ngrok unveiled its JavaScript and Python SDKs, enabling developers to programmatically serve their applications and manage traffic by embedding ingress with a single line of code.
The White House recently released its National Cybersecurity Strategy. This document outlines the government's plan to address growing concerns over cyberattacks and ransomware attacks. The administration recognizes cybersecurity as an ongoing consideration that will continue to grow in importance.
The strategy outlines two main tactics to accomplish continued data security for companies, individuals, and government agencies throughout the country:
1. Rebalance the responsibility to defend cyberspace.
2. Realign incentives to favor long-term investments.
The cybersecurity strategy outlines the groundwork for increased cyber defenses and alludes to potential regulations.
Here are three tips to align your cybersecurity strategy with the White House guidelines, to avoid any breaches that your organization may be held liable for.
1. Understand Your Responsibilities
You can't assume the government will save you from cyberattacks. Your own data security is your responsibility, especially in the case of a business holding customer information.
The strategy calls out this responsibility in section 3.1: "We must hold the stewards of our data accountable for the protection of personal data; drive the development of more secure connected devices; and reshape laws that govern liability for data losses and harm caused by cybersecurity errors, software vulnerabilities, and other risks created by software and digital technologies."
Companies that handle sensitive information are required to do all they can to protect it, otherwise it could cost them. This needs to be built into your data security strategy.
2. Know the Government's Role
The White House's strategy outlines five pillars in its approach:
1. Defend Critical Infrastructure: Gas, electric, and water systems will receive direct attention from the government, but will still need the cooperation of private enterprises.
2. Disrupt and Dismantle Threat Actors: Nation-state groups are frequent sources of cybercrime. The government will work to stop these threats.
3. Shape Market Forces to Drive Security and Resilience: Federal grants will be awarded to new infrastructure that is deemed secure.
4. Invest in a Resilient Future: Next-generation technologies will determine the stability of our networks. The White House aims to be a leader in secure innovation.
5. Forge International Partnerships to Pursue Shared Goals: A partnership will be formed with friendly countries to support a safe technological ecosystem for all.
3. Keep Your Eyes on the Future
This cybersecurity strategy does not immediately introduce any new laws or regulations, although it does hint at a few, and organizations shouldn't have to be forced to properly protect their data through the threat of fines and penalties, it should be a part of your bottom-line.
The systems you put in place today can save you from an incredibly costly data breach — the average cost for American companies is up to $9.44 million, according to IBM — in the near or distant future.
Communicating best practices, introducing automated DevSecOps tools, and hosting your network on-premises are just a few ways your organization can immediately begin strengthening your data security measures.
Our reliance on technology will keep growing as software continues to becomes more efficient. The White House's National Cybersecurity Strategy aims to put measures in place today that will protect our technological infrastructure from bad actors in the future. We can't be sure what these threats will be, but we can fortify our platforms to give ourselves the best chance at staying safe.
Industry News
Data Theorem introduced API Attack Path Visualization capabilities for the protection of APIs and the software supply chain.
Security Journey announced support for WCAG, SCIM and continued compliance with SOC2 Type 2, which are leading industry standards.
Vercel announced a new suite of features for its Developer Experience (DX) Platform, made for enterprise teams with large codebases.
Atlassian Corporation has completed the acquisition of Loom, a video messaging platform that helps users communicate through instantly shareable videos.
Orca Security announced that the Orca Cloud Security Platform has achieved the Amazon Web Services (AWS) Built-in Competency.
Parasoft, a global leader in automated software testing solutions, today announced complete support for MISRA C++ 2023 with the upcoming release of Parasoft C/C++test 2023.2.
Solo.io achieved the Amazon Elastic Kubernetes Service (Amazon EKS) Ready designation from Amazon Web Services (AWS).
CircleCI implemented a gen2 GPU resource class, leveraging Amazon Elastic Compute Cloud (Amazon EC2) G5 instances, offering the latest generation of NVIDIA GPUs and new images tailored for artificial intelligence/machine learning (AI/ML) workflows.
XM Cyber announced new capabilities that provide complete and continuous visibility into risks and vulnerabilities in Kubernetes environments.
PerfectScale has achieved the Amazon Elastic Kubernetes Service (Amazon EKS) Ready designation from Amazon Web Services (AWS).
BMC announced two new product innovations, BMC AMI DevX Code Insights and BMC AMI zAdviser Enterprise.
Rafay Systems announced the availability of the Rafay Cloud Automation Platform — the evolution of its Kubernetes Operations Platform — to enable platform teams to deliver automation and self-service capabilities to developers, data scientists and other cloud users.
Bitrise is integrating with Amazon Web Services (AWS) to provide compliance-conscious companies with greater access to CI/CD capabilities for mobile app development.
Armory announced a new unified declarative deployment capability for AWS Lambda.