Skip to main content

CyberScoop.com.

"Here's what CISA could look like under Kristi Noem."

Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Accessed on 21 January 2025, 2129 UTC.

Content and Source:  Email subscription from "CyberScoop.com."

 https://mail.google.com/mail/u/0/#inbox/FMfcgzQZSjlBxjlcRqlXQJLZLmxbsnfp

please check link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).

CyberScooplinkedin facebook X


TUESDAY, JAN. 21, 2025
Kristi Noem gives hints on how CISA will look under her leadership. TSA extends cybersecurity regulations for pipelines. And a thought leader examines how those regulations can be worked into critical infrastructure's cybersecurity posture. This is CyberScoop for Tuesday, January 21.
feature image

South Dakota Gov. Kristi Noem, President-elect Donald Trump’s nominee for Secretary of the Department of Homeland Security, speaks during her confirmation hearing before the Homeland Security and Governmental Affairs Committee on Capitol Hill on Friday. (Photo by Eric Thayer/Getty Images)

Kristi Noem's vision for CISA

Kristi Noem, nominee for Department of Homeland Security secretary, stated her commitment to remove the department from disinformation efforts and pledged to streamline CISA's operations. Her comments reflect the incoming Trump administration's intention to address concerns that federal agencies have curtailed free speech, particularly regarding election security and COVID-19. This approach aligns with criticisms from GOP senators, who argue that CISA has strayed from its core mission and have suggested either limiting its authority or eliminating it due to perceived mission overreach. Tim Starks has more.


92% of Ransomware Attacks Originate From Unmanaged Devices.

To lower that percentage in 2025, your organization must ensure that only secure, compliant devices can access critical company resources. Join 1Password’s upcoming webinar to discover how to ensure that only trusted devices can authenticate.



TSA extends cybersecurity requirements for pipeline owners

The Transportation Security Administration (TSA) is extending two security directives for another year with updates to enhance cybersecurity and address emerging threats. These directives require pipeline operators to implement TSA-approved cybersecurity plans and focus on performance-based outcomes, allowing operators to choose suitable security measures. The updates come amidst increasing threats, such as Chinese-sponsored hacking and the Russia-Ukraine conflict, although industry representatives have criticized the directives as burdensome, finding support among Republicans in the government. Matt Bracken reports.


Speaking of pipeline security...

In an op-ed for CyberScoop, Axio's Richard Caralli discusses the increasing prevalence of cyberattacks on critical infrastructure, emphasizing the need for updated cybersecurity strategies. Traditional qualitative cyber risk management approaches are deemed insufficient for modern threats, advocating instead for a consequence-driven and quantitative risk framework that expresses risks in financial terms to guide strategic cybersecurity decisions. Cyber Risk Quantification (CRQ) is presented as an effective method to evaluate cybersecurity investments, ensuring they align with enterprise priorities, meet regulatory demands such as those proposed by the TSA, and ultimately bolster an organization’s proactive cybersecurity posture. Read the full op-ed here.


92% of Ransomware Attacks Originate From Unmanaged Devices.

To lower that percentage in 2025, your organization must ensure that only secure, compliant devices can access critical company resources. Join 1Password’s upcoming webinar to discover how to ensure that only trusted devices can authenticate.



Comments

Popular posts from this blog

The Cyberwire Daily Briefing

"Fortinet confirms breach of customer data." Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Accessed on 15 September 2024, 1339 UTC. Content and Source:   https://thecyberwire.com/newsletters/daily-briefing/13/176 Please check link or scroll down to read your selections.  Thanks for joining us today. Russ Roberts (https://www.hawaiicybersecurityjournal.net). V13 | Issue 176 | 9.13.24 Daily Briefing for 09.13.24 Announcement Cloud Security in the Age of Generative AI. Artificial Intelligence is revolutionizing business, but it also introduces new risks. Join us on Wednesday, September 18th at 2pm EDT for a compelling live webinar on "Good vs. Evil: Cloud Security in the Age of Generative AI" with N2K CyberWire’s Dave Bittner and Sysdig’s Loris Degioanni.  Learn more and register now . Summary By the CyberWire staff At a glance. Fortinet confirms breach of customer data. Iran's Scarred Manticore deplo...

Cyber War News Today.

"International Defence Cooperation:  A key to regional stability." Views expressed in this cybersecurity, cyber espionage, and cyber crime update are those of the reporters and correspondents.  Accessed on 15 December 2024, 0134 UTC. Content and Source:   https://cyberwar.einnews.com/news/cyber-war-news?n=2&code=FA9GNesSTpp2rjO1&utm_source=NewsletterNews&utm_medium=email&utm_campaign=Cyber+War+News&utm_content=navig Please check link or scroll down to read your selections.  Thanks for joining us today. Russ Roberts (https://www.hawaiicybersecurityjournal.net). Cyber War News Monitoring Get by    Email    •     RSS Published on  Dec 13, 2024 The Cyber Warfare Market Size Reach USD 127.1 Billion by 2032 Exhibiting CAGR at 13.3% WILMINGTON, DE, UNITED STATES, December 13, 2024 /⁨EINPresswire.com⁩/ -- According to the report, The Cyber Warfare Market Size Reach USD 127.1 Billion by 2032 Exhibiting CAGR at 1...

SecurityWeek Briefing

"New RAMBO attack allows air-gapped data theft." Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Accessed on 10 September 2024, 0035 UTC. Content and Source:  https://www.securityweek.com Please check link or scroll down to read your selections.  Thanks for joining us today. Russ Roberts (https://www.hawaiicybersecurityjournal.net).   Monday, September 9 , 2024 Are you worried about unmanaged devices and apps? LATEST CYBERSECURITY HEADLINES New RAMBO Attack Allows Air-Gapped Data Theft Predator Spyware Resurfaces With Fresh Infrastructure Google Pushes Rust in Legacy Firmware to Tackle Memory Safety Flaws 300,000 Impacted by Data Breach at Car Rental Firm Avis One Million US Kaspersky Customers Transferred to Pango’s UltraAV Two Indicted in US for Running Dark Web Marketplaces Offering Stolen Information Critical SonicWall Vulnerability Possibly Exploited in Ransomware Attacks CISA Breaks Silence on Controvers...