{"id":2528,"date":"2024-07-12T18:39:23","date_gmt":"2024-07-12T18:39:23","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2528"},"modified":"2024-07-12T18:43:13","modified_gmt":"2024-07-12T18:43:13","slug":"cisa-waarschuwing-over-red-team-activiteiten-benadrukt-noodzaak-van-diepe-verdediging","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/nl\/cyberbeveiliging\/cisa-waarschuwing-over-red-team-activiteiten-benadrukt-noodzaak-van-diepe-verdediging\/","title":{"rendered":"CISA-waarschuwing over Red Team-activiteiten benadrukt noodzaak van diepgaande verdediging"},"content":{"rendered":"<p>De Cybersecurity and Infrastructure Security Agency heeft een zeer gedetailleerd advies gepubliceerd getiteld \u201cCISA Red Team's Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth.\u201d Het advies was gebaseerd op een diepgaande beoordeling uitgevoerd in 2023, inclusief TTP's die door het red team werden gebruikt. Deze bevindingen en aanbevelingen zullen executives, leiders en netwerkverdedigers helpen om de cyberbeveiliging te verbeteren.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"key-findings-and-lessons-learned\"><strong>Belangrijkste bevindingen en geleerde lessen<\/strong><\/h2>\n\n\n<p>Volgens het advies zijn er belangrijke inzichten en lessen uit de beoordeling geleerd voor de implementatie van robuuste defence-in-depth strategie\u00ebn. De belangrijkste tactieken en technieken die door het rode team werden gebruikt, zijn onder andere:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Gesimuleerde vectoren voor geavanceerde aanhoudende bedreigingen om de veerkracht van het netwerk te testen,<\/li>\n\n\n\n<li>Exploitatie van zwakke netwerksegmentatie en<\/li>\n\n\n\n<li>Geavanceerde spear-phishing voor initi\u00eble toegang.<\/li>\n<\/ul>\n\n\n\n<p>Deze resultaten benadrukken het vermogen van organisaties om meerlaagse beveiligingsmaatregelen te nemen om dergelijke bedreigingen effectief tegen te gaan.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"recommendations-to-improve-cybersecurity\"><strong>Aanbevelingen om de cyberbeveiliging te verbeteren<\/strong><\/h2>\n\n\n<p>CISA doet in zijn advies verschillende aanbevelingen om de mogelijkheden voor cyberbeveiliging, detectie, respons en jagen te verbeteren:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Implementeer defence-in-depth: <\/b>Een concept waarbij meerdere lagen van beveiligingscontroles moeten worden ge\u00efmplementeerd in een IT-omgeving ter bescherming tegen potenti\u00eble cyberdreigingen en aanvallen.<\/li>\n\n\n\n<li><strong>Gebruik robuuste netwerksegmentatie:<\/strong> Netwerksegmentatie verwijst naar het opsplitsen van het netwerk in verschillende segmenten om de verspreiding van een aanval te bemoeilijken en dus gemakkelijk onder controle te krijgen in geval van een inbreuk.<\/li>\n\n\n\n<li><strong>Baselines vaststellen:<\/strong> Implementeer baselines van netwerkverkeer, applicatie-uitvoering en accountauthenticatie om anomalie\u00ebn te identificeren die wijzen op indringingen.<\/li>\n<\/ul>\n\n\n\n<p>Deze zullen organisaties helpen om geavanceerde cyberaanvallen af te slaan en hun algehele beveiliging te verbeteren.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"importance-of-the-cisas-crosssector-cybersecurity-performance-goals\"><strong>Belang van de sectoroverschrijdende prestatiedoelen voor cyberbeveiliging van de CISA<\/strong><\/h2>\n\n\n<p>Volgens het document zijn bronnen voor het identificeren van veelvoorkomende en impactvolle bedreigingen, tactieken, technieken en procedures te vinden in CISA's Cross Sector Cybersecurity Performance Goals. Deze doelen zijn bedoeld om het volgende te doen:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Een basisset van cyberbeveiligingspraktijken bieden die van toepassing zijn op kritieke infrastructuur;<\/li>\n\n\n\n<li>Benchmarks bieden voor het meten en verbeteren van de volwassenheid van cyberbeveiliging;<\/li>\n\n\n\n<li>Combineer aanbevolen werkwijzen voor eigenaren van zowel informatietechnologie als operationele technologie;<\/li>\n\n\n\n<li>A<em>nationale veiligheidsrisico's aanpakken die verder gaan dan de risico's voor individuele entiteiten<\/em><\/li>\n<\/ul>\n\n\n\n<p>De CPG's, met diepgaand advies van industrie-experts en overheidsfunctionarissen, zijn geselecteerd om kleine en middelgrote organisaties te helpen investeren in acties op het gebied van cyberbeveiliging die beveiligingsresultaten met een grote impact opleveren.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"nists-cybersecurity-framework-alignment\"><strong>Afstemming op het cyberbeveiligingsraamwerk van NIST<\/strong><\/h2>\n\n\n<p>De CISA CPG's zijn afgestemd op de NIST CSF-functies. Deze functies omvatten:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Regeren:<\/strong> Vaststellen, communiceren en monitoren van verwachtingen en de risicomanagementstrategie van de organisatie.<\/li>\n\n\n\n<li><strong>Identificeren:<\/strong> Inzicht in de huidige cyberbeveiligingsrisico's voor de organisatie.<\/li>\n\n\n\n<li><strong>Beschermen:<\/strong> Waarborgen implementeren om de cyberbeveiligingsrisico's voor de organisatie te beheren.<\/li>\n\n\n\n<li><strong>Detecteren:<\/strong> Het vinden en analyseren van mogelijke cyberaanvallen en compromissen.<\/li>\n\n\n\n<li><strong>Reageren:<\/strong> Reageren op gedetecteerde cyberbeveiligingsincidenten.<\/li>\n\n\n\n<li><strong>Herstellen:<\/strong> Systemen, middelen en activiteiten herstellen die zijn getroffen door een cyberbeveiligingsincident.<\/li>\n<\/ul>\n\n\n\n<p>CISA werkt aan het herzien van zijn CPG's om ze in overeenstemming te brengen met versie 2.0 van NIST's CSF, zodat ze relevant en nuttig blijven in reactie op de dynamische, steeds evoluerende cyberbeveiligingsomgeving.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>Conclusie<\/strong><\/h2>\n\n\n<p>Het nieuwste advies van CISA zal dienen als een herinnering om defence-in-depth strategie\u00ebn te hanteren en goede cyberbeveiligingspraktijken toe te passen. De aanbevelingen en CPG's helpen bij het versterken van iemands cyberbeveiligingsstandpunt tegen opkomende bedreigingen.<\/p>\n\n\n\n<p>Ga voor meer informatie naar de webpagina van CISA: <strong><a href=\"https:\/\/www.cisa.gov\/securebydesign\" target=\"_blank\" rel=\"noreferrer noopener\">Veilig door ontwerp<\/a><\/strong> voor het volledige advies en andere bronnen.<\/p>","protected":false},"excerpt":{"rendered":"<p>Het Cybersecurity and Infrastructure Security Agency heeft een zeer gedetailleerd advies gepubliceerd met de titel \"CISA Red Team's Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth\". Het advies... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/nl\/cyberbeveiliging\/cisa-waarschuwing-over-red-team-activiteiten-benadrukt-noodzaak-van-diepe-verdediging\/\">Lees meer verder <span class=\"screen-reader-text\">CISA-waarschuwing over Red Team-activiteiten benadrukt noodzaak van diepgaande verdediging<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2531,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,27],"tags":[],"class_list":["post-2528","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-security","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/nl\/cyberbeveiliging\/cisa-waarschuwing-over-red-team-activiteiten-benadrukt-noodzaak-van-diepe-verdediging\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency published a very detailed advisory entitled &#8220;CISA Red Team&#8217;s Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth.&#8221; The advisory&hellip; Lees verder CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/nl\/cyberbeveiliging\/cisa-waarschuwing-over-red-team-activiteiten-benadrukt-noodzaak-van-diepe-verdediging\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-12T18:39:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-12T18:43:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\",\"datePublished\":\"2024-07-12T18:39:23+00:00\",\"dateModified\":\"2024-07-12T18:43:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"},\"wordCount\":535,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"articleSection\":[\"cybersecurity\",\"Security\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\",\"name\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"datePublished\":\"2024-07-12T18:39:23+00:00\",\"dateModified\":\"2024-07-12T18:43:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"width\":1265,\"height\":422,\"caption\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/nl\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA-waarschuwing over Red Team-activiteit benadrukt de noodzaak van diepteverdediging | Beveiligingsbriefing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/nl\/cyberbeveiliging\/cisa-waarschuwing-over-red-team-activiteiten-benadrukt-noodzaak-van-diepe-verdediging\/","og_locale":"nl_NL","og_type":"article","og_title":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency published a very detailed advisory entitled &#8220;CISA Red Team&#8217;s Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth.&#8221; The advisory&hellip; Lees verder CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth","og_url":"https:\/\/securitybriefing.net\/nl\/cyberbeveiliging\/cisa-waarschuwing-over-red-team-activiteiten-benadrukt-noodzaak-van-diepe-verdediging\/","og_site_name":"Security Briefing","article_published_time":"2024-07-12T18:39:23+00:00","article_modified_time":"2024-07-12T18:43:13+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"C\u00e9sar Daniel Barreto","Geschatte leestijd":"3 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth","datePublished":"2024-07-12T18:39:23+00:00","dateModified":"2024-07-12T18:43:13+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"},"wordCount":535,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","articleSection":["cybersecurity","Security"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/","name":"CISA-waarschuwing over Red Team-activiteit benadrukt de noodzaak van diepteverdediging | Beveiligingsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","datePublished":"2024-07-12T18:39:23+00:00","dateModified":"2024-07-12T18:43:13+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","width":1265,"height":422,"caption":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Beveiligingsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Beveiligingsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto is een gewaardeerd schrijver en expert op het gebied van cyberbeveiliging, die bekend staat om zijn diepgaande kennis en vermogen om complexe onderwerpen op het gebied van cyberbeveiliging te vereenvoudigen. Met zijn uitgebreide ervaring in netwerkbeveiliging en gegevensbescherming schrijft hij regelmatig inzichtelijke artikelen en analyses over de nieuwste trends op het gebied van cyberbeveiliging, waarmee hij zowel professionals als het publiek voorlicht.","url":"https:\/\/securitybriefing.net\/nl\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/posts\/2528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/comments?post=2528"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/posts\/2528\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/media\/2531"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/media?parent=2528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/categories?post=2528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/nl\/wp-json\/wp\/v2\/tags?post=2528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}