NCCoE releases draft of NIST Cybersecurity Special Publication 1800-25, Identifying and Protecting Assets Against Ransomware and Other Destructive Events
NCCoE releases draft of NIST Cybersecurity Special Publication 1800-25, Identifying and Protecting Assets Against Ransomware and Other Destructive Events
The National Cybersecurity Center of Excellence (NCCoE) has released a draft of National Institute of Standards and Technology (NIST) Cybersecurity Special Publication 1800-25, Identifying and Protecting Assets Against Ransomware and Other Destructive Events, for public comment. CryptoniteNXT is one of the collaborating vendors in developing this document. Read the full document for best practices and findings.
NCCoE at NIST proposed a project that could help organizations identify and protect their assets from data integrity attacks across multiple industries. This project includes the development of a reference design and uses commercially available technologies to develop an example solution that will help various organizations implement stronger security controls.
Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to an organization’s infrastructure. Database records, system files, configurations, user files, applications, and customer data are all at risk should an attack occur.
The National Cybersecurity Center of Excellence (NCCoE) has released a draft of National Institute of Standards and Technology (NIST) Cybersecurity Special Publication 1800-25, Identifying and Protecting Assets Against Ransomware and Other Destructive Events, for public comment. CryptoniteNXT is one of the collaborating vendors in developing this document. Read the full document for best practices and findings.
NCCoE at NIST proposed a project that could help organizations identify and protect their assets from data integrity attacks across multiple industries. This project includes the development of a reference design and uses commercially available technologies to develop an example solution that will help various organizations implement stronger security controls.
Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to an organization’s infrastructure. Database records, system files, configurations, user files, applications, and customer data are all at risk should an attack occur.