<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security engineering &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/security-engineering/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Tue, 03 Nov 2020 14:16:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Security engineering &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Why 360-degree visibility is vital to protect critical infrastructure</title>
		<link>https://risk-academy.ru/why-360-degree-visibility-is-vital-to-protect-critical-infrastructure/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 03 Nov 2020 14:16:00 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[deloitte]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[Security engineering]]></category>
		<category><![CDATA[Apac]]></category>
		<category><![CDATA[Manager of Technical Services]]></category>
		<category><![CDATA[Aaron Ross]]></category>
		<category><![CDATA[reactive solutions]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/why-360-degree-visibility-is-vital-to-protect-critical-infrastructure/</guid>

					<description><![CDATA[Aaron Ross, APAC Manager of Technical Services at Paessler, tells us without 360-degree visibility those responsible for safeguarding the sanctity of an organization’s data are flying blind. He says: “CIOs [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><strong><em>Aaron Ross, APAC Manager of Technical Services at Paessler, tells us without 360-degree visibility those responsible for safeguarding the sanctity of an organization’s data are flying blind. He says: “CIOs trying to solve the visibility issue are frustrated with too many complex, reactive solutions, which makes them vulnerable to sophisticated threats and attacks, as well as network downtime.”</em></strong></p>
<p>360-degree visibility is a fundamental cybersecurity and IT risk management strategy that will help to protect critical infrastructure assets and sensitive information. But the increasing complexity of distributed enterprise networks makes this extremely challenging. Digital Transformation is increasing the complexity due to IT infrastructures becoming borderless. The key issue here is that you cannot protect critical infrastructure assets you cannot see.</p>
<p>According to a report by Deloitte – The Value Of Visibility – Cybersecurity Risk Management Examination, implementing a sound cybersecurity and IT risk management program is essential to protecting brands and can give organizations a jump in addressing mounting regulatory requirements.</p>
<p>This includes the Australian&#8230;</p>
</div>
<p><a href="https://www.intelligentcio.com/apac/2020/11/03/why-360-degree-visibility-is-vital-to-protect-critical-infrastructure/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyberquake: Tectonic shifts boost cloud, access management and endpoint security</title>
		<link>https://risk-academy.ru/cyberquake-tectonic-shifts-boost-cloud-access-management-and-endpoint-security/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 23 Aug 2020 04:54:41 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Firewall software]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Security engineering]]></category>
		<category><![CDATA[Antivirus software]]></category>
		<category><![CDATA[Computer security software]]></category>
		<category><![CDATA[Erik Bradley]]></category>
		<category><![CDATA[chief information security officers]]></category>
		<category><![CDATA[hierarchical network]]></category>
		<category><![CDATA[Endpoint security]]></category>
		<category><![CDATA[Endpoint]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cyberquake-tectonic-shifts-boost-cloud-access-management-and-endpoint-security/</guid>

					<description><![CDATA[We have all lived the reality that COVID-19 has accelerated by at least two years many trends that were in motion well before the virus hit — and cybersecurity is [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>We have all lived the reality that COVID-19 has accelerated by at least two years many trends that were in motion well before the virus hit — and cybersecurity is no exception. Indeed, cloud security, identity and access management, and endpoint security collectively are one of the best examples where we have witnessed accelerated change.</p>
<p>Welcome to this week’s Wikibon’s CUBE Insights, powered by Enterprise Technology Research. In this Breaking Analysis we want to update you on the all-important security sector which remains one of the top spending priorities for organizations. Erik Bradley at ETR provided macro trend insights, great data and some anecdotal commentary from chief information security officers.</p>
<h3>Shifting sands in the cybersecurity sector</h3>
<p>For many years we’ve talked about the shifting patterns in networking, moving away from what’s often referred to as a “North-South” architecture – meaning a hierarchical network supporting age-old organizational structures. The network is flattening into an “East-West” model and the moat or perimeter has been vaporized. Thanks to COVID-19, the perimeter is now wherever the user is and the users are at&#8230;</p>
</div>
<p><a href="https://siliconangle.com/2020/08/21/cyberquake-tectonic-shifts-boost-cloud-access-management-endpoint-security/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Common Cybersecurity Mistakes Businesses Continue To Make</title>
		<link>https://risk-academy.ru/common-cybersecurity-mistakes-businesses-continue-to-make/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 20 Jul 2020 07:43:28 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[malicious software]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Information governance]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[Security engineering]]></category>
		<category><![CDATA[security software]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/common-cybersecurity-mistakes-businesses-continue-to-make/</guid>

					<description><![CDATA[Successful cyber attacks can cost a business more than just millions of dollars. A breach in security may result in stolen data, diminished customer confidence, reputational harm and company downtime. [&#8230;]]]></description>
										<content:encoded><![CDATA[<div itemprop="text">
<p style="text-align: justify">Successful cyber attacks can cost a business more than just millions of dollars. A breach in security may result in stolen data, diminished customer confidence, reputational harm and company downtime. Whatever kind of business you’re in, taking the right precautions for the network is critical to mitigating these risks. Keep reading for some frequent cyber security mistakes and how to avoid them.</p>
<p style="text-align: justify">One of the most common reasons for cyber attacks is neglected security awareness training.</p>
<p style="text-align: justify">Untrained personnel are prone to falling victim to phishing scams and giving up their login credentials. Be sure to offer educational seminars to teach employees how to identify threats and prevent them from infiltrating the network.The better informed your staff members are, the fewer mishaps the business will face.</p>
<p style="text-align: justify">Since ransomware and other types of malicious software are constantly evolving, it’s imperative to implement protection from the latest threats. If you lack a foolproof firewall or high-end security software, all it takes is a few hours of exposure to compromise the entire network. Consistently updating security software is one of the best ways to protect a company from cyber&#8230;</p>
</div>
<p><a href="https://www.globalbankingandfinance.com/common-cybersecurity-mistakes-businesses-continue-to-make/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Maritime Industry Sees Increase in Cyber Attacks</title>
		<link>https://risk-academy.ru/maritime-industry-sees-increase-in-cyber-attacks/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 25 Jun 2020 20:28:42 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[FRE]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[Contents]]></category>
		<category><![CDATA[manufacturing]]></category>
		<category><![CDATA[Security engineering]]></category>
		<category><![CDATA[real estate]]></category>
		<category><![CDATA[security law]]></category>
		<category><![CDATA[Financial Services Cyber-Compliance Team]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/maritime-industry-sees-increase-in-cyber-attacks/</guid>

					<description><![CDATA[Linn Freedman practices in data privacy and security law, cybersecurity, and complex litigation. She provides guidance on data privacy and cybersecurity compliance to a full range of public and private clients [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p class="rtejustify">Linn Freedman practices in data privacy and security law, cybersecurity, and complex litigation. She provides guidance on data privacy and cybersecurity compliance to a full range of public and private clients across all industries, such as construction, education, health care, insurance, manufacturing, real estate, utilities and critical infrastructure, marine, and charitable organizations. Linn is a member of the firm&#8217;s Business Litigation Group and chairs its Data Privacy + Cybersecurity Team. She is also a member of the Financial Services Cyber-Compliance Team (CyFi &#8230;</p>
</div>
<p><a href="https://www.natlawreview.com/article/cyber-attacks-against-maritime-industry-quadrupled-last-few-months">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Secure at Sea: Is your vessel ready for IMO&#8217;s Cyber Security compliance?</title>
		<link>https://risk-academy.ru/secure-at-sea-is-your-vessel-ready-for-imos-cyber-security-compliance/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 30 May 2020 22:08:46 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[United States Department of Homeland Security]]></category>
		<category><![CDATA[Maritime Safety Committee]]></category>
		<category><![CDATA[International Maritime Organization]]></category>
		<category><![CDATA[Corey]]></category>
		<category><![CDATA[United Nations]]></category>
		<category><![CDATA[Security engineering]]></category>
		<category><![CDATA[In India]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/secure-at-sea-is-your-vessel-ready-for-imos-cyber-security-compliance/</guid>

					<description><![CDATA[ADVERTISEMENT Secure@Sea: by Corey D. Ranslem Cyber security threats continue to be one of the top threats facing governments, businesses, and private individuals around the globe with attacks increasing exponentially [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="post-59601">
<div class="adBox">
<div class="g g-4">
<div class="g-single a-66"><img decoding="async" title="Computer security" alt="Computer security" src="https://www.the-triton.com/wp-content/uploads/2019/10/AME-Article-updated-1019-V2-1.gif"/></div>
</div>
<p>ADVERTISEMENT</p></div>
<p><strong>Secure@Sea:</strong> by Corey D. Ranslem</p>
<p>Cyber security threats continue to be one of the top threats facing governments, businesses, and private individuals around the globe with attacks increasing exponentially on vessels and the maritime industry.</p>
<p>State and non-state actors perpetrate these attacks constantly around the clock and around the globe. Over the past few years, we have discussed cyber security-related issues in this column and their effect on the maritime industry. The IMO (International Maritime Organization) has put cyber security regulations in place for compliance by 2021. Many experts believe these will be the first of many regulations for the maritime industry when it comes to cyber security.</p>
<p>There are two specific documents the IMO has put forward regarding cyber security. The first document is MSC-FAL.1/Circ.3; Guidelines on maritime cyber risk management. This document is a guide on the basics of cyber risk management. </p>
<p>The Maritime Safety Committee (MSC), at its 98th session in June 2017, adopted Resolution MSC.428(98). This specifically addresses maritime cyber risk management as&#8230;</p>
</div>
<p><a href="https://www.the-triton.com/2020/05/secure-at-sea-is-your-vessel-ready-for-imos-cyber-security-compliance/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
