Council Post: Prepare Your Security Program For CISA's Cybersecurity Strategic Plan

Malaysia News News

Council Post: Prepare Your Security Program For CISA's Cybersecurity Strategic Plan
Malaysia Latest News,Malaysia Headlines
  • 📰 ForbesTech
  • ⏱ Reading Time:
  • 59 sec. here
  • 2 min. at publisher
  • 📊 Quality Score:
  • News: 27%
  • Publisher: 59%

This proposed shift in security culture will be challenging, but it's also an incredible opportunity to really change the nature of cybersecurity.

A Seachange In Cybersecurity

The biggest change in cybersecurity that CISA advocates is to challenge those making software to ship secure products. If secure coding best practices are established and put in place, then there will be far fewer vulnerabilities—especially major ones—lurking within software for attackers to exploit.

The plan goes on to suggest that eventually, this new approach might be more than suggestive. CISA states that it will use"all available levers to influence risk decisions of organizational leaders" and also hints that laws like the Cyber Incident Reporting for Critical Infrastructure Act of 2022 , which currently governs the reporting of cyber incidents, could act as a model to eventually shift voluntary compliance with these new regulations to becoming more mandatory.

Given this new direction, it makes sense that an organization's developers, who write or source all of the code, are a perfect place to start when it comes to implementing more secure coding and efforts to comply with the CISA plan. However, developers can't do it without the support of the rest of their organization, especially upper management.

We have summarized this news so that you can read it quickly. If you are interested in the news, you can read the full text here. Read more:

ForbesTech /  🏆 318. in US

Malaysia Latest News, Malaysia Headlines

Similar News:You can also read news stories similar to this one that we have collected from other news sources.

Council Post: AI At Work: Three Steps To Prepare And Protect Your BusinessCouncil Post: AI At Work: Three Steps To Prepare And Protect Your BusinessIf your data isn't locked down, AI (friendly or otherwise) could make a data breach more likely.
Read more »

Council Post: What Business Should Know About Text-To-Image Stable DiffusionCouncil Post: What Business Should Know About Text-To-Image Stable DiffusionStable Diffusion is a diffusion model, meaning it learns to generate images by gradually removing noise from a very noisy image.
Read more »

Council Post: AI-Powered Audience Growth: How Esports Uses Artificial Intelligence To Connect With FansCouncil Post: AI-Powered Audience Growth: How Esports Uses Artificial Intelligence To Connect With FansEsports is using advanced machine learning to help game development evolve into enhanced player experiences.
Read more »

Council Post: Attackers Don’t Like You Having Visibility Into Your End-Of-Life AssetsCouncil Post: Attackers Don’t Like You Having Visibility Into Your End-Of-Life AssetsAs with other security issues, it’s essential to prioritize risk, so it helps to be aware of what the various stages of EOL mean to your organization.
Read more »

Council Post: Marketing Effectively For Budget-Conscious ConsumersCouncil Post: Marketing Effectively For Budget-Conscious ConsumersHere are ways to market effectively to budget-conscious consumers and ride out the ups and downs of the global economic climate.
Read more »



Render Time: 2025-02-27 19:39:19