Pegasystems announced the general availability of Pega Infinity ’24.1™.
The White House recently released its National Cybersecurity Strategy. This document outlines the government's plan to address growing concerns over cyberattacks and ransomware attacks. The administration recognizes cybersecurity as an ongoing consideration that will continue to grow in importance.
The strategy outlines two main tactics to accomplish continued data security for companies, individuals, and government agencies throughout the country:
1. Rebalance the responsibility to defend cyberspace.
2. Realign incentives to favor long-term investments.
The cybersecurity strategy outlines the groundwork for increased cyber defenses and alludes to potential regulations.
Here are three tips to align your cybersecurity strategy with the White House guidelines, to avoid any breaches that your organization may be held liable for.
1. Understand Your Responsibilities
You can't assume the government will save you from cyberattacks. Your own data security is your responsibility, especially in the case of a business holding customer information.
The strategy calls out this responsibility in section 3.1: "We must hold the stewards of our data accountable for the protection of personal data; drive the development of more secure connected devices; and reshape laws that govern liability for data losses and harm caused by cybersecurity errors, software vulnerabilities, and other risks created by software and digital technologies."
Companies that handle sensitive information are required to do all they can to protect it, otherwise it could cost them. This needs to be built into your data security strategy.
2. Know the Government's Role
The White House's strategy outlines five pillars in its approach:
1. Defend Critical Infrastructure: Gas, electric, and water systems will receive direct attention from the government, but will still need the cooperation of private enterprises.
2. Disrupt and Dismantle Threat Actors: Nation-state groups are frequent sources of cybercrime. The government will work to stop these threats.
3. Shape Market Forces to Drive Security and Resilience: Federal grants will be awarded to new infrastructure that is deemed secure.
4. Invest in a Resilient Future: Next-generation technologies will determine the stability of our networks. The White House aims to be a leader in secure innovation.
5. Forge International Partnerships to Pursue Shared Goals: A partnership will be formed with friendly countries to support a safe technological ecosystem for all.
3. Keep Your Eyes on the Future
This cybersecurity strategy does not immediately introduce any new laws or regulations, although it does hint at a few, and organizations shouldn't have to be forced to properly protect their data through the threat of fines and penalties, it should be a part of your bottom-line.
The systems you put in place today can save you from an incredibly costly data breach — the average cost for American companies is up to $9.44 million, according to IBM — in the near or distant future.
Communicating best practices, introducing automated DevSecOps tools, and hosting your network on-premises are just a few ways your organization can immediately begin strengthening your data security measures.
Our reliance on technology will keep growing as software continues to becomes more efficient. The White House's National Cybersecurity Strategy aims to put measures in place today that will protect our technological infrastructure from bad actors in the future. We can't be sure what these threats will be, but we can fortify our platforms to give ourselves the best chance at staying safe.
Industry News
Mend.io and Sysdig unveiled a joint solution to help developers, DevOps, and security teams accelerate secure software delivery from development to deployment.
GitLab announced new innovations in GitLab 17 to streamline how organizations build, test, secure, and deploy software.
Kobiton announced the beta release of mobile test management, a new feature within its test automation platform.
Gearset announced its new CI/CD solution, Long Term Projects in Pipelines.
Rafay Systems has extended the capabilities of its enterprise PaaS for modern infrastructure to support graphics processing unit- (GPU-) based workloads.
NodeScript, a free, low-code developer environment for workflow automation and API integration, is released by UBIO.
IBM announced IBM Test Accelerator for Z, a solution designed to revolutionize testing on IBM Z, a tool that expedites the shift-left approach, fostering smooth collaboration between z/OS developers and testers.
StreamNative launched Ursa, a Kafka-compatible data streaming engine built on top of lakehouse storage.
GitKraken acquired code health innovator, CodeSee.
ServiceNow introduced a new no‑code development studio and new automation capabilities to accelerate and scale digital transformation across the enterprise.
Security Innovation has added new skills assessments to its Base Camp training platform for software security training.
CAST introduced CAST Highlight Extensions Marketplace — an integrated marketplace for the software intelligence product where users can effortlessly browse and download a diverse range of extensions and plugins.
Red Hat and Elastic announced an expanded collaboration to deliver next-generation search experiences supporting retrieval augmented generation (RAG) patterns using Elasticsearch as a preferred vector database solution integrated on Red Hat OpenShift AI.
Traceable AI announced an Early Access Program for its new Generative AI API Security capabilities.