New SEC cybersecurity rules brings new expectations: What You Need to Know and How to Prepare

The cybersecurity regulatory landscape is in a constant state of flux. Adhering to these regulations isn't merely about legal compliance; it's a pledge to protect their investors and assets against emerging threats. The Delay and Its Implications In 2023, the Securities and Exchange Commission (SEC) decided to delay the finalization of anticipated cybersecurity rules for investment advisers and funds. Originally forecasted for May 2023, an October release is now expected after an extended public commentary period. Highlighted in these upcoming rules are several pivotal elements, along with additional recommendations: 48-Hour Incident Notification Rule: Enforcing swift communication after security incidents to promote transparency. Disclosures must use Inline XBRL. This new reporting requirement likely will impose an increased burden on companies during what likely is a crisis situation. Documented Cybersecurity Risk Strategies: It's imperative for organizations to have a robust strategy in place. This ensures they proactively tackle and manage emerging cyber…

Comments Off on New SEC cybersecurity rules brings new expectations: What You Need to Know and How to Prepare

Volt Typhoon targets US Critical Infrastructure

Microsoft has discovered a clandestine, highly targeted cyberattack aimed at key infrastructure organizations within the United States. This assault is orchestrated by Volt Typhoon, a Chinese state-sponsored entity primarily involved in espionage and intelligence collection. With moderate certainty, Microsoft believes that this campaign by Volt Typhoon is designed to hamper critical communication infrastructure between the US and Asia in potential future crises. Volt Typhoon has been operational since the middle of 2021, launching attacks on key infrastructure organizations within Guam and other parts of the US. The campaign has impacted a range of sectors including communication, manufacturing, utilities, transportation, construction, maritime, government, IT, and education. The observed actions suggest a primary goal of the threat actor is to carry out espionage and maintain undetected access for an extended period. To fulfill their objectives, the attacker places a strong focus on stealth. They rely exclusively on 'living-off-the-land' techniques and direct keyboard…

0 Comments

Ryan Vargas and Critical Path Security to compete at the North Carolina Education Lottery 200 NASCAR Race!

Greetings to all! We're thrilled to share some exhilarating news with you all! Our own Ryan Vargas, a promising talent in the NASCAR racing scene, will be competing in the North Carolina Education Lottery 200 NASCAR Race, proudly representing Critical Path Security. The Unstoppable Ryan Vargas Ryan Vargas has shown an impressive trajectory in his NASCAR career, consistently demonstrating a rare blend of natural talent, determination, and competitive spirit that resonates with Critical Path Security's values. We couldn't be more proud to back this gifted driver who not only personifies speed on the racing track but also exudes passion and dedication towards the sport. The Race to Success The North Carolina Education Lottery 200 is one of the most awaited races on the NASCAR circuit, known for its high-octane energy and spectacular performances. Held at the world-renowned Charlotte Motor Speedway, this race has always been a captivating spectacle for racing…

0 Comments

Why Do You Need a Managed Security Service Provider (MSSP) and How Do You Choose the Right One?

The first thing we need to understand is the difference between MSP and MSSP vendors. A Managed Service Provider (MSP) or more commonly referred to as a Managed IT Provider focuses on uptime and the delivery of services of your end user systems and phone systems. They also are responsible for the buildout and ongoing maintenance of your network infrastructure. Some MSPs claim to provide cybersecurity services, however, antivirus and firewalls are only a small part of your cybersecurity initiatives, and with today's threat level, a more robust cybersecurity solution is highly recommended. MSSPs typically employ deeply experienced, higher trained analysts with corresponding certifications in cybersecurity, such as Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), CompTIA Security+ (SEC+), Certified Information Systems Auditor (CISA), Certified Information Systems Manager (CISM), and more. There are significant reasons why you need an MSSP monitoring your network. Let's look at what you…

0 Comments