{"id":2528,"date":"2024-07-12T18:39:23","date_gmt":"2024-07-12T18:39:23","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2528"},"modified":"2024-07-12T18:43:13","modified_gmt":"2024-07-12T18:43:13","slug":"cisa-varning-om-red-team-aktivitet-betonar-behovet-av-fordjupat-forsvar","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/cisa-varning-om-red-team-aktivitet-betonar-behovet-av-fordjupat-forsvar\/","title":{"rendered":"CISA-varning om Red Team-aktivitet understryker behovet av djupg\u00e5ende f\u00f6rsvar"},"content":{"rendered":"<p>Cybersecurity and Infrastructure Security Agency publicerade en mycket detaljerad r\u00e5dgivning med titeln \u201cCISA Red Team's Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth.\u201d R\u00e5dgivningen baserades p\u00e5 en djupg\u00e5ende bed\u00f6mning utf\u00f6rd 2023, inklusive TTP:er som anv\u00e4ndes av red teamet. Dessa fynd och rekommendationer kommer att hj\u00e4lpa chefer, ledare och n\u00e4tverksf\u00f6rsvarare att f\u00f6rb\u00e4ttra cybers\u00e4kerheten.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"key-findings-and-lessons-learned\"><strong>Viktiga slutsatser och l\u00e4rdomar<\/strong><\/h2>\n\n\n<p>Enligt rapporten finns det viktiga insikter och l\u00e4rdomar fr\u00e5n utv\u00e4rderingen som kan anv\u00e4ndas f\u00f6r att implementera robusta djupf\u00f6rsvarsstrategier. Viktiga taktiker och tekniker som anv\u00e4nds av det r\u00f6da teamet inkluderar:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Simulerade avancerade ih\u00e5llande hotvektorer som syftar till att testa n\u00e4tverkets motst\u00e5ndskraft,<\/li>\n\n\n\n<li>Utnyttjande av svag n\u00e4tverkssegmentering och<\/li>\n\n\n\n<li>Sofistikerad spear-phishing f\u00f6r initial \u00e5tkomst.<\/li>\n<\/ul>\n\n\n\n<p>Dessa resultat understryker organisationers f\u00f6rm\u00e5ga att vidta s\u00e4kerhets\u00e5tg\u00e4rder i flera lager f\u00f6r att effektivt kunna motverka s\u00e5dana hot.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"recommendations-to-improve-cybersecurity\"><strong>Rekommendationer f\u00f6r att f\u00f6rb\u00e4ttra cybers\u00e4kerheten<\/strong><\/h2>\n\n\n<p>CISA ger genom sin r\u00e5dgivning olika rekommendationer f\u00f6r att f\u00f6rb\u00e4ttra cybers\u00e4kerhet, uppt\u00e4ckt, svar och jaktf\u00f6rm\u00e5ga, bland annat<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Implementera djupf\u00f6rsvar: <\/b>Ett koncept d\u00e4r flera lager av s\u00e4kerhetskontroller b\u00f6r implementeras \u00f6ver en IT-milj\u00f6 f\u00f6r skydd mot potentiella cyberhot och attacker.<\/li>\n\n\n\n<li><strong>Anv\u00e4nd robust n\u00e4tverkssegmentering:<\/strong> N\u00e4tverkssegmentering inneb\u00e4r att n\u00e4tverket delas upp i olika segment f\u00f6r att f\u00f6rsv\u00e5ra spridningen av en attack och d\u00e4rmed g\u00f6ra det l\u00e4ttare att begr\u00e4nsa den vid ett eventuellt intr\u00e5ng.<\/li>\n\n\n\n<li><strong>Uppr\u00e4tta baslinjer:<\/strong> Implementera baslinjer f\u00f6r n\u00e4tverkstrafik, applikationsk\u00f6rning och kontoverifiering f\u00f6r att identifiera avvikelser som indikerar intr\u00e5ng.<\/li>\n<\/ul>\n\n\n\n<p>Dessa kommer att hj\u00e4lpa organisationer att avv\u00e4rja avancerade cyberattacker och f\u00f6rb\u00e4ttra sin \u00f6vergripande s\u00e4kerhet.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"importance-of-the-cisas-crosssector-cybersecurity-performance-goals\"><strong>Betydelsen av CISA:s sektors\u00f6vergripande prestationsm\u00e5l f\u00f6r cybers\u00e4kerhet<\/strong><\/h2>\n\n\n<p>Enligt dokumentet finns resurser f\u00f6r att identifiera vanliga och effektfulla hot, taktiker, tekniker och f\u00f6rfaranden i CISA:s Cross Sector Cybersecurity Performance Goals. Dessa m\u00e5l \u00e4r avsedda att g\u00f6ra f\u00f6ljande:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tillhandah\u00e5lla en grundl\u00e4ggande upps\u00e4ttning cybers\u00e4kerhetsrutiner som \u00e4r till\u00e4mpliga p\u00e5 all kritisk infrastruktur;<\/li>\n\n\n\n<li>Tillhandah\u00e5lla riktm\u00e4rken f\u00f6r att m\u00e4ta och f\u00f6rb\u00e4ttra cybers\u00e4kerhetsmognaden;<\/li>\n\n\n\n<li>Kombinera rekommenderade metoder f\u00f6r \u00e4gare av b\u00e5de informationsteknik och operativ teknik;<\/li>\n\n\n\n<li>A<em>dd hantera nationella s\u00e4kerhetsrisker som g\u00e5r ut\u00f6ver riskerna f\u00f6r enskilda enheter<\/em><\/li>\n<\/ul>\n\n\n\n<p>CPG:erna, som har tagits fram i samr\u00e5d med branschexperter och myndighetspersoner, har valts ut f\u00f6r att hj\u00e4lpa sm\u00e5 och medelstora organisationer att investera i cybers\u00e4kerhets\u00e5tg\u00e4rder som leder till effektiva s\u00e4kerhetsresultat.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"nists-cybersecurity-framework-alignment\"><strong>Anpassning av NIST:s ramverk f\u00f6r cybers\u00e4kerhet<\/strong><\/h2>\n\n\n<p>CISA CPG:erna \u00e4r anpassade till NIST CSF-funktioner. Dessa funktioner inkluderar:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Styr:<\/strong> Fastst\u00e4lla, kommunicera och \u00f6vervaka f\u00f6rv\u00e4ntningar och organisationens riskhanteringsstrategi.<\/li>\n\n\n\n<li><strong>Identifiera:<\/strong> F\u00f6rst\u00e5else f\u00f6r aktuella cybers\u00e4kerhetsrisker f\u00f6r organisationen.<\/li>\n\n\n\n<li><strong>Skydda:<\/strong> Implementering av skydds\u00e5tg\u00e4rder f\u00f6r att hantera cybers\u00e4kerhetsriskerna f\u00f6r organisationen.<\/li>\n\n\n\n<li><strong>Detektera:<\/strong> Hitta och analysera m\u00f6jliga cyberattacker och kompromisser.<\/li>\n\n\n\n<li><strong>Svara:<\/strong> Agera p\u00e5 uppt\u00e4ckta cybers\u00e4kerhetsincidenter.<\/li>\n\n\n\n<li><strong>\u00c5terst\u00e4ll:<\/strong> \u00c5terst\u00e4lla system, tillg\u00e5ngar och verksamhet som p\u00e5verkats av en cybers\u00e4kerhetsincident.<\/li>\n<\/ul>\n\n\n\n<p>CISA arbetar med att \u00f6verhaula sina CPG:er f\u00f6r att g\u00f6ra dem kompatibla med version 2.0 av NIST:s CSF s\u00e5 att de f\u00f6rblir relevanta och hj\u00e4lpsamma som svar p\u00e5 den dynamiska, st\u00e4ndigt utvecklande cybers\u00e4kerhetsscenen.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>Sammanfattningsvis<\/strong><\/h2>\n\n\n<p>CISA:s senaste r\u00e5d ska fungera som en p\u00e5minnelse om att ha strategier f\u00f6r djupf\u00f6rsvar p\u00e5 plats och anv\u00e4nda god cybers\u00e4kerhetspraxis. Rekommendationerna och CPG:erna hj\u00e4lper till att st\u00e4rka ens cybers\u00e4kerhetsst\u00e4llning mot nya hot.<\/p>\n\n\n\n<p>F\u00f6r mer information, bes\u00f6k CISA:s webbplats: <strong><a href=\"https:\/\/www.cisa.gov\/securebydesign\" target=\"_blank\" rel=\"noreferrer noopener\">S\u00e4ker genom design<\/a><\/strong> f\u00f6r fullst\u00e4ndig r\u00e5dgivning och andra resurser.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and Infrastructure Security Agency publicerade ett mycket detaljerat r\u00e5d med titeln \"CISA Red Teams operationer mot en federal civil verkst\u00e4llande organisation belyser behovet av djupf\u00f6rsvar\". R\u00e5dgivningen ... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/cisa-varning-om-red-team-aktivitet-betonar-behovet-av-fordjupat-forsvar\/\">Continue reading <span class=\"screen-reader-text\">CISA-varning om Red Team-aktivitet understryker behovet av djupg\u00e5ende f\u00f6rsvar<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2531,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,27],"tags":[],"class_list":["post-2528","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-security","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/cisa-varning-om-red-team-aktivitet-betonar-behovet-av-fordjupat-forsvar\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency published a very detailed advisory entitled &#8220;CISA Red Team&#8217;s Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth.&#8221; The advisory&hellip; Forts\u00e4tt l\u00e4sa CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/cisa-varning-om-red-team-aktivitet-betonar-behovet-av-fordjupat-forsvar\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-12T18:39:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-12T18:43:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\",\"datePublished\":\"2024-07-12T18:39:23+00:00\",\"dateModified\":\"2024-07-12T18:43:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"},\"wordCount\":535,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"articleSection\":[\"cybersecurity\",\"Security\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\",\"name\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"datePublished\":\"2024-07-12T18:39:23+00:00\",\"dateModified\":\"2024-07-12T18:43:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"width\":1265,\"height\":422,\"caption\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/sv\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CISA-varning om Red Team-aktivitet betonar behovet av Defense-in-Depth | S\u00e4kerhetsbriefing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/cisa-varning-om-red-team-aktivitet-betonar-behovet-av-fordjupat-forsvar\/","og_locale":"sv_SE","og_type":"article","og_title":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency published a very detailed advisory entitled &#8220;CISA Red Team&#8217;s Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth.&#8221; The advisory&hellip; Forts\u00e4tt l\u00e4sa CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth","og_url":"https:\/\/securitybriefing.net\/sv\/cybersakerhet\/cisa-varning-om-red-team-aktivitet-betonar-behovet-av-fordjupat-forsvar\/","og_site_name":"Security Briefing","article_published_time":"2024-07-12T18:39:23+00:00","article_modified_time":"2024-07-12T18:43:13+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Skriven av":"C\u00e9sar Daniel Barreto","Ber\u00e4knad l\u00e4stid":"3 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth","datePublished":"2024-07-12T18:39:23+00:00","dateModified":"2024-07-12T18:43:13+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"},"wordCount":535,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","articleSection":["cybersecurity","Security"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/","name":"CISA-varning om Red Team-aktivitet betonar behovet av Defense-in-Depth | S\u00e4kerhetsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","datePublished":"2024-07-12T18:39:23+00:00","dateModified":"2024-07-12T18:43:13+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","width":1265,"height":422,"caption":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"S\u00e4kerhetsgenomg\u00e5ng","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"S\u00e4kerhetsgenomg\u00e5ng","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar Daniel Barreto","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto \u00e4r en uppskattad cybers\u00e4kerhetsskribent och expert, k\u00e4nd f\u00f6r sin djupg\u00e5ende kunskap och f\u00f6rm\u00e5ga att f\u00f6renkla komplexa cybers\u00e4kerhets\u00e4mnen. Han har l\u00e5ng erfarenhet av n\u00e4tverkss\u00e4kerhet och dataskydd och bidrar regelbundet med insiktsfulla artiklar och analyser om de senaste trenderna inom cybers\u00e4kerhet, som utbildar b\u00e5de yrkesverksamma och allm\u00e4nheten.","url":"https:\/\/securitybriefing.net\/sv\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/2528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/comments?post=2528"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/2528\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media\/2531"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media?parent=2528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/categories?post=2528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/tags?post=2528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}