Check out the NCSC’s call for software vendors to make their products more secure. Plus, why the Treasury Department is looking at how financial institutions are using AI. And the latest on the cybersecurity skills gap in the U.S. And much more!
Dive into six things that are top of mind for the week ending June 14.
Software vendors improve the security of their products.
That’s the goal of the U.K. National Cyber Security Centre’s new “Code of Practice for Software Vendors.” The document from the U.K.’s cybersecurity agency outlines a minimum baseline of secure development processes for software vendors.
Compliance with the “Code of Practice for Software Vendors” is voluntary for now “but further policy interventions to support its uptake and impact are currently being explored,” reads the NCSC blog “Raising the cyber resilience of software 'at scale.'”
The document is structured around four core principles software vendors should follow:
The “Code of Practice for Software Vendors” also includes implementation guidance for its best practices and recommendations.
For more information about the security of commercial software products:
What obstacles to responsible use of artificial intelligence (AI) do financial institutions face? How is AI impacting their operations? And when banks use AI, how does that affect their consumer and corporate customers, as well as their investors and other third parties?
These are some of the questions the U.S. Treasury Department is seeking answers to. To that end, it has issued a formal request for information about how the financial services sector is using AI.
If you want to contribute to this fact-finding effort, check out the formal document titled “Request for Information on Uses, Opportunities, and Risks of Artificial Intelligence in the Financial Services Sector” and add your comment on the Regulations.gov website.
“Treasury is seeking a broad range of perspectives on this topic and is particularly interested in understanding how AI innovations can help promote a financial system that delivers inclusive and equitable access to financial services,” reads a Treasury Department statement.
For more information about AI usage trends in the financial services sector:
Looking for insights about how the cyber insurance market is evolving? Data released by insurance broker Marsh McLennan offers interesting clues about this dynamic market.
For starters, the 1,800-plus claims submitted by its U.S. and Canadian customers in 2023 were a record for Marsh McLennan. Drivers included the growing sophistication of attacks, the exploitation of the MOVEit Transfer vulnerabilities, privacy-related claims and an increase in cyber insurance customers.
Unsurprisingly, ransomware remains top-of-mind for insurance companies and for their customers, although it accounted for under 20% of total claims. Ransomware concern centers on its potential for significant financial losses, reputation harm, lost sales, litigation costs, regulatory scrutiny and more, according to the insurer.
More interesting data points include:
Also of note, the percentage of organizations paying ransoms remains on a downward trend.
(Source: Marsh McLennan, June 2024)
Ultimately, it’s key for organizations to continually boost their cybersecurity strategy and controls.
“Organizations’ cyber resilience strategy should incorporate a view of cyber risk across the enterprise, including its potential economic and operational impact and taking account of cybersecurity at vendors and other third parties,” reads a Marsh McLennan statement.
To learn more about cyber insurance, check out these Tenable resources:
With generative AI adoption on fire in the enterprise, Tenable took the opportunity to poll attendees at several of our webinars this month about this topic. Specifically, we asked them whether their organizations have crafted usage policies for generative AI applications. Check out the results!
(377 webinar attendees polled by Tenable, June 2024)
For more information about this topic:
The U.S. needs more than 220,000 new cybersecurity pros to close its cyber talent gap. Currently, the U.S. has enough cyber workers to fill 85% of cybersecurity jobs.
That’s according to CyberSeek, which provides data about the cybersecurity job market. It’s a joint initiative between the National Institute of Standards and Technology’s NICE program; Lightcast; and CompTIA.
“Although demand for cybersecurity jobs is beginning to normalize to pre-pandemic levels, the longstanding cyber talent gap persists,” Will Markow, vice president of applied research at Lightcast, said in a CompTIA statement about the CyberSeek data.
To address the skills gap, employers should try training less experienced cybersecurity pros to perform advanced jobs, as well as consider candidates who have cybersecurity expertise but who only have a professional certification, according to CompTIA.
Other interesting insights include:
For more information about the cyber skills shortage in the U.S. and globally:
The Center for Internet Security has announced the latest batch of updates for its popular CIS Benchmarks, including new secure-configuration recommendations for Amazon Elastic Kubernetes Service, Google Container-Optimized OS and Microsoft SQL Server.
Specifically, these CIS Benchmarks were updated in May:
In addition, CIS released brand new Benchmarks for Apple’s macOS 12, macOS 13 and macOS 14 running in a cloud environment.
CIS Benchmarks are secure-configuration guidelines for hardening products against attacks. Currently, CIS offers more than 100 Benchmarks for 25-plus vendor product families. There are Benchmarks for cloud platforms; databases; desktop and server software; mobile devices; operating systems; and more.
To get more details, read the CIS blog “CIS Benchmarks June 2024 Update.” For more information about the CIS Benchmarks list, check out its home page, as well as:
Juan has been writing about IT since the mid-1990s, first as a reporter and editor, and now as a content marketer. He spent the bulk of his journalism career at International Data Group’s IDG News Service, a tech news wire service where he held various positions over the years, including Senior Editor and News Editor. His content marketing journey began at Qualys, with stops at Moogsoft and JFrog. As a content marketer, he's helped plan, write and edit the whole gamut of content assets, including blog posts, case studies, e-books, product briefs and white papers, while supporting a wide variety of teams, including product marketing, demand generation, corporate communications, and events.
Enter your email and never miss timely alerts and security guidance from the experts at Tenable.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
100 assets
Choose Your Subscription Option:
Thank you for your interest in Tenable Vulnerability Management. A representative will be in touch soon.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
100 assets
Choose Your Subscription Option:
Thank you for your interest in Tenable.io. A representative will be in touch soon.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
100 assets
Choose Your Subscription Option:
Thank you for your interest in Tenable Vulnerability Management. A representative will be in touch soon.
Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.
Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.
Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.
Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.
Thank you for your interest in Tenable Lumin. A representative will be in touch soon.
Please fill out this form with your contact information.
A sales representative will contact you shortly to schedule a demo.
* Field is required
Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.
Continuously detect and respond to Active Directory attacks. No agents. No privileges.
On-prem and in the cloud.
Exceptional unified cloud security awaits you!
We’ll show you exactly how Tenable Cloud Security helps you deliver multi-cloud asset discovery, prioritized risk assessments and automated compliance/audit reports.
Exposure management for the modern attack surface.
Know the exposure of every asset on any platform.
Thank you for your interest in Tenable Attack Surface Management. A representative will be in touch soon.
FREE FOR 7 DAYS
Tenable Nessus is the most comprehensive vulnerability scanner on the market today.
Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.
Fill out the form below to continue with a Nessus Pro Trial.
Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.
Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.
FREE FOR 7 DAYS
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.
Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.
Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.