Skip to content
  • 0 Votes
    1 Posts
    0 Views
    anchore@mstdn.businessA
    Don't wait for your 3PAO audit to find out you're non-compliant.We've built a FedRAMP Requirements Checklist specifically for containerized environments. It covers:• The new 30-day scanning window• Hardened base image requirements• Continuous Monitoring (ConMon) automationDownload the checklist and start your pre-assessment today.https://go.anchore.com/fedramp-vulnerability-scanning-checklist-containers/#FedRAMP #DevSecOps #SBOM #NIST #Cybersecurity #PublicSectorIT
  • NIST updated their NVD operations.

    Uncategorized cve security nist cisa cna
    1
    0 Votes
    1 Posts
    0 Views
    m3r@c.imM
    NIST updated their NVD operations. They will now prioritize CISA's KEV catalog, federal government software, and "critical software" defined in the Executive Order 14028 for faster enrichment.They also will not assign their own severity scores to CVEs that received a score from CNAs.AI CVEs took a toll on them, it seems like.https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth#cybersecurity #cve #security #nist #cisa #cna #vulnerability #vulnerabilitymanagement #ai
  • 0 Votes
    1 Posts
    0 Views
    rmaloley@infosec.exchangeR
    Yet another day in the life of a security consultant. COO (and vCISO at ‘Client’): We should do NIST CSF assessments. Make it so.Me and Team: Got it! Here we go, who will be the first client?COO: We’ll be the first client!Me: Great!Me: - Reminder: No wrong answers! The whole point is to see what you have in place when compared to the various domains and controls/requirements identified by NIST.COO: WOAH WOAH WOAH this is NOT what I wanted. This scope is too broad! We gotta pare this down.Me: …#nist #csf #framework #assessment #justdoit
  • 0 Votes
    1 Posts
    0 Views
    newsgroup@social.vir.groupN
    Quantum computers threaten to break most modern cryptography within minutes — perhaps seconds. The theoretical threat is becoming practical reality.What stands to be compromised:Financial systems and transactionsGovernment communications and classified informationMedical records and health dataCorporate trade secrets and intellectual propertyPersonal communications and private messagesThe "harvest now, decrypt later" strategy is already in use. State actors are collecting encrypted data today, anticipating future quantum decryption capabilities.NIST's post-quantum cryptography competition has identified promising algorithms across several approaches: lattice-based, code-based, multivariate, and hash-based cryptography. Each presents trade-offs in performance, key size, and implementation complexity.The transition will cost billions globally. The geopolitical stakes are immense: the nation that achieves practical quantum computing first gains unprecedented strategic advantage — the ability to decrypt adversaries' communications, access protected state secrets, and undermine financial systems.This is a quantum arms race. The winner may effectively read the digital world's thoughts.https://newsgroup.site/quantum-computing-cryptography-threat-encryption-2026/#QuantumComputing #Cryptography #PostQuantum #NIST #CyberSecurity #DataPrivacy