Now NIST has incorporated these viewpoints into a second draft for Version 1.1 of its Framework. It's done so in the interest of meeting the demands of those that use the document to stay on top of the latest digital threats. The updates NIST made in Version 1.1 of its Framework (PDF) boil down to five major revisions.
CS Digest Section: Most Popular
Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of
More onboard cyber vulnerability has been revealed, with maritime cyber defence firm Naval Dome demonstrating yet more ways hackers can compromise ship safety.
An Amazon Web Services (AWS) S3 cloud storage bucket containing information from data analytics firm Alteryx has been found publicly exposed, comprising the personal information of 123 million US households.
The Pentagon will delay a Jan. 1 deadline for all of its suppliers to meet a set of new regulations largely designed to better protect sensitive military data and weapon blueprints.
Hackers likely working for a nation-state recently invaded the safety system of a critical infrastructure facility in a watershed attack that halted plant operations, according to cyber investigators and the firm whose software was targeted.
Harvard researchers have developed a specialized quantum computer, known as a quantum simulator, which could be used to shed new light on a host of complex quantum processes, from the connection between quantum mechanics and material properties to investigating new phases of matter and solving complex real-world optimization problems.
A Massive Resource for Cybercriminals Makes it Easy to Access Billions of Credentials.
Researchers at the Air Force Research Laboratory's Materials and Manufacturing Directorate, in partnership with Northeastern University, recently developed an ultra-compact antenna that uses a whole different approach in transmitting and receiving signals. This breakthrough could be a big step in the miniaturization of many military and commercial
When internet users visit Walgreens.com, a software company may record every keystroke, mouse movement, and scroll, potentially exposing medical conditions such as alcohol dependence, or the names of drugs a user has been prescribed, according to Princeton researchers.