We can all agree that 2016 was a big year marked by some big surprises.
In several countries, voters ushered in unexpected changes, enacting dramatic sea changes in their nations’ politics. America’s election resulted in an upset victory for Donald Trump. In sports, the Chicago Cubs won their first World Series since 1908, and the Cleveland Cavaliers brought home the city’s first major professional sports championship since 1964.
And over at Yahoo! Inc., executives disclosed the largest data breach of all time – one from 2013 that the company says affected more than 1 billion users.
Yahoo was far from the only cyber security headline in 2016, though. Stories about Russian election hacking, data leaks at the NSA and concerns about Hillary Clinton’s private email server grabbed plenty of eyeballs, too. But are these the same cyber security and privacy issues that have captured the interest of readers who want to secure their own business networks?
We dug into Lunarline’s blog traffic data to determine what trended among readers looking for answers to security problems. Our top five results show a different cyber security picture in 2016:
- Top 10 Things a Cloud Service Provider Can Do to Prepare for a FedRAMP Assessment: FedRAMP has always been a challenging compliance process, but in 2016, the FedRAMP Project Management Office introduced changes in attempts to streamline accreditation. Undoubtedly, the shifts left CSPs looking for guidance on how to prepare — and that’s the focus of this blog post.
- Assessing the Usefulness of the NIST 800-53 Appendix J Privacy Controls: When the National Institute of Standards and Technology added Appendix J Privacy Controls to its publication, NIST 800-53, contractors to the federal government were left questioning the usefulness of these additional privacy controls and the requirements for complying. Lunarline covered these topics in an overview post.
- An Invitation to Hack: The 411 on Bug Bounties: Bug bounty programs — organizational efforts to open up their security concerns to the ethical hacking community — also trended in 2016. Typically, these programs offer rewards to security researchers for finding and reporting issues. Lunarline took a look at some of these programs and how they work.
- Fix FedRAMP? A 3PAO’s Perspective: With the cost and headache that can be associated with FedRAMP compliance, it’s no big surprise that organizational readers would take interest in ideas for fixing the program. Lunarline offered a few solutions here.
- Lurking In the Shadows: Monitoring the Dark Web Is Essential to Protect Your Organization: The dark web is a shady place full of all kinds of illicit activity. Thus, it might be surprising to suggest that it can also be an important asset for cyber intelligence initiatives. Lunarline makes the case in this post.
We at Lunarline always look for the cyber security issues of highest interest to businesses and other organizations, and we will continue to write about our perspectives and findings on our blog in 2017.
If you are planning changes in your security initiatives this year, we look forward to hearing from you and discussing how we can help you get where you need to be. Visit us online at Lunarline.com, or contact us here.