Trump's potential second term may transform tech: deregulation could boost AI and pro-crypto policies, sparking growth. Big Tech and blockchain look to thrive, but climate tech may face challenges. Silicon Valley braces for innovation amid ethical and environmental considerations.
China’s "Salt Typhoon" hackers have breached U.S. telecoms, raising cyber tensions. Experts warn of the threat to international stability, emphasizing the need for collaborative strategies to prevent escalation amid ongoing economic competition.
The EU’s ESMA calls for mandatory crypto cybersecurity audits as threats grow, while the U.S. expands AI in defense with a focus on responsible use. Both moves underscore the need for stricter tech policies to safeguard assets and uphold ethical standards in evolving digital realms.
CISA and International Partners Release New Network Security Guidance
In a significant move towards strengthening global cybersecurity frameworks, the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation (FBI), has unveiled new guidance titled "Modern Approaches to Network Access Security."
In a significant move towards strengthening global cybersecurity frameworks, the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Federal Bureau of Investigation (FBI), has unveiled new guidance titled "Modern Approaches to Network Access Security."
This initiative sees a convergence of efforts from international partners including New Zealand’s Government Communications Security Bureau (GCSB), New Zealand’s Computer Emergency Response Team (CERT-NZ), and the Canadian Centre for Cyber Security (CCCS).
This newly released guidance underscores the urgent need for businesses of all sizes to transition to more advanced security solutions, such as Zero Trust, Secure Service Edge (SSE), and Secure Access Service Edge (SASE).
These frameworks aim to enhance visibility into network activities and mitigate risks associated with traditional remote access and VPN configurations, which have become increasingly vulnerable in the face of sophisticated cyber threats.
CISA's Cross-Sector Cybersecurity Performance Goals (CPGs) play a crucial role in this initiative. These goals represent a common set of protections that all critical infrastructure entities—from large to small—should implement to meaningfully reduce the likelihood and impact of known risks and adversary techniques.
Developed through extensive consultation with industry, government, and experts, the CPGs provide a baseline set of cybersecurity practices with high-impact outcomes, serving as a benchmark for critical infrastructure operators to measure and improve their cybersecurity maturity.
By adopting these practices, small- and medium-sized organisations can prioritise essential security actions, thus kickstarting their cybersecurity efforts. The CPGs are unique as they address both individual and national risks, combining recommended practices for information technology and operational technology owners.
Released on November 22, 2023, the 2023-2030 Australian Cyber Security Strategy aims to position Australia as a global leader in cybersecurity by 2030.
The strategy emphasises six key cyber shields: strong businesses and citizens, safe technology, world-class threat sharing and blocking, protected critical infrastructure, sovereign capabilities, and resilient regional and global leadership.
The Australian Government has taken concrete steps by appointing a Cyber Coordinator lead by military intelligence veteran Michelle McGuinness In charge to responding to major cyber incidents and by enhancing cyber incident reporting through Project REDSPICE. The one-stop shop at cyber.gov.au simplifies incident reporting, making it easier for businesses to meet their regulatory obligations.
The release of guidance by CISA and its international partners marks a positive step towards concerted global cybersecurity cooperation.
This collaborative approach helps establish a unified framework for network access security, enhances threat intelligence sharing, and promotes the adoption of cutting-edge security models. As businesses worldwide grapple with evolving threats, adherence to this guidance is crucial in safeguarding network access and maintaining robust security postures.
The EU’s ESMA calls for mandatory crypto cybersecurity audits as threats grow, while the U.S. expands AI in defense with a focus on responsible use. Both moves underscore the need for stricter tech policies to safeguard assets and uphold ethical standards in evolving digital realms.
TSMC leads the AI chip race, thriving on surging demand, while Samsung struggles with a 13% profit drop and ASML casts doubt on AI chip sustainability. Chinese tech giants adapt to U.S. trade limits with homegrown solutions, keeping the global competition fierce in the AI-driven market.
Chinese hackers allegedly breached U.S. telecoms tied to Harris and Trump campaigns, highlighting election security gaps. AI-driven deepfakes and disinformation also surge on social media, raising risks to democracy as voters near Election Day.
Australia faces an escalating cybercrime crisis, leading experts to call for standardised training across all law enforcement agencies. During a Parliamentary Joint Committee hearing, specialists highlighted the urgent need for unified protocols to effectively combat sophisticated cyber threats.