Remove 2016 Remove Authorization Remove Vulnerability
article thumbnail

Singing the Same Tune: The Case for Regulatory Harmonization

FS-ISAC

Compliance and reporting to regulatory authorities is another area where standardization plays an important role and can unlock considerable benefits for the different stakeholders. While cybercrime has been around for decades, the 2016 cyber heist against Bangladesh Bank was a watershed moment for financial authorities around the world.

article thumbnail

SIA New Member Profile: Resecurity

Security Industry Association

Gene Yoo : Resecurity was founded in 2016 out of a need for advanced threat intelligence and risk management in the industry. The researchers from Resecurity HUNTER team have identified critical vulnerabilities in software of major IT giants including Apple, Microsoft, Oracle, TP-Link and ASUS. Tell us the story of your company.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

School Security & Active Shooter Interdiction: A Q&A With Vince Riden

Security Industry Association

In 2016 I began my developing my patent, USPTO #11125537 B2, essentially an active shooter interdiction system. The views and opinions expressed in guest posts and/or profiles/Q&As are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association.

article thumbnail

Beware of the self-wiggling mouse – Water industry & Cyber

Plan B Consulting

This week I look at the risk of a cyber-attack and the importance of reviewing your vulnerability to water, wastewater and electricity loss. This week I thought I would talk about the vulnerability of water systems to cyber-attacks and some ideas of what, as business continuity professionals, we can do about this.

article thumbnail

Beware of the self-wiggling mouse – Water industry & Cyber

Plan B Consulting

This week I look at the risk of a cyber-attack and the importance of reviewing your vulnerability to water, wastewater and electricity loss. This week I thought I would talk about the vulnerability of water systems to cyber-attacks and some ideas of what, as business continuity professionals, we can do about this. Water industry 1995.

article thumbnail

Guest Post: Cybersecurity Incidents Lead to New Standards, Requirements

Security Industry Association

The two most significant recent incidents in the cybersecurity timeline were the Mirai botnet of 2016 and the SolarWinds breach of 2020. SSDF ensures that password complexity, authentication, encryption, software updates, and vulnerability management occur throughout a product’s life cycle. and parts of Europe.