Remove Architecture Remove Cybersecurity Remove Whitepaper
article thumbnail

Safety and Security in Automated Driving

Adam Shostack

Safety First For Automated Driving " is a big, over-arching whitepaper from a dozen automotive manufacturers and suppliers. One way to read it is that those disciplines have strongly developed safety cultures, which generally do not consider cybersecurity problems. Lets explore the risks associated with Automated Driving.

Risk 189
article thumbnail

WHITEPAPER: Authentication Does Not Equal Zero Trust

Security Boulevard

Many vendor claims are unclear as to what they’re promising in this space, but they are quite insistent that without Zero Trust network architectures, organizations are at great risk for data breaches and other network sabotage. The post WHITEPAPER: Authentication Does Not Equal Zero Trust appeared first on Security Boulevard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Safety and Security in Automated Driving

Adam Shostack

“ Safety First For Automated Driving ” is a big, over-arching whitepaper from a dozen automotive manufacturers and suppliers. One way to read it is that those disciplines have strongly developed safety cultures, which generally do not consider cybersecurity problems.

Risk 140
article thumbnail

10 Cybersecurity Trends That Emerged in 2023

Security Boulevard

It’s a thrilling time to work in cybersecurity, but new technology and unprecedented opportunities also present us with extraordinary challenges. One such variety, ransomware, is a “trend” that has provoked cybersecurity teams for years. Apparently, an employee at Company X used an LLM to help them finish a whitepaper.

article thumbnail

MITRE ATT&CK: The Magic of Application Mitigations

Cisco Security

Today’s application architectures support fast, continuous innovation. Back end architectures use small, independent code modules called microservices. Clearly today’s application architectures use a lot of components, making them more complex, but the benefits run deep. They were simpler, sure, but so are horse-drawn carriages.

article thumbnail

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation

Security Boulevard

Can the cybersecurity industry learn anything from the problems encountered with the move from the deprecated SHA-1 to the stronger and safer SHA-2 hashing algorithm? NIST has developed a whitepaper which outlines the steps for migration to post-quantum cryptography. Prepare a quantum-safe architecture now. brooke.crothers.

article thumbnail

Establishing Security Maturity Through CIS Cyber Defense Framework

McAfee

In this blog we set out to see how choosing the correct security controls framework can go a long way in establishing a secure foundation, which then allows Enterprise security designers/decision makers to make more informed solution choices while selecting the controls and vendor architectures.