days ago
  • Cybersecurity
    $100 million worth of crypto has been stolen in another major hack
    4 days ago
  • Cybercrime Magazine
    Scenes From The World’s Largest Cybersecurity Conference
    5 days ago
  • Hacker Combat - Cyber Security and Hacking News | HackerCombat
    The Great Resignation in the Tech Sector and Tips to Solve the Issue
    5 days ago
  • Google Online Security Blog
    Game on! The 2022 Google CTF is here.
    1 week ago
  • Cybercrime | The Guardian
    Five Eyes must ramp up fight against rising organised crime, AFP commissioner warns
    2 weeks ago
  • EFF Press Releases
    Hearing Wednesday: EFF Testifies Against SFPD for Violating Transparency Laws
    3 weeks ago
  • Softpedia News / Security
    Mozilla Releases Firefox 100.0.2 With Critical Security Fixes
    5 weeks ago
  • NCSC Site
    Putting staff welfare at the heart of incident response
    1 month ago
  • Errata Security
    No, a researcher didn't find Olympics app spying on you
    4 months ago
  • Security Intelligence
    Active Ransomware Recovery: Five Steps for Success
    5 months ago
  • DDoS Attacks
    Link11 Discovers Record Number of DDoS Attacks in First Half of 2021
    11 months ago
  • News – SC Media
    Microsoft warns zero-day in SolarWinds Serv-U software being exploited by Chinese threat group
    11 months ago
  • Feedspot Blog
    Top 5 Ayurveda Forums, Discussions, Message Boards To Follow in 2021
    1 year ago
  • Computer Business Review
    Network transformation: The foundation for digital business
    1 year ago
  • RSA Conference Blog
    A WORD OF CAUTION: AVOID SCAMMERS CLAIMING TO HAVE THE RSAC ATTENDEE LIST
    1 year ago
  • Bad Packets Report
    Over 3,000 F5 BIG-IP endpoints vulnerable to CVE-2020-5902
    1 year ago
  • Cybersecurity Zen
    SecureNinja ▶︎ Live Instructor-Led Online Training
    2 years ago
  • Ars Technica » Risk Assessment
    What the newly released Checkra1n jailbreak means for iDevice security
    2 years ago
  • US-CERT Tips
    Privacy and Mobile Device Apps
    2 years ago
  • Infosecurity Europe Blog
    Infosecurity Magazine takes over Infosecurity North America 2018
    3 years ago
  • CRN
    WATCH: Digital Guardian Exec On How Its Move To The Cloud Benefits Partners
    3 years ago
  • SecurityRoundTable.org
    Why A ‘Cloud Architect’ Should Be on Your Hiring Agenda
    4 years ago
  • WIRED » Threat Level
    Feds Charge NSA Contractor Accused of Exposing Russian Hacking
    5 years ago
  • Security | The Silicon Review
    Is it true that internet has penetrated only to handful of the Indian population?!
    5 years ago
  • Latest articles from SC Magazine UK
    400% increase in POS malware variants across US Thanksgiving weekend
    5 years ago
  • Blog - devsecops
    DevSecOps is the Krav Maga of Security
    5 years ago
  • Forbes - Security
    FTC: Explosion Of Tax Identity Theft Swamps Growth In Other Consumer Complaints
    9 years ago
  • AlienVault Blogs
Show 10 Show All

Vendors

  • Anomali Blog
    Anomali Cyber Watch: API Hammering Confuses Sandboxes, Pirate Panda Wrote in Nim, Magecart Obfuscates Variable Names, and More
    13 hours ago
  • Rapid7 Blog
    For Ransomware Double-Extorters, It's All About the Benjamins — and Data From Healthcare and Pharma
    14 hours ago
  • AWS Security Blog
    TLS 1.2 to become the minimum TLS protocol level for all AWS API endpoints
    15 hours ago
  • Cisco Blog » Security
    Cisco Talos Supports Ukraine Through Empathy
    16 hours ago
  • Imperva Cyber Security Blog
    Why a “Lift-and-shift” Cloud Migration Strategy Doesn’t Support Data Security
    19 hours ago
  • The Akamai Blog
    Akamai?s Observations of Confluence Zero Day (CVE-2022-26134)
    19 hours ago
  • CloudFlare
    Hertzbleed explained
    19 hours ago
  • Malwarebytes Unpacked
    City worker loses USB stick containing data on every resident after day of drinking
    20 hours ago
  • Heimdal Security Blog
    CafePress Was Fined $500,000 Following Major Data Breach
    21 hours ago
  • Packet Pushers - Briefings In Brief
    Tech Bytes: Maximize Network Data With Nokia’s Streaming Telemetry (Sponsored)
    1 day ago
  • Naked Security
    Harmony blockchain loses nearly $100M due to hacked private keys
    1 day ago
  • SentinelOne
    Securing the Nation’s Critical Infrastructure | Action Plans to Defend Against Cyber Attacks
    1 day ago
  • We Live Security » Languages » English
    5 ways cybercriminals steal credit card details
    1 day ago
  • ThreatConnect | Enterprise Threat Intelligence Platform
    How Software Vendors Can Leverage Cyber Threat Intelligence for Threat Hunting
    4 days ago
  • Palo Alto Networks Blog
    Presidio and Palo Alto Networks Secure Hybrid Workforces with ZTNA 2.0
    4 days ago
  • CyberArk
    Trust, Patient Empowerment and Data: Insights From Takeda’s Chief Digital Trust Officer  
    4 days ago
  • Tenable Blog
    OT:ICEFALL Research from Forescout Explores Insecure-by-Design State of Operational Technology
    5 days ago
  • ClearSky Cybersecurity
    Lyceum suicide drone
    5 days ago
  • Darktrace Blog
    How cyber criminals are cashing in on crypto
    1 week ago
  • Darktrace Blog
    How cyber criminals are cashing in on crypto
    1 week ago
  • Centrify Cloud Service Status - Incident History
    Microsoft Patch Issue
    1 week ago
  • Check Point Blog
    Enhanced Phishing Detection with Post-Onboarding Learning Mode
    4 weeks ago
  • Securosis Highlights
    SOC 2025: Operationalizing the SOC
    2 months ago
  • Varonis Blog
    Defending Your Cloud Environment Against LAPSUS$-style Threats
    2 months ago
  • Arbor Networks Threat Intelligence
    DDoS Threat Landscape - Russia
    3 months ago
  • Postmodern Security
    Why Your Security Program Is Failing
    3 months ago
  • blog.trendmicro.co.uk
    Delivering visibility, control and simplified security to Bathgate Group 
    3 months ago
  • Errata Security
    No, a researcher didn't find Olympics app spying on you
    4 months ago
  • Fooling the Interpreter
    XSS With Hoisting
    5 months ago
  • TrendLabs Security Intelligence Blog
    Finest Free Torrenting VPNs
    6 months ago
  • AlienVault Blogs
    This feed has moved and will be deleted soon. Please update your subscription now.
    10 months ago
  • TaoSecurity
    Zeek in Action Videos
    10 months ago
  • Carbon Black
    VMware Carbon Black Delivers High-Fidelity Insight at Every Step of MITRE Engenuity ATT&CK® Evaluation
    1 year ago
  • CipherCloud
    CipherCloud and Lookout Blaze a New Path Together – Redefining Security from Endpoint to Cloud
    1 year ago
  • Recorded Future
    Behind the Scenes of a Brand Protection Takedown
    1 year ago
  • Inside The Threat Blog by Lancope
    This feed has moved and will be deleted soon. Please update your subscription now.
    1 year ago
  • Skybox Security Blog – Cybersecurity from The Skybox View
    Salt Vulnerabilities Exploited with Targeted Cryptomining Attack on DigiCert
    2 years ago
  • Zscaler Research
    Frenchy – Shellcode in the Wild
    2 years ago
  • Cisco Blog » Threat Research
    How Adversaries Use Politics for Compromise
    2 years ago
  • Preempt Blog
    Why Insider Threat Denial is Everyone’s Problem
    2 years ago
  • Network Security Blog
    Lucky Break
    3 years ago
  • Threat Research
    BIOS Boots What? Finding Evil in Boot Code at Scale!
    3 years ago
  • Threat Intelligence
    Lojack Becomes a Double-Agent
    4 years ago
  • Speaking of Security - The RSA Blog and Podcast
    A Security Decision – Build or Buy
    4 years ago
  • Metasploit
    Metasploit Wrapup
    4 years ago
  • Threat Geek
    Reducing Detection from Months to Minutes: Detecting Credentials in the Clear
    5 years ago
  • Lockheed Martin Cybersecurity Blog
    How Threat Intelligence Can Increase an Organization’s Cybersecurity Maturity
    5 years ago
  • iSIGHT Partners
    ThreatScape Media Highlights Update – Week Of June 8th
    6 years ago
  • Liquidmatrix Security Digest
    Hello world!
    6 years ago
  • LogRhythm: The Dialog - The Security Intelligence Company
    Getting Started with Threat Intelligence
    6 years ago
  • IBM Internet Security Systems Internet Threat Information
    Multiple Adobe Flash Player code execution vulnerabilities
    7 years ago
  • Our Blog | Core Security
  • Comments on: The Top 10 AlgoSec Blog Posts From 2018
  • Farsight Security Blog
  • Trustwave Newsroom
  • Fortinet Blog
  • Cyphort
  • Cylance Blog
Show 10 Show All

Blog Archive

  • ▼  2020 (2)
    • ▼  May (2)
      • NIST Zero Trust Architecture
      • Identity Defined Security Alliance
  • ►  2019 (35)
    • ►  December (2)
    • ►  November (2)
    • ►  October (6)
    • ►  September (5)
    • ►  August (1)
    • ►  June (1)
    • ►  February (4)
    • ►  January (14)
  • ►  2018 (4)
    • ►  December (2)
    • ►  September (1)
    • ►  April (1)
  • ►  2017 (6)
    • ►  August (5)
    • ►  July (1)
  • ►  2016 (1)
    • ►  January (1)
  • ►  2015 (4)
    • ►  September (4)
  • ►  2013 (3)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)

About Me

Tony Brown
Enterprise Security Solutions Architect at global service provider. CCIE #8767. CISSP. Chartered Engineer. MSc. in Information Security. CCDE 2011:6 Chartered IT Professional. Member of the Institute of Information Security Professionals. Blah blah blah
View my complete profile
Awesome Inc. theme. Powered by Blogger.