{"id":2658,"date":"2018-02-13T11:44:59","date_gmt":"2018-02-13T14:44:59","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=2658"},"modified":"2018-02-13T11:44:59","modified_gmt":"2018-02-13T14:44:59","slug":"dept-homeland-security-cyber-comparte-una-herramienta-para-obtener-un-reinicio-este-ano","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=2658","title":{"rendered":"Dept Homeland Security Cyber comparte una herramienta para obtener un reinicio este a\u00f1o"},"content":{"rendered":"<p>El Departamento de seguridad nacional planea actualizar su sistema para compartir autom\u00e1ticamente informaci\u00f3n de amenazas de seguridad cibern\u00e9tica con empresas, proveedores de infraestructuras cr\u00edticas y otras agencias federales en este a\u00f1o.<!--more--><\/p>\n<p><strong><img loading=\"lazy\" class=\" alignright\" src=\"https:\/\/cdn.defenseone.com\/media\/img\/upload\/2018\/01\/26\/012518cybersharingNG\/defense-large.jpg\" alt=\"\" width=\"389\" height=\"178\" \/><\/strong>The Homeland Security Department plans to update\u00a0its system for automatically sharing cybersecurity threat information with companies, critical infrastructure providers and other federal agencies this coming summer or fall, a top official said\u00a0Thursday.<\/p>\n<p>More than 200 organizations have signed up to automatically receive the indicators, but most of them aren\u2019t using that information to automatically block malicious traffic into their networks, Jeanette Manfra, assistant secretary in Homeland Security\u2019s Office of Cybersecurity and Communications,\u00a0said.<\/p>\n<p>Generally, that\u2019s because customer organizations say the indicators don\u2019t include enough information for them to determine what\u2019s truly relevant, Manfra told an audience at the industry group\u00a0<span class=\"caps\">US<\/span>\u00a0Telecom\u2019s cybersecurity policy\u00a0forum.<\/p>\n<p>Homeland Security hopes to remedy that with the update, she\u00a0said.<\/p>\n<p>\u201cIf you\u2019re not automating the whole \u2026 process, it\u2019s not really getting us to that next level of automated defense,\u201d Manfra\u00a0said.<\/p>\n<p>Homeland Security launched its automated indicator sharing\u00a0<a href=\"https:\/\/www.us-cert.gov\/ais\" target=\"_blank\" rel=\"noopener noreferrer\">program<\/a>\u00a0in March 2016, after it was authorized by Congress in a major 2015 cybersecurity bill. The list of indicator recipients includes all major federal\u00a0agencies.<\/p>\n<p>The update will also include a capability for customers to provide automated feedback to Homeland Security about what they\u2019re doing with the cyber threat indicators the department passes along and how useful they are, Manfra\u00a0said.<\/p>\n<p>The automated indicator sharing update will come at roughly the same time as an update to the technical standards, known as\u00a0<span class=\"caps\">STIX<\/span>\u00a0and\u00a0<span class=\"caps\">TAXII<\/span>, that define how the government and other organizations share cyber threat information, Manfra\u00a0said.<\/p>\n<p><span class=\"caps\">STIX<\/span>\u00a0stands for \u201cStructured Threat Information eXpression\u201d and\u00a0<span class=\"caps\">TAXII<\/span>\u00a0stands for \u201cTrusted Automated eXchange of Indicator\u00a0Information.\u201d<\/p>\n<p><strong>Fuente:<\/strong>\u00a0<em><a href=\"http:\/\/www.defenseone.com\/technology\/2018\/01\/dhs-cyber-info-sharing-tool-get-reboot-year\/145517\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.defenseone.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El Departamento de seguridad nacional planea actualizar su sistema para compartir autom\u00e1ticamente informaci\u00f3n de amenazas de seguridad cibern\u00e9tica con empresas, proveedores de infraestructuras cr\u00edticas y&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2658"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2658"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2658\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2658"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2658"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}