Blog

Blog

Evolve Your Security Strategy to Prepare for DORA

Although the DORA compliance deadline is further away, financial institutions regulated by the Act should start preparing their journey now, before the last minute panic keeps knocking on your door. Antonio Sanchez breaks down the five DORA pillars and highlights what it takes to evolve your security effort.
Blog

Patch Tuesday Update - July 2023

Today’s Microsoft Security Update addressed 130 vulnerabilities, including 9 that are rated as Critical. This is double the number fixed from last month, June 2023.Microsoft included two security advisories this month, ADV230001 and ADV230002.The ADV230001 security advisory addresses some drivers that were certified by the Microsoft’s Windows Hardware Developer Program (MWHDP) that have been used...
Blog

Remote Code Execution Vulnerability in IBM i CVE-2023-30990

Fortra’s Vulnerability Research Team (VRT) has provided a scan check for CVE-2023-30990 - Unauthenticated RCE in IBM i DDM Service in Fortra VM.Per an IBM security bulletin, IBM i is vulnerable to a remote attacker executing arbitrary unauthenticated CL commands as a QUSER, a workstation user role without special authorities, due to weak error handling in the DDM architecture.IBM i DDM...
Blog

Supply Chain Risk

The supply chains of today’s global economy rely heavily on technology and information systems to deliver finished goods and services to the end user. However, for all the benefits of a hyperconnected economy this introduces, supply chains also carry with them a high degree of risk.
Blog

What Is ITAR Compliance? Regulations, Penalties & More

The International Traffic in Arms Regulations (ITAR) controls the sale, manufacture, import, and export of defense-related services, articles, and technical data on the United States Munitions List (USML). ITAR is a set of US regulations overseen and administered by the State Department designed to protect the national security interests of the United States. ITAR applies to defense companies that handle military and defense-related information, including universities and research centers. Due to its security implications and foreign relations interests, the United States highly regulates information relating to its defense industry. Therefore, there are stiff penalties for violating or mishandling the sensitive data specified by USML. ITAR Regulations The overall thrust of ITAR regulations is to ensure military technology, both physical materials and technical data related to defense, are restricted to only United States citizens or those otherwise authorized, with access provided on a compliant network. The overriding objective of ITAR is to safeguard defense-related goods, especially defense technologies and information, to ensure they don’t fall into the wrong hands, such as unauthorized parties. Below are the items subject to ITAR control, organized by their 21 USML categories based on the Electronic Code of Federal Regulations (e-CFR): Category I—Firearms and related articles Category II—Guns and Armament Category III—Ammunition and ordnance Category IV—Launch vehicles, guided missiles, ballistic missiles, rockets, torpedoes, bombs, and mines. Category VI—Surface vessels of war and special naval equipment Category VII—Ground vehicles Category VIII—Aircraft and related articles Category IX—Military training equipment and training Category X—Personal protective equipment Category XI—Military electronics Category XII — Fire control, laser, imaging, and guidance equipment Category XIII — Materials and miscellaneous articles Category XIV—Toxicological agents, including chemical agents, biological agents, and associated equipment. Category XV— Spacecraft and related articles. Category XVI—Nuclear weapons-related articles. Category XVII—Classified articles, technical data, and defense services not otherwise enumerated. Category XVIII — Directed energy weapons. Category XIX — Gas turbine engines and associated equipment. Category XX — Submersible vessels and related articles. Category XXI — Articles, technical data, and defense services not otherwise enumerated. In addition to weaponry and equipment, the defense-related articles profusely mentioned in the list include military gear, technical documentation, software, and instruments. What Does It Mean to be ITAR-Compliant? To be ITAR-compliant means to dutifully abide by its regulations. First and foremost, ITAR applies to any company that conducts business with the US military. Secondly, it involves any organization, whether third-party or otherwise, that deals with defense services, articles, or data specified in USML. This applies to various types of organizations, such as contractors, manufacturers, wholesalers, technology/hardware/software vendors, and third-party suppliers involved in manufacturing, distributing, and selling ITAR services or products. If you are among these companies or work with companies in your supply chain that handle ITAR-controlled items, then you must remain ITAR-compliant. All of the following are the necessary steps to become or remain ITAR-compliant: Step 1: Register with the Directorate of Defense Trade Controls (DDTC) of the Bureau of Political-Military Affairs under the State Department's auspices. First-time entrants pay the $2,250 application fee. ITAR registration must be renewed every 12 months with a renewal fee of between $2,250 and $2,750 per year. However, your registration renewal documents must be submitted 60 days before the registration expiration date. Step 2: Setting up formal ITAR compliance programs inside the business. There are procedures necessary for the protection of ITAR-related technical data. Implementing this requires understanding how ITAR regulations apply to the company’s USML goods, services, or data. This understanding equips the organization to define and implement the processes and programs needed to demonstrate and strengthen a commitment to ITAR compliance. Step 3: Utilizing cloud-compliant storage A secure data center to protect technical data is cardinal to ITAR compliance. This cloud storage should have sufficient controls to prevent access to unauthorized foreigners, individuals, or governments. This demands implementing data security controls to ensure technical data that travels through the cloud and endpoints with end-to-end encryption. Moreover, strict key management protocols must be applied such that the decryption keys aren’t accessible by a third party. Step 4: Keeping a comprehensive record of defense goods This includes the recipients' identity and their country, including the end-use and end-users of the defense item. While the steps enumerated above should be followed, the best practice for companies handling ITAR-regulated materials is to adhere to the data security guidelines specified in NIST SP 800-53, which defines the standards for safeguarding information systems that federal agencies should comply with. ITAR Penalties and Violations Due to the high-security stakes involved, there are severe penalties for violating ITAR:
Blog

Cyber Insurance - Assessing Risks and Securing Your Future

Cyber insurance is not the most glittering side of cybersecurity, but it has certainly earned its place in today's security debate. According to Statista, as of 2021, an average of 48 percent of organizations in selected countries worldwide had cyber insurance, with numbers being slightly higher for countries such as the U.S. (50 percent), Sweden (55 percent), and Austria (66 percent). Current...
Blog

Infosecurity Europe 2023 – That’s a Wrap!

Infosecurity Europe has closed its doors for another year. The aftermath of these events can be a strange time; still reeling from the chaos of the show floor and nursing feet unaccustomed to such intense use, it’s often difficult to make sense of everything we’ve learned.