The CIS Critical Security Controls (CIS Controls) team has created guide to help organizations create secure cloud environments.
US, EU reach preliminary data privacy agreement
The US and the European Union (EU) have a preliminary agreement over the storing of European data on US soil. It was announced by President Biden and EU President Ursula von der Leyen, speaking on Friday March 25. If successful, the data agreement would resolve a significant point of contention in US-EU relations since a previous deal regulating trans-Atlantic data flows—Privacy Shield—was deemed illegal by the EU’s top court in 2020. It ruled that the US did not provide EU citizens effective means to challenge US government surveillance of their data.
[ Learn 8 pitfalls that undermine security program success and 12 tips for effectively presenting cybersecurity to the board. | Sign up for CSO newsletters. ]
Framework underscores “shared commitment to privacy”
While neither President Biden nor President von der Leyen provided details on how the new agreement would work and withstand legal challenges, the US President said that the “framework underscores our shared commitment to privacy, to data protection and to the rule of law” and would allow EU authorities “to once again authorize trans-Atlantic data flows that help facilitate $7.1 trillion in economic relations with the EU.”
openssl1.1-1.1.1n-1.fc36
FEDORA-2022-8bb51f6901
Packages in this update:
openssl1.1-1.1.1n-1.fc36
Update description:
Security fix for CVE-2022-0778
openssl1.1-1.1.1n-1.fc37
FEDORA-2022-d6cd1e0cc1
Packages in this update:
openssl1.1-1.1.1n-1.fc37
Update description:
Automatic update for openssl1.1-1.1.1n-1.fc37.
Changelog
* Thu Mar 24 2022 Clemens Lang <cllang@redhat.com> – 1:1.1.1n-1
– Upgrade to version 1.1.1n
Resolves: CVE-2022-0778, rhbz#2064918
Gus Simmons’s Memoir
Gus Simmons is an early pioneer in cryptography and computer security. I know him best for his work on authentication and covert channels, specifically as related to nuclear treaty verification. His work is cited extensively in Applied Cryptography.
He has written a memoir of growing up dirt-poor in 1930s rural West Virginia. I’m in the middle of reading it, and it’s fascinating.
London DJ Surrenders £214,000 of Music Kit in Money Laundering Case
Four Russians Charged with Dragonfly Attacks on Critical Infrastructure
Six-year campaign targeted thousands of machines in global energy sector
CVE-2018-25032
zlib 1.2.11 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
UK Teen Arrested in Lapsus Crackdown
VMware’s Karen Worstell: This isn’t a black swan world anymore
Karen F. Worstell offers a grim assessment: Security teams, and by extension the organizations they serve, are now “living in a zero-day world.”
“That’s our new reality, and we have to operate on the assumption of breach,” she says.
[ Learn 7 tips for better CISO-CFO relationships and 5 key qualities of successful CISOs. | Sign up for CSO newsletters. ]
At the same time, she sees CISOs dealing with technical debt and limited budgets as well as the expectation that their security initiatives won’t slow the pace of business.