Follow the Path, An Ostensible Interloper, A Legal Cold Shower, Subscriber Stampede, The French Connection, and Cross Border Co-operation. It's CISO Intelligence for Wednesday 19th March 2025.
An unusual journey, the attack of the vapours, what happens when a business decides it's not playing the game, flooding the zone, when the boss takes French leave, and getting everyone to play by the same rules.
💡
"Gives me everything I need to be informed about a topic" - __UK.Gov__
Table of Contents
1. Off the Beaten Path: Recent Unusual Malware Developments
2. Vapor Apps: The New Mirage on Google Play
3. Australia Sues FIIG Investment Firm in Cyber ‘Wake-Up Call’
4. Subscription Management and Contact Emails: Inboxes on the Verge of a Nervous Breakdown!
5. Au Revoir: Telegram's CEO is Taking an "Extended Holiday" - from France
6. Decoding the Bundesamt für Sicherheit in der Informationstechnik: A Cyber Sleuth's Guide to Germany's IT Security Authority
Sign up for CISO Intelligence.
21st century industry insights for the modern CISO
It won't hurt, I promise.
Email sent! Check your inbox to complete your signup.
No spam. Unsubscribe anytime.
Off the Beaten Path: Recent Unusual Malware Developments
_Malware with a twist - even cybercriminals are getting creative these days!_
What You Need to Know
Executives, a handful of particularly unusual malware variants have been identified, offering new challenges in attribution and functionality analysis. You must stay informed on these developments to ensure proactive defenses. It’s crucial to understand the potential implications these malware strains could have, and the need to update current security measures accordingly.
CISO Focus: Malware Analysis and Defense
Sentiment: Strong Negative
Time to Impact: Short
*
Unraveling the Uncanny: A Closer Look at the Oddities
In the vast ocean of cybersecurity threats, new waves are emerging — waves composed of peculiar and complex malware that defy traditional classification and response strategies. The latest report from Unit 42 unveils three intriguing examples: a passive IIS backdoor, a bootkit utilizing an unsecured kernel driver, and a cross-platform Windows implant. These oddities showcase a shift in cybercriminal tactics, emphasizing the need for enhanced security measures and vigilance across the board.
Spotlight on the Peculiar
While traditional threat actors often stick to well-known tools from the offensive security community, some are venturing into uncharted territories, crafting custom, elusive malware. Here are the eccentric samples highlighted:
1. The C++/CLI IIS Backdoor:
Breaking conventions, this backdoor is written in C++/CLI, a language scarcely used by malware creators. Its passive nature underscores subtler infiltration and data exfiltration methods, mandating advanced detection mechanisms.
2. A Bootkit with a GRUB 2 Loader:
This malware ingeniously exploits an unsecured kernel driver to plant a GRUB 2 bootloader. This unconventional application amplifies the bootkit's evasive qualities, posing significant challenges for endpoint security measures.
3. Cross-Platform Post-Exploitation Framework:
* While it mirrors a red-team tool, this implant's deviation from expected patterns warrants close examination. Its adaptability across operating systems highlights a trend towards more versatile cyber threats.
Why This Matters
Such innovative malware necessitates a paradigm shift in cyber defense strategies. Traditional defenses may falter against these specialists, who expertly blend in while pursuing specific objectives. As cyber threats evolve, organizations must upscale their threat detection and response frameworks to tackle these new challenges head-on.
Recommendations for Defense
* Continuous Monitoring and Intelligence Sharing: Foster robust collaboration and information sharing across sectors to evade these threats. Stay updated with threat databases and align defenses with the latest intel.
* Advanced Endpoint Protection: Deploy adaptive security tools capable of recognizing unconventional patterns indicative of these modern threats.
* Employee Awareness and Training: Besides tech measures, arm your human firewall with knowledge. Train personnel to identify maleficent activities, such as phishing attempts and unusual file behavior.
A New Cyber-Frontier Awaits
The rise of sophisticated and unusual malware signals a pivotal moment for cyber defenders. It's a clarion call to innovate continually, anticipate tactics, and stay ahead of adversaries who are slowly yet steadily mounting diverse attacks. As we navigate these uncharted waters, a commitment to technological advancement and cybersecurity readiness is paramount.
In the grand theater of cyber warfare, even hackers love to keep the audience guessing. Whether a new act or a deadpan improv, the show of malware ingenuity never ceases to intrigue. Don't be caught without a script.
*
Vendor Diligence
Questions
1. How does your security solution adapt to novel and unconventional malware frameworks?
2. What measures are in place to identify passive and cross-platform threats?
3. Can your product provide AI-driven insights into evolving malware behaviors?
Action Plan for the CISO's Team
Immediate priorities include:
Audit and Upgrade: Evaluate current IIS server configurations, boot protocols, and post-exploitation defenses. Ensure all software and firmware are aggressively patched and secured.
Intensify Intelligence Gathering: Boost collaboration with intelligence services to receive up-to-the-minute updates on evolving threats.
Invest in Adaptive Learning Tools: Look into AI-driven cybersecurity platforms that offer adaptable and predictive threat assessments.
*
Source: <https://unit42.paloaltonetworks.com/unusual-malware/>
*
Vapor Apps: The New Mirage on Google Play
_When mirages go mobile: How Vapor apps duped 60 million users_
What You Need to Know
The Google Play Store has become host to a trove of malicious Android apps—dubbed ‘Vapor apps’—that have infiltrated the devices of over 60 million users. These apps, designed to operate invisibly to harvest data, evade detection through sophisticated cloaking techniques. It's imperative for organizations to educate their workforce on mobile security protocols and ensure immediate removal of any identified malicious apps. Continuous monitoring and regular audits of all device application inventories are crucial measures to mitigate risks.
CISO focus: Mobile Application Security and Threat Awareness
Sentiment: Strong Negative
Time to Impact: Immediate
*
The Rise of Malicious 'Vapor' Apps
In an alarming development for mobile security, malicious "Vapor apps" have penetrated the fortress of Google Play, finding their way onto over 60 million Android devices worldwide. Sophisticated in their deception, these apps perform malicious activities in the shadows, masquerading as safe, everyday tools and game apps to lure unwary users into downloading them.
What Are Vapor Apps?
Vapor apps are essentially digital chameleons. They appear on Google Play as benign applications but activate their malicious components once installed. These apps cloak themselves using advanced techniques making detection difficult, even as they extract sensitive information from user devices, leading to potential data breaches or financial fraud.
The Impact on Users
Riding high on deceptive design, Vapor apps are a clear reflection of the ongoing cat-and-mouse game in mobile security.
Data Harvesting: Vapor apps are primarily designed to gather personal information covertly. This data ranges from contact lists and location data to sensitive financial information.
Financial Fraud: With banking details and personal identifiers at risk, users could face unauthorized transactions and identity theft.
Privacy Invasion: Continuous background operation invades privacy by tracking user activities without their consent.
Google's Response
Google Play's security measures, while robust, are facing strain under the cunning disguises of these malicious entities. Although improvements in screening and AI-driven vetting processes are underway, the pace of app submissions continues to pose challenges.
Enhancements in Detection: Google intends to integrate more sophisticated machine learning algorithms to identify malicious apps faster.
User Vigilance Encouraged: Google emphasizes user education on recognizing suspicious app behavior as a frontline defense.
Mitigation Strategies for Users
To safeguard against Vapor apps, users are advised to:
1. Review Permissions: Scrutinize app permissions and uninstall apps that request unnecessary access.
2. Install Security Apps: Employ reputable mobile security solutions to provide an additional layer of protection.
3. Stay Informed: Regularly check for credible updates from trusted cybersecurity resources.
Organizational Implications
Strengthening Mobile Security Posture
Organizations, especially those with a bring-your-own-device (BYOD) policy, should urgently review their mobile security frameworks:
Network Segmentation: Isolate mobile devices from sensitive internal networks to contain breaches.
Regular Audits: Implement routine checks on device app inventories to identify and remove potentially malicious apps.
User Training Programs: Educate employees about threats posed by Vapor apps and best practices for securing their devices.
Cybersecurity Teams' Action Plan
Given the immediate threat posed by these apps, cybersecurity teams should:
1. Enhance Monitoring: Deploying tools that automatically flag and quarantine suspicious apps will be crucial.
2. Update Policies: Revise organization-wide mobile device usage policies to include clearer guidelines on app downloads and permissions.
3. Conduct Workshops: Regularly scheduled workshops to educate users about evolving mobile threats and response strategies.
*
Vendor Diligence Questions
**
1. What protocols are in place to detect apps with cloaked malicious code on platforms like Google Play?
2. How frequently are security assessment tools updated to keep pace with new threat vectors in mobile app development?
3. Can the security propositions be independently verified by third-party cybersecurity firms?**
Action Plan for CISO Teams
1. Immediate Device Scan: Mandate an organization-wide scan of all Android devices for identified Vapor apps.
2. Security Briefing: Schedule urgent briefings to inform stakeholders of the Vapor app threats and instituted countermeasures.
3. Policy Review and Update: Ensure mobile security policies are stringent and align with the latest threat intelligence.
*
Source: Malicious Android 'Vapor' apps on Google Play installed 60 million times
*
Australia Sues FIIG Investment Firm in Cyber ‘Wake-Up Call’
_When your portfolio could use a security vaccination._
What You Need to Know
In an unprecedented move highlighting serious cybersecurity shortfalls, Australian regulatory authorities have filed a lawsuit against FIIG Investment Firm. The legal action serves as a wake-up call to the financial sector, underlining the critical importance of maintaining stringent cybersecurity protocols. This lawsuit arrives amid increasing global concerns over data breaches and the pressures on financial institutions to safeguard sensitive information. Executive management should immediately assess their cybersecurity measures and readiness to address potential vulnerabilities in their systems.
CISO focus: Legal Compliance and Data Protection
Sentiment: Strong Negative
Time to Impact: Immediate
*
Australia’s Regulatory Knock on FIIG’s Door
Australian authorities have launched legal action against FIIG Investment Firm, a prominent name in the financial world, due to their alleged failure to adhere to cybersecurity mandates meant to protect sensitive investor data. This lawsuit underscores a significant vulnerability within financial institutions and serves as an urgent alert to the industry globally.
The Catalyst for Litigation
The impetus for this high-profile lawsuit was a substantial cybersecurity breach that compromised the data of thousands of FIIG's clientele. Regulatory bodies charge that the company's lackluster cybersecurity protocols were directly responsible for this breach. As financial firms increasingly become targets for cybercriminals, the expectation for robust security apparatus is non-negotiable.
The Breach
Unauthorized access to client information.
Potential exposure of both investor identities and investment details.
Immediate call to action for improved data security.
Authorities argue that this breach displays a blatant disregard for both legislated requirements and client trust, posing a severe risk to consumer privacy and financial security.
Ripples in the Financial Sector
This legal move has sent shockwaves through financial markets, sparking discussions on the urgent need for heightened diligence in cybersecurity. Industry leaders now face mounting pressure to balance technological innovation with cyber safeguards, aptly defined by investment security pundits as ‘cyber hygiene’.
Immediate Industry Concerns
Rising vulnerabilities in financial technology infrastructures.
Escalating operational costs linked to stronger cybersecurity implementation.
Increased regulatory investigations on data protection measures.
Financial institutions cannot afford to ignore regulatory voices as the space navigates an evolving landscape rife with cyber risks.
The Regulators’ Stance on Cybersecurity
Regulators have consistently stressed the importance of adopting comprehensive frameworks that can mitigate cyber threats. The lawsuit against FIIG sheds light on regulatory impatience with firms that fail to comply, thus raising the stakes for financial companies worldwide. The prevailing message from authorities is clear: non-compliance will not be tolerated, and legal action will be pursued.
Key Regulatory Positions
Mandatory implementation of ISO 27001 or equivalent standards.
Regular internal audits to identify and fortify potential vulnerabilities.
Transparent reporting mechanisms for breaches or attempted threats.
The legal consequences faced by FIIG are indicative of a broader demand for robust oversight and compliance strategies.
Repercussions and Industry Lessons
Ultimately, the FIIG lawsuit serves as both a cautionary tale and a motivator for immediate action. Firms are encouraged to not only evaluate and upgrade their cybersecurity measures but also to incorporate a culture of continuous vigilance against evolving cyber threats.
Strategic Recommendations for Financial Firms
1. Investment in Cyber Tools : Allocate budgets for advanced cybersecurity technologies and expert consultations.
2. Employee Training : Establish comprehensive training programs to bolster employee awareness and response capabilities.
3. Collaboration with Experts : Partner with cybersecurity firms to leverage expertise and implement cutting-edge protective measures.
When Security Fails, Financial Trust Falters
The unfolding events with FIIG Investment Firm are not merely about one company’s failure but reflect a systemic vulnerability that may affect the broader financial ecosystem. As financial entities grapple with this wake-up call, the industry must prioritize cybersecurity to ensure long-term sustainability and consumer trust. Remember, a firm’s digital fortifications are only as strong as its weakest link.
*
Vendor Diligence Questions
1. What specific cybersecurity frameworks do you currently have in place, and how frequently are they reviewed?
2. How do you ensure compliance with relevant data protection regulations, and what is your process for addressing breaches?
3. Can you detail the internal controls you have implemented to prevent unauthorized access to sensitive data?
Action Plan
Assessment : Conduct an immediate evaluation of current cybersecurity protocols.
Remediation : Address identified vulnerabilities with urgency, implementing necessary technological upgrades.
Training : Roll out mandatory cybersecurity training for all employees to foster a culture of security.
*
Source: Australia Sues FIIG Investment Firm in Cyber ‘Wake-Up Call’
*
Subscription Management and Contact Emails: Inboxes on the Verge of a Nervous Breakdown!
_When too many emails make your inbox feel like a crowded subway train._
What You Need to Know
The recent influx of subscribers to Team Cymru's Dragon News Bytes (DNB) has led to an increase in email distributions, potentially overwhelming subscriber inboxes. Executive management should anticipate changes in subscription management and consider strategies to accommodate the growing audience while maintaining a high level of content quality. Specifically, managing email volume and ensuring useful engagements are critical steps. For streamlining communications, subscribers should be aware that they can adjust their subscription preferences by contacting the provided email addresses.
CISO focus: Email Security and Content Management
Sentiment: Positive
Time to Impact: Short (3-18 months)
*
Inbox Avalanche: Navigating the Flood of Cyber Insights
The digital age inundates our inboxes with information. In the case of Dragon News Bytes (DNB), the persistent inflow of new subscribers has brought about increased communication, leading to a potential overwhelming of subscriber inboxes with daily insights.
The Email Deluge
Recently, DNB's user base has expanded significantly, a response to its high-impact information sharing focused on cybersecurity. This upswell in subscribers is excellent news but necessitates strategic adjustments. While the news and research shared by DNB are invaluable, the sheer volume of emails—up to six each morning—can be burdensome for recipients.
* Subscriber Preferences: Subscribers have the flexibility to customize their email preferences by contacting brenna@cymru.com or lemmons@cymru.com to tailor the email flow to their preference, ensuring they receive information that is both manageable and relevant.
* Research Contributions Welcomed: Co-curator Brenna enjoys contributions to DNB, highlighting a unique element of community engagement. Subscribers can share their research findings or suggest relevant news, supporting the collective intelligence model DNB endorses.
Subscription Management: The Balancing Act
As information consumption changes rapidly, so must the mechanisms that distribute it. DNB's manual curation is admirable but reliant on active engagement from its audience. While artificial intelligence capabilities are explored, human touch remains central to ensuring that content aligns with subscriber interests.
Community Engagement and Feedback
Brenna acknowledges the essential power of feedback, encouraging comments, critiques, and complaints. Such openness promises continuous improvement, refining content to better serve its audience. The subscription service thrives on this dialogue, knowing that active participation fosters a robust community around cybersecurity news.
A Premier Cybersecurity Gathering
In tandem with bolstering its email initiative, Team Cymru is hosting the RISE-USA conference in collaboration with Stripe. Scheduled for April 2025 in San Francisco, this TLP-RED event promises a congregation of leading figures from law enforcement and corporate sectors to tackle prevailing cybercrime threats.
* Call for Papers: Prospective speakers can submit their proposals for this event, providing a platform for fresh insights and innovative solutions to cybersecurity challenges.
Intrigue and Inspiration: Join the Cybersecurity Conversation
The inviting strategies of Team Cymru illustrate a comprehensive approach to managing an expanding audience without losing the personal touch that distinguishes their communication style. With options to personalize email receipt, contributing research, and providing feedback, subscribers are active participants in the information exchange, cultivating an informed and interconnected community.
Inboxes all over the world are on high alert: this is a cyber newsletter that takes no prisoners, making sure you're armed with the freshest, most intriguing cyber intel before you've even had your coffee.
*
Vendor Diligence Questions
1. How do you manage and prioritize incoming research and intelligence to avoid overwhelming subscribers?
2. What data protection measures are in place to safeguard subscriber feedback and contributions?
3. How do you ensure the relevance and timeliness of information shared during large-scale events such as RISE-USA?
Action Plan
1. Review current email distribution strategies to balance volume and relevance.
2. Engage with subscribers for feedback on both content and delivery preference changes.
3. Evaluate technological solutions for automating aspects of content curation while maintaining quality.
4. Organize team engagement for effective presentation submissions for the RISE-USA conference.
5. Foster community engagement through continuous dialogue and constructive feedback.
*
Source: Team Cymru Dragon News Bytes
*
Au Revoir: Telegram's CEO is Taking an "Extended Holiday" - from France
_The CEO was merely enjoying croissants before the legal heat turned up too high._
What You Need to Know
The CEO of Telegram, Pavel Durov, has decided to momentarily go on a "nice stroll out of France" amidst an ongoing criminal investigation. The heart of the matter involves the use of Telegram in evading security protocols. The executive team must tread carefully in emphasizing security compliance on digital platforms they utilize or endorse. They are expected to monitor this situation as a cautionary tale for regulatory and governance risks inherent in hosting or promoting similar technologies.
CISO focus: Incident Response & Regulatory Compliance
Sentiment: Neutral
Time to Impact: Immediate
*
Why Telegram's CEO Has Left the Building
The sudden departure of Telegram CEO, Pavel Durov, from France was prompted by an ongoing criminal investigation. This case revolves around the alleged misuse of the Telegram platform to bypass stringent security protocols. According to French authorities, Telegram may have been a key player in facilitating communication for groups skirting surveillance and engaging in unlawful activities.
Implications in the Digital Age
This development has sent ripples across the tech world, serving as a cautionary tale about the delicate balance between security and privacy. Telegram, known for its staunch commitment to user privacy, finds itself in a precarious position. Governments worldwide are increasingly scrutinizing messaging apps that offer encrypted communications, raising the ultimate question: how far should privacy protections extend?
The Legal Underpinnings
The probe focuses on laws governing data privacy and counter-terrorism. France has been at the forefront of balancing privacy rights with national security concerns, particularly under the European Union's General Data Protection Regulation (GDPR) framework. The investigation's outcome could have lasting effects not only for Telegram but also for other technology firms prioritizing encryption.
What’s Cooking in the Compliance Department?
1. Regulatory Challenges:
Companies should brace themselves for evolving legislation aimed at balancing user privacy with the need for comprehensive law enforcement measures.
2. The Encryption Debate:
Businesses might face increasing calls from governments for backdoor access to encrypted communications. This would necessitate careful navigation to avoid undermining trusted platforms.
3. Potential for Increased Surveillance:
* Organizations need to evaluate their data handling protocols and invest in ensuring they comply with legal requirements while safeguarding user trust.
Accounts from the Legal Frontline
Public sentiment remains varied, with privacy advocates rallying behind Durov, asserting that privacy should not be compromised. Conversely, safety advocates argue for a nuanced approach allowing legitimate access under specific legal constraints.
Early responses from Telegram indicate their continued commitment to maintaining their security measures. However, they have expressed a readiness to cooperate with legal authorities, suggesting a possible openness to enhance transparency and compliance strategies.
Ripple Effects in the Tech Landscape
Tech giants dealing in encrypted communications are likely to rethink their current security postures. It may also prompt an influx of tech companies adopting stringent data practices while preparing for potential government audits.
A Noteworthy Exploration of the Situation
Given its potential for global repercussions, stakeholders, including investors, must remain vigilant and proactive in assessing regulatory risks. The evolution of this case will likely influence future decisions by tech manufacturers and digital service providers worldwide.
*
Vendor Diligence Questions
1. How does your organization maintain compliance with international data protection laws?
2. What measures have you implemented to ensure encrypted communications do not hinder lawful surveillance?
3. Could you detail your cooperation framework with legal authorities in regulatory matters?
Action Plan
1. Immediate Evaluation: Task the cyber intelligence team with assessing the impact of emerging regulations on current operations.
2. Strengthen Communications: Enforce transparent internal communications concerning data privacy norms and compliance standards.
3. Emergency Response Drills: Regularly scheduled simulations for dealing with lawful data requests and potential breaches.
4. Stakeholder Engagement: Organize briefings for stakeholders to update them on evolving laws and the organization’s responsive measures.
*
Source: Telegram CEO leaves France temporarily as criminal probe continues
*
Decoding the Bundesamt für Sicherheit in der Informationstechnik: A Cyber Sleuth's Guide to Germany's IT Security Authority
_Achtung! BSI is here to save your digital bacon from sizzling away._
What You Need to Know
The Bundesamt für Sicherheit in der Informationstechnik (BSI) is Germany's federal office dedicated to ensuring national IT and cyber security. As an executive, it's crucial to recognize the BSI's role in setting stringent standards and guidelines for cybersecurity, especially for organizations operating within or in conjunction with German entities. You are expected to familiarize yourself with BSI's regulations and ensure your cybersecurity strategies align with their guidelines to mitigate risks and maintain compliance.
CISO focus: Regulatory Compliance and Information Security Management
Sentiment: Positive
Time to Impact: Immediate
*
Germany's Cyber Sentinel: The Bundesamt für Sicherheit in der Informationstechnik
In the rapidly evolving arena of cyberspace, the Bundesamt für Sicherheit in der Informationstechnik (BSI) stands as Germany's stalwart defender, ensuring robust IT security measures across the nation's digital landscape. Understanding BSI's overarching objectives and their implications is crucial for any organization striving to maintain or establish digital operations in Germany.
What is BSI and Why Should You Care?
BSI, Germany's Federal Office for Information Security, was birthed in 1991 to spearhead the nation's efforts in curbing cyber threats and enhancing IT security frameworks. With a pivotal role similar to that of the United States' Cybersecurity and Infrastructure Security Agency (CISA), BSI is charged with not only defending government systems but also providing guidance for private sector cybersecurity.
BSI formulates comprehensive IT security standards and guidelines which organizations are encouraged, and sometimes mandated, to adopt. These include the management of risks, securing data transmissions, and implementing cutting-edge cybersecurity technologies.
Key Responsibilities of BSI
1. Policy Development : BSI crafts the national IT security strategies, constantly adapting them to address emerging cyber threats and align with international standards.
2. Advisory and Certification : It advises and certifies IT products and services, creating a trusted technological ecosystem.
3. Incident Response Management : The agency plays a vital role in managing cyber incidents, offering remediation strategies and real-time threat intelligence.
4. R &D Facilitation: BSI supports research and development to encourage innovation in cybersecurity technologies.
Who's Watching the Watchers?
One of BSI's unique attributes is its transparency in operations. By engaging with public and private sectors, it fosters a collective approach to cybersecurity. For multinational companies, especially tech giants, adhering to BSI's rigorous standards can be a mark of credibility and trustworthiness.
Impacts on International Businesses
Foreign organizations aiming to penetrate the German market or partner with German enterprises must diligently follow BSI protocols. By conscientiously implementing BSI’s regulations, these organizations can bolster their resilience against cyber threats, ensuring data protection and operational continuity.
Challenges and Future Directions
Even with its commendable efforts, BSI faces challenges in a landscape where cybercriminals are continually inventive. The complexity and volume of attacks demand not just reactive but proactive measures, driving BSI to innovate continuously. The future directive involves integrating AI and machine learning to preemptively identify threats.
BSI’s emphasis on international collaboration is paramount, aiming to synchronize with global cybersecurity bodies to formulate universal standards and shared threat intelligence.
*
Vendor Diligence Questions
1. How does your product align with BSI's IT security standards and certifications?
2. What mechanisms do you have in place to ensure compliance with BSI’s guidelines on data protection and risk management?
3. How does your company collaborate with international cybersecurity entities similar to BSI?
Action Plan
1. Assessment and Alignment : Conduct a thorough review of current cybersecurity measures against BSI standards and pinpoint any gaps. Align organizational policies and frameworks with BSI guidelines.
2. Training and Awareness : Implement training programs to educate employees at all levels on BSI compliance requirements and the importance of adhering to them.
3. Engage with BSI : Establish direct lines of communication with BSI for updates on regulations and potential accreditations for your cybersecurity solutions.
4. Monitor and Adapt : Regularly monitor cybersecurity strategies and update them in correspondence with any new BSI guidelines or policies.
*
Source: What is Bundesamt für Sicherheit in der Informationstechnik (BSI)?
*
_CISO Intelligence is lovingly curated from open source intelligence newsfeeds and is aimed at helping cybersecurity professionals be better, no matter what their stage in their career._
_We’re a small startup, and your subscription and recommendation to others is really important to us._
*Thank you so much for your support!(

