Read the e-book |
As cloud computing continues its global expansion, security teams must adapt and find new ways to keep digital estates protected. That’s why it’s essential to build an identity and access management (IAM) strategy that can govern identities, manage permissions, and mitigate risks across any multicloud or hybrid environment. Learn more about a continuous, cloud-based approach to identity management. Read the e-book, Evolving Identity and Access Management for the Multicloud World, to: Understand how unmanaged permissions increase your risk of a breach.Discover the benefits of an integrated, scalable, cloud-native approach to identity management.See how the cloud infrastructure entitlement management (CIEM) lifecycle approach helps discover, remediate, and monitor risks continuously.Explore the capabilities of a decentralized identity solution. |
Author: blogmirnet
NIST Publishes Recommendations for Federal Vulnerability Disclosure Guidelines: NIST SP 800-216 Now Available
Internal and external reporting of security vulnerabilities in software and information systems owned or utilized by the Federal Government is critical to mitigating risk, establishing a robust security posture, and maintaining transparency and trust with the public. Formalizing actions to accept, assess, and manage vulnerability disclosure reports can help reduce known security vulnerabilities and exposures.
NIST Special Publication (SP) 800-216, Recommendations for Federal Vulnerability Disclosure Guidelines, describes a flexible, unified framework for establishing policies and implementing procedures for reporting, assessing, and managing vulnerability disclosures for systems within the Federal Government. Per the Internet of Things Cybersecurity Improvement Act of 2020 (Public Law 116-207) and in alignment with ISO/IEC 29147 and ISO/IEC30111, these guidelines address:
- The establishment of a federal vulnerability disclosure framework, including the Federal Coordination Body (FCB) and Vulnerability Disclosure Program Offices (VDPOs)
- The receipt of information about potential security vulnerabilities in information systems owned or controlled by a government agency
- The dissemination of information about security vulnerability resolutions to government agencies and the public
NIST led this government-wide effort in coordination with other agencies, including the Office of Management and Budget (OMB), the Department of Defense (DoD), and the Department of Homeland Security (DHS). Please contact [email protected] with any questions.
Read More
The NCCoE Buzz: The Benefits of Mobile Device Management
The Benefits of Mobile Device Management The NCCoE Buzz: Mobile Security Edition is a recurring email on timely topics in mobile device cybersecurity and privacy from the National Cybersecurity Center of Excellence’s (NCCoE’s) Mobile Device Security project team. ![]() |
#StopRansomware Guide
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) published an updated version of the #StopRansomware Guide , as ransomware actors have accelerated their tactics and techniques since its initial release in 2020. The update incorporates lessons learned from the past two years and includes additional recommended actions, resources, and tools to maximize its relevancy and effectiveness and to further help reduce the prevalence and impacts of ransomware. |
The #StopRansomware Guide serves as a one-stop resource to help organizations reduce the risk of ransomware incidents through best practices to detect, prevent, respond, and recover, including step-by-step approaches to address potential attacks. The authoring organizations recommend that entities review this joint guide to prepare and protect their facilities, personnel, and customers from the impacts of ransomware and data exfiltration. For more information and to access the latest resources about how to stop ransomware, please visit stopransomware.gov. |
This joint guide was developed through the Joint Ransomware Task Force (JRTF), an interagency collaborative effort to reduce the prevalence and impact of ransomware attacks. JRTF was established by Congress in 2022 and is co-chaired by CISA and FBI. For additional information about the JRTF, please visit CISA’s newly launched Joint Ransomware Task Force webpage. |
NICE Webinar: Community-Based Partnerships for Cybersecurity
Synopsis
The Department of Commerce’s workforce development agenda is guided by a set of best practices and principles that values workforce investments. These workforce investments are employer-led to connect skilled workers to quality job opportunities, guided by multiple community partners such as educational institutions and economic development organizations, and lead to stackable, industry-recognized credentials. Cybersecurity workforce needs exist in every sector of the economy; therefore, cross-sector and community-supported partnerships must align with the skill needs of industries in the regional or local economy. This webinar will explore the foundations for creating multistakeholder, community-based partnerships that can lead to good jobs in cybersecurity.
Microsoft Azure Virtual Training Day: Fundamentals
![]() |
Build skills that help you create new technology possibilities and explore foundational cloud concepts at Azure Virtual Training Day: Fundamentals from Microsoft Learn. Join us for this free training event to expand your knowledge of cloud models and cloud service types. You’ll also review Azure services focused on computing, networking, and storage. You will have the opportunity to: Understand the value of the shared responsibility model between consumers and cloud providers. Identify the tools and services that can help you manage, secure, and stay compliant across your Azure cloud ecosystem and in on-premises, hybrid, and multicloud environments. See how to use Azure services to rapidly expand your cloud footprint while maintaining data security and privacy. Join us at an upcoming two-part event: Delivery Language: English Closed Captioning Language(s): English 14th and 15th June 11:00 AM – 1:45 PM 11:00 AM – 2:00 PM | (GMT-08:00) Pacific Time (US & Canada) 26th and 27th June 10:00 AM – 12:45 PM 10:00 AM – 1:00 PM | (GMT-05:00) Eastern Time (US & Canada) Visit the Microsoft Virtual Training Days website to learn more about other event opportunities. |
Cloud Native Infrastructure with Microsoft Azure
Take full advantage of the flexibility and scalability of the cloud with a modern cloud-native infrastructure. Read the O’Reilly e-book, Cloud Native Infrastructure with Azure, to learn how to adapt your applications early in the design phase to get the most out of the cloud. Plus, get best practices for how to use, deploy, and maintain cloud-native technology components effectively with Azure.
Read the e-book to learn how to:
- Build and manage cloud-native applications.
- Determine the right technology for different infrastructure design stages.
- Anticipate challenges you may face while managing and operating cloud-native infrastructure and learn about technologies that can help you overcome them.
Go here to register to get the free book.
Invitation to the Azure Cosmos DB Roadshow Series: Empower Your Skills in the AI Era
Join other Software Architects and Technical Decision Makers, Microsoft technical experts, and partners to discuss and learn how to reimagine data strategies for cloud-native, intelligent apps. This two-day event will offer technical insights, share real-world success stories, and dive into the technical underpinnings of robust data strategies for modern applications built in the cloud.
Our Azure Cosmos DB team will be visiting the following cities:
- Dallas: May 31 – June 1
- Silicon Valley: June 5 – 6
- Irvine, CA: June 8 – 9
- Chicago: June 12 – 13
- Atlanta: June 19 – 20
- Toronto: June 22 – 23
- New York, NY: June 26 – 27
Your options over the two days include:
Day & Time | Title | Description |
Leading in the age of Intelligent Apps Strategy Workshop | Get an update from data experts from Microsoft. Use this as an opportunity to ask questions and explore strategies for powering modern apps with scalable and high-performance cloud data using Azure Cosmos DB. | |
Azure Cosmos DB for NoSQL technical workshop (2-day workshop) | Join technical experts who will work with you to dive deep into the -how- of building modern apps with cloud-scale data using Azure Cosmos DB. This is a combination of instruction and hands on labs. | |
Azure Cosmos DB for PostgreSQL technical workshop | Join technical experts who will work with you to dive deep into the how of building modern apps with cloud-scale data using Azure Cosmos DB. This is a combination of instruction and hands on labs. | |
Whiteboarding 1:1 session |
Critical Privilege Escalation in Essential Addons for Elementor Plugin Affecting 1+ Million Sites
This blog post is about the Essential Addons for Elementor plugin vulnerability. If you’re a Essential Addons for Elementor user, please update the plugin to at least version 5.7.2.
The security vulnerability in Essential Addons for Elementor
This plugin suffers from an unauthenticated privilege escalation vulnerability and allows any unauthenticated user to escalate their privilege to that of any user on the WordPress site.
It is possible to reset the password of any user as long as we know their username thus being able to reset the password of the administrator and login on their account. This vulnerability occurs because this password reset function does not validate a password reset key and instead directly changes the password of the given user. The described vulnerability was fixed in version 5.7.2 and assigned CVE-2023-32243.
To read the full story go here
NCCoE Seeks Collaborators for New DevSecOps Project
Become a Collaborator on the NCCoE Software Supply Chain and DevOps Security Practices Project
The National Cybersecurity Center of Excellence (NCCoE) has issued a Federal Register Notice (FRN) inviting industry participants and other interested collaborators to participate in the Software Supply Chain and DevOps Security Practices project. This NCCoE DevSecOps project will focus on developing and documenting an applied risk-based approach and recommendations for DevSecOps practices.
There are two ways to join the NCCoE for this project:
- Become an NCCoE Collaborator – Collaborators are members of the project team that work alongside the NCCoE staff to build the demonstration by contributing products, services, and technical expertise.
- Get Started Today – If you are interested in becoming an NCCoE collaborator for the Software Supply Chain and DevOps Security Practices project, first review the requirements identified in the Federal Register Notice. To become a collaborator, visit the project page to see the final project description and request a Letter of Interest (LOI) template–you will then receive a link to download the LOI template. Complete the LOI template and send it to the NCCoE DevSecOps team at [email protected].
- Join our Community of Interest – By joining the NCCoE DevSecOps Community of Interest (COI), you will receive project updates and the opportunity to share your expertise to help guide this project. Request to join our DevSecOps COI by visiting our project page.
If you have any questions, please contact our project team at [email protected].