Close Menu
CloudSecNewsHub
  • News
  • Technologies
  • Automation
  • Updates
  • Guides
  • Tools
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

What's Hot

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025
Facebook X (Twitter) Instagram
Trending
  • Google Cloud Security Plitz attacks e -hunting, improves vision
  • How to pick up criminal evidence for Microsoft 365
  • Cloud security treatment: American federal edition
  • The most prominent report: 2025 Experience of exposure to cloud data
  • Artificial intelligence agents to convert Google Cloud Security Ops
  • The necessity of cloud security in the electronic scene today
  • Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies
  • Ransomware Spike displays cracks in cloud safety
Facebook X (Twitter) Instagram Pinterest Vimeo
CloudSecNewsHubCloudSecNewsHub
  • News

    How to pick up criminal evidence for Microsoft 365

    May 8, 2025

    The most prominent report: 2025 Experience of exposure to cloud data

    May 7, 2025

    Artificial intelligence agents to convert Google Cloud Security Ops

    May 6, 2025

    Ransomware Spike displays cracks in cloud safety

    May 5, 2025

    Sentinelone wins the best safety point and cloud security at the 2025 SC Awards

    May 1, 2025
  • Technologies

    Gartner: How to build a safe institution cloud environment

    April 21, 2025

    Promote South Korea's national security by adopting the cloud

    April 11, 2025

    “The traditional methods of cloud safety, where organizations depend on the segmented cloud safety tools, are not simply enough”

    April 3, 2025

    Stream.security The cloud solution in actual time in industry with TRP technology designed to dilute proactively from the effect of breach in the cloud

    April 1, 2025

    Skyhawk's creation platform mentioned in 2024 Gartner Emerging Tech Impact Radar: Preventive Cyber ​​Security

    March 28, 2025
  • Automation

    Cloud Security Alliance launches an initiative to automate compliance

    April 30, 2025

    The security automation market to see a great expansion

    April 25, 2025

    GSA FedRAMP '20X' rejuvenation keys to automation, to the approvals in “Weeks” – MERITALK

    April 16, 2025

    Cortex Cloud – cloud safety conversion

    April 11, 2025

    TUFIN extends the possibilities of the security of the cloud and the network with the latest version of the synchronous pavilion

    April 8, 2025
  • Updates

    Google Cloud Security Plitz attacks e -hunting, improves vision

    May 8, 2025

    April 2025 Correction Tuesday: updates and analysis

    April 15, 2025

    Google Cloud 2025: News and updates

    April 12, 2025

    5 Google Big Google Aman ads on the next 2025

    April 9, 2025

    Google offers a unified safety platform and safety agents driven by artificial intelligence

    April 9, 2025
  • Guides

    CISO guide for effective cloud security strategies

    April 30, 2025

    Singapore offers instructions to support the cloud and the elasticity of the first place

    April 29, 2025

    Singapore has new guidelines to enhance flexibility and security for cloud services and data centers

    April 5, 2025

    What is the safety of the cloud? | IBM

    April 3, 2025

    Google gets Wiz for $ 32 billion to boost cloud safety

    March 19, 2025
  • Tools

    Cloud security treatment: American federal edition

    May 7, 2025

    The necessity of cloud security in the electronic scene today

    May 6, 2025

    Crowdstrike (CRWD) launches Amnesty International Security tools to improve the cloud p

    April 30, 2025

    The 5 best CNAPP benefits that you need to know in 2025

    April 26, 2025

    The security coalition cloud launches the latest security report. Saas

    April 26, 2025
  • Compliance

    Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies

    May 5, 2025

    Ensuring commitment to international standards

    April 29, 2025

    Thales and Deloitte are an alliance to enhance the security and compliance data strategies

    April 22, 2025

    AWS security compliance is easy: IT-Magic Devops solutions for a stronger security situation

    April 21, 2025

    5 ways that banks can achieve smooth security and compliance in 2025

    April 14, 2025
Login
CloudSecNewsHub
Home»Guides»Regulations are still needed to force the adoption of cybersecurity measures.
Guides

Regulations are still needed to force the adoption of cybersecurity measures.

CloudSecNewsHubBy CloudSecNewsHubOctober 18, 2023No Comments8 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Regulations Are Still Needed To Force The Adoption Of Cybersecurity
Share
Facebook Twitter LinkedIn Pinterest Email

Andrew Brooks/Getty Images

Regulations are still needed to ensure that organizations are required to adopt measures designed to strengthen their cybersecurity posture.

Singapore this week released guidelines it said would help organisations, including small and medium-sized businesses, better understand the risks associated with using cloud services and what they, and cloud service providers, should do to secure cloud environments.

Also: 6 Simple Cybersecurity Rules You Can Implement Now

The accompanying cloud security guides aim to facilitate the adoption of national cybersecurity standards, Cyber ​​Essentials and Cyber ​​Trust, developed by the Cyber ​​Security Agency of Singapore (CSA), which announced their launch at the annual International Cyber ​​Week conference in Singapore.

The accompanying guides, published in collaboration with the Cloud Security Alliance, were developed in close collaboration with three cloud providers – Amazon Web Services (AWS), Google Cloud, and Microsoft – which provided relevant customer insights and market statistics. The cloud providers also “verified” the content provided in the accompanying guides, CSA said.

The guides outline the risks and responsibilities organizations have with the cloud, and the steps they should take to protect their environments, including employee training and mechanisms for tracking and monitoring their cloud inventory. The documents also include provider guides for environments running on AWS, Microsoft, and Google platforms, organized based on the Cyber ​​Essentials and Cyber ​​Trust standards.

Also: Top 9 Mobile Security Threats and How to Avoid Them

“A common confusion when organizations use the cloud is the division of responsibility between them as cloud users, and the cloud providers,” CSA said. “In a cloud deployment, there is shared responsibility, and organizations may not be fully aware of which areas they are responsible for. This can increase the potential for misconfiguration, malicious attacks, and/or data breaches.”

The freely available guides are expected to help the 27% of businesses in Singapore that use cloud computing services, the government agency said, citing a 2022 study by the Telecommunications Media Development Authority (IMDA).

Singapore this week also took further steps towards expanding its national security marking initiative to include medical devices, with the launch of a sandbox where manufacturers can test their products. Sandbox participants will then provide feedback on the requirements and application processes, against which the devices will be assessed under the medical marking scheme, which is set to be launched at a later date.

Also: What is the Dark Web? Here's Everything You Need to Know Before Entering It

The Canadian Space Agency said the project will run for nine months, and feedback will be used to adjust operational workflows and requirements in the scheme, where necessary. The project was launched in collaboration with the Ministry of Health, the Health Sciences Authority and Synapse.

The cybersecurity agency noted that 15%, or more than 16,000 medical devices in local public health care institutions, are connected to the Internet, and that medical devices are increasingly connected to hospital and home networks. This could lead to increased cybersecurity risks, as vulnerabilities in software used for clinical diagnosis, for example, could be exploited to generate false diagnoses. Unsecured medical devices could also be targeted in denial-of-service attacks, preventing patients from receiving treatment.

Malicious hackers could also eavesdrop on this equipment to compromise the hospital network, potentially leading to data leaks or network shutdowns.

According to Safety Standards Canada, by expanding the safety rating system to include medical devices, manufacturers will feel motivated to include safety in the design of their products, and healthcare operators will be able to make more informed decisions about the use of such devices. The system includes four ratings, with each level reflecting additional testing that the product was evaluated against.

Also: Ransomware Victims Continue to Pay Ransoms, While Also Bracing for AI-Enhanced Attacks

The sandbox will allow device manufacturers to test their products based on various assessments, including software binary analysis, penetration testing, and security assessment.

However, such initiatives and other security best practices can only go so far if they are presented in the form of guidelines and advice, rather than orders that companies must adopt.

Many technology practitioners and CISOs will look at the guides and industry best practices, but doing so can only go so far if they are presented as advice, not regulations, said Karan Sondhi, vice president and chief technology officer for public sector at Trilix Security.

Initiatives like the security tagging program, for example, serve as an information tool, not an enforcement tool, Sondhi told ZDNET in an interview on the sidelines of the conference.

Harold Rivas, chief information security officer at Trilix, agreed, noting that the labeling system helps with purchasing decisions and raises awareness of potential risks. Rivas said the system gives decision makers a reason to consider alternatives and serves as a good reference point for independently verified best practices.

Also: Singapore, US pledge to combat online fraud through cross-border cooperation

Ultimately, there should be clear mandates to drive the industry toward clear outcomes, Rivas said.

Such requirements could include, for example, a proper patch management strategy and a robust monitoring system, Sondhi said. They should be accompanied by rollout roadmaps, he added, so that market players are given the timelines needed to ensure compliance.

He noted that there is certainly resistance to such mandates due to concerns about the cost and time it would take to bring products to market, and said that regulations should not be overly complex. They could also refer to accompanying standards bodies tasked with providing more detail and updating best practice adoption where necessary. This would free governments from having to keep up with market changes and instead focus on imposing high-level requirements, he said.

Law enforcement is also a good starting point when the road to cyber resilience is long and complex.

OT organizations, in particular, have ecosystems that need to be managed differently from their IT infrastructure, Sondhi said. They will need to take inventory of all their OT systems and technologies, and ensure that third-party tools are secured and integrated so that they have clear visibility across the entire supply chain.

Governments, including Singapore and the United States, are now helping the operational technology and critical information infrastructure sectors overcome these issues, Rivas said. However, he said the journey is long and will take time.

Also: Singapore, US to Collaborate on AI Governance, Form Joint Group

Governments can facilitate this process by imposing certain requirements on the industry, allowing all players in the industry to gradually adapt to these requirements, Sondhi said. For example, organizations that provide government-related services such as smart meters must demonstrate that they have a clear inventory of their systems and a timeline for managing corrections. Vendors who violate the requirements set out in these contractual agreements should be penalized, he added.

Such comprehensive regulatory frameworks help move actions forward and protect both organizations and citizens, Rivas added.

Strong cyber resilience is essential, especially as some of these sectors face increasing threats.

For example, public sector organizations in the Asia-Pacific region have had to fend off an average of nearly 3,000 attacks per week over the past six months, according to Vivek Gollapalli, Asia-Pacific chief information security officer at Check Point Software Technologies.

The education and research sector saw the highest number of weekly attacks, with 4,057 attacks per institution, over the past six months, followed by the healthcare sector with 2,958 attacks, and then the government and military sector with 2,882 attacks.

Also: What is Phishing? Everything You Need to Know to Protect Yourself from Scammers

Digital transformation is increasing the attack surface, and ransomware poses a serious threat with the ability to shut down entire networks, Gollapalli said. These risks have prompted governments to protect the internet infrastructure and operational technology industries.

He added that some of these sectors are still emerging, as smart nations are still being built using emerging technologies such as self-driving vehicles, smart cameras, and other Internet of Things devices.

As the OT infrastructure continues to evolve, the ability to manage the entire ecosystem will become more complex. For example, a different approach to applying security patches to OT devices may be required. And as the demand for connectivity grows, organizations will need to know which devices are connected, requiring more security assurances and built-in tools.

He said that with infrastructure management sometimes overlapping between the public and private sectors, we will also need to create an appropriate framework to protect the entire operational technology ecosystem.

There is still much to learn and different approaches will be needed, Gollaballi said. Amid this ongoing evolution, he urged continued conversations and collaboration between governments, OT manufacturers and security actors to close the gaps.

adoption Cybersecurity Force measures needed Regulations
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAWS announces Cloud Companion Guide for CSA Cyber ​​Trust brand
Next Article How to choose the best cloud security posture management tools
admin
CloudSecNewsHub
  • Website

Related Posts

Guides

CISO guide for effective cloud security strategies

April 30, 2025
Guides

Singapore offers instructions to support the cloud and the elasticity of the first place

April 29, 2025
Guides

Singapore has new guidelines to enhance flexibility and security for cloud services and data centers

April 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss
Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

CloudSecNewsHubMay 8, 2025
News

How to pick up criminal evidence for Microsoft 365

CloudSecNewsHubMay 8, 2025
Tools

Cloud security treatment: American federal edition

CloudSecNewsHubMay 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Most Popular

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Don't Miss

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
© 2025 CloudSecNewsHub. All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?