Your Cyber Response Plan Needs These 6 Components. AsisOnline.org opinion piece by Lesley Carhart. “The following items are essential components of incident response planning and documentation. Each one must be completed to some degree to facilitate incident response. If they are not completed, they must be performed ad hoc at the beginning of any substantial incident effort, and their absence may lead to confusion and mistakes. I highly recommend reviewing what you have complete, what you have not completed but can do as a relatively light lift, and actions which will require more time and projectization.” Read before your cyber incident for most effect.
McConnell, McCarthy public splits raise questions about ability to govern. TheHill.com article. An interesting look at the potential leadership of the 118th Congress. Pull quote: “Scott Jennings, a Republican strategist who has advised McConnell’s past campaigns, said the two leaders “have a good working relationship,” but he acknowledged they “have to maneuver around each other” because of “the vast differences of their conferences.””
Hacktivists Force Companies to Respond to Low-Level Cyberattacks. WSJ.com article. Pull quote: ““It’s sort of an attack on legitimacy,” said John Hultquist, vice president of intelligence analysis at cybersecurity firm Mandiant. Denial-of-service attacks seldom affect a company’s operations or sensitive data, but hackers recognize they still get public attention, he said.”
Enemy Above the Gates. AFCEA.org article.
Pull quote: ““Current statute makes it illegal for state and local law
enforcement to intercept communications or access a computer without
authorization,” Rep. Peter Meijer (R-MI) said at a hearing in March 2022. “The
existing restrictions on local law enforcement make it nearly impossible to
track down the operator of a drone.”” Lots of misunderstanding evident in this
article.
No comments:
Post a Comment