Menu
Log in


INTERNATIONAL FOUNDATION FOR
CULTURAL PROPERTY PROTECTION

Log in

News


  • October 30, 2023 7:35 AM | Anonymous

    Reposted from The Art Newspaper

    Environmental activists defaced the Louvre pyramid on 27 October, covering the landmark glass monument with orange paint. Protestors from the Dernière Rénovation group threw balloons at the famous glass structure while one of the demonstrators climbed up the edge of the pyramid; according to the Telegraph, a dozen people were arrested following the incident.

    A Louvre spokesperson confirmed to The Art Newspaper that the activists attempted to cover the pyramid, the museum’s main entrance, with an orange liquid. “One of them climbed onto the pyramid's outer glass roof using climbing equipment. The liquid was sprayed onto the glass; traces are visible on the [structure]. No damage to the pyramid has been reported at this stage. Visitor access to the museum was maintained throughout the operation,” the spokesperson adds.

    The website of Dernière Rénovation says that humanity has just “513 days left” until societal collapse (referring to the carbon emissions peak predicted for 2025), adding that: “It is now up to us, ordinary citizens, to enforce the commitments to which our government refuses to comply. It is up to us to enter into civil resistance.” The group is demanding that the French government implements a nationwide plan for the thermal insulation of buildings.

    The glass pyramid, designed by the Chinese-American architect I.M. Pei, was inaugurated by the then French president François Mitterrand on 4 March 1989 after years of vitriolic debate—unheard in Paris since the early days of the “useless and monstrous” Eiffel Tower. Supported by a 200-ton steel and aluminum structure, the pyramid is surrounded by water basins and three smaller pyramids.

    See Original Post
  • October 29, 2023 12:56 PM | Anonymous

    Reposted from AMM

    Save the Date! We're heading to Columbus, OH in 2024!

    Join us in one of the fastest growing cities in the Midwest in 2024 - Columbus, Ohio!

    With its diverse neighborhoods, thriving food scene, and 30+ museums and galleries, we can't wait to explore Columbus, Ohio, with you next summer. 

    We'll kick off the conference with a virtual day on Wednesday, July 24, hosted in collaboration with the Ohio Museums Association. Then, we'll gather together in-person at the Hilton Columbus at Easton from July 31-August 3 for sessions and many opportunities to connect with our peers. Of course, we'll also get out and experience Columbus museums!

    In the coming weeks, we'll announce this year's conference theme, provide instructions for booking your room at the conference hotel, and open the Call for Proposals. Stay tuned!

    See Original Post
  • October 29, 2023 12:49 PM | Anonymous

    Reposted from CISA

    Today, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the National Security Agency (NSA) and the Multi-State Information Sharing and Analysis Center (MS-ISAC) published “Phishing Guidance, Stopping the Attack Cycle at Phase One” to help organizations reduce likelihood and impact of successful phishing attacks. It provides detailed insight into malicious actor techniques, as well as technical mitigations and best practices to help prevent successful phishing attempts.  

    A form of social engineering, malicious actors commonly use phishing with the intent to get their targeted victims to visit an illegitimate website or to download malware. To help organizations better understand this activity, this guide categorizes phishing into two common tactics: phishing to obtain login credentials and phishing to deploy malware. It expands upon the two tactics by detailing the techniques frequently used by these actors, such as impersonating supervisors/trusted colleagues, using voice over internet protocol to spoof caller identification, and using publicly available tools to facilitate spear phishing campaigns. 

    With our NSA, FBI, and MS-ISAC partners, CISA produced this guide to provide practical, actionable steps to reduce the effectiveness of phishing as an initial access vector. Many of the controls described in this guide can be implemented by technology vendors, reducing burden and increasing security at scale.  

    This guide also recommends software manufacturers incorporate secure by design principals and tactics into their software development practices. The authoring agencies provide several recommendations to mitigate the success of phishing emails reaching users and users interacting with the email.   

    In addition to the joint guide, CISA published a blog with more information on phishing and this joint guide.  

    All organizations, from small and medium-sized businesses to software manufacturers, are encouraged to review this joint guide and blog to better understand evolving phishing techniques and implement tailored cybersecurity controls and best practices to reduce the risk of compromise.

    See Original Post
  • October 29, 2023 12:37 PM | Anonymous

    Reposted from CISA

    The Cybersecurity Infrastructure Security Agency (CISA) is pleased to formally announce next steps of an important effort to update the National Cyber Incident Response Plan (NCIRP). As directed by the White House, in the 2023 National Cybersecurity Strategy, CISA will lead the process to update the NCIRP.  

     

    As set forth in the National Cybersecurity Strategy Implementation Plan, CISA, in coordination with the Office of the National Cyber Director (ONCD), will gather input from public and private sector partners– including the federal interagency, Sector Risk Management Agencies, and regulators to incorporate appropriate changes to the NCIRP to make it more modern, agile, and flexible. The updated NCIRP will strengthen existing processes, procedures, and systems to more fully reflect that a “call to one is a call to all.” 

     

    First published in 2016, the NCIRP is the Nation’s framework for coordinated response to significant cyber incidents. Since that time, much has changed to both the threat landscape and the cyber defense ecosystem. Through the Joint Cyber Defense Collaborative (JCDC), CISA will work to ensure that the updated NCIRP addresses significant changes in policy and cyber operations since the initial NCIRP was released. 

    In leading the development of NCIRP 2024, CISA will ensure the work is grounded in the following principles:  

     

    1. Collaboration. National cyber incident response requires deep commitment to partnerships across all levels of government, industry and with our international partners. The NCIRP 2024 will reflect this commitment to the vast community of diverse stakeholders and promote collaboration. 
    2. Shared Responsibility. Cybersecurity is a collaborative effort with entities across the cybersecurity ecosystem uniquely contributing to a national cyber incident response. The NCIRP 2024 will challenge traditional methods of working with our partners, and move toward more forward-leaning, action-oriented collaboration to deploy the full potential of each party’s authorities, capabilities, and expertise.  
    3. Learning from the Past. The past eight years have seen cyber incidents of unprecedented scale, impact, and sophistication. The NCIRP 2024 will incorporate lessons learned from past cybersecurity incidents to and further enhance incident response coordination efforts.  
    4. Keeping Pace with Innovation. The cybersecurity landscape is a complex ever-evolving environment. The NCIRP 2024 will integrate processes capable of maneuvering its dynamic nature. This approach reflects a shift to greater proactivity for achieving clearly defined and intended outcomes. This change demonstrates our commitment to the sophisticated cybersecurity landscape by remaining vigilant and acting quickly whenever needed.   

    The NCIRP 2024 planning initiative is part of the JCDC Planning Agenda, bringing together government and the private sector to execute cyber defense plans that achieve specific risk reduction goals and enable more focused collaboration.  

    We are committed to remaining transparent about the work being performed throughout this process over the next year and a half and invite the public to follow its progress by visiting The National Cyber Incident Response Plan (NCIRP) or reviewing the fact sheet.

    We look forward to the work ahead and are grateful for the willingness of our colleagues across all levels of government, the private sector and civil society to participate in this important process.

    See Original Post
  • October 17, 2023 9:47 PM | Anonymous

    Reposted from DHS

    WASHINGTON – Today, the Department of Homeland Security (DHS) released the 2024 Homeland Threat Assessment (HTA), which continues to identify a high risk of foreign and domestic terrorism in 2024. The HTA provides the public and the Department’s partners with a detailed report on the most pressing threats to the United States as part of the Biden Administration’s continuing effort to assist them in preparing for, preventing, and responding to the diverse and dynamic threat environment.  

    Going forward, the annual HTA will serve as the primary mechanism for sharing the terrorism threat level, which has previously been done through the National Terrorism Advisory System (NTAS). The issuance of NTAS advisories will be reserved for situations where DHS needs to alert the public about a specific or imminent terrorist threat or about a change in the terrorism threat level. This shift will provide the public and DHS partners both in-depth annual reports and urgent updates, as needed.  

    “Sharing information with the public on the threats we face is a vital part of protecting our homeland from today’s evolving security challenges,” said Secretary of Homeland Security Alejandro N. Mayorkas. “The annual Homeland Threat Assessment is a publicly available resource on the most pressing challenges facing the nation. By sharing our analysis of the threat landscape, we will enable our partners across state, local, tribal, and territorial government, along with the private and non-profit sectors, to make better-informed decisions that account for these security challenges.”   

    Assessments from the 2024 HTA:  

    • Foreign and Domestic Terrorism: The Department expects the threat of violence from individuals radicalized in the United States to remain high, but largely unchanged, mainly seen through lone offenders or small group attacks that occur with little warning. While sustained counterterrorism pressure has significantly degraded the ability of foreign terrorist organizations to target U.S. interests, foreign terrorist groups like al-Qa’ida and ISIS are seeking to rebuild overseas, and they maintain worldwide networks of supporters that could seek to target the homeland. 
    • Border and Immigration Security: The complex border and immigration security challenges we have faced over the last year are likely to continue. In addition to the immigration challenges, the trend of an increased supply of fentanyl and variations in its production during the last year that have increased the lethality of these drugs is expected to continue. 
    • Foreign Misinformation: The spread of mis-, dis-, and malinformation aimed at undermining trust in government institutions, social cohesion, and democratic processes will remain a likely strategy for adverse nation-states. Foreign actors leverage cyber and Artificial Intelligence (AI) tools to bolster their malign influence campaigns by improving the translation quality of their content. 
    • Economic Security: We expect adverse nation states to continue using predatory economic practices, espionage, and cyber-attacks to try harm the U.S. economy, gain advantage for foreign companies, and steal U.S. intellectual property and trade secrets. 

    Examples of DHS Efforts to Combat Threats Identified in the 2024 HTA: 

    • United States Secret Service’s National Threat Assessment Center (NTAC) provided over 280 trainings and briefings to over 28,000 participants in the past year, the most in the NTAC’s history, including to state and local law enforcement, government officials, educators, mental health professionals, faith-based leaders, and workplace security managers across the country.  
    • In 2022, DHS’s Nonprofit Security Grant Program (NSGP) awarded over $250 million in funding to support target hardening and other physical security enhancements to non-profit organizations at high risk of terrorist attack.   
    • DHS provides funding for state, local, tribal, and territorial governments, nonprofits, and institutions of higher education with funds to establish or enhance capabilities to prevent targeted violence and terrorism through its Targeted Violence and Terrorism Prevention (TVTP) Grant Program. On September 6, 2023, DHS awarded $20 million in funding to 34 organizations working to develop and strengthen their community’s capability to combat targeted violence and terrorism.  
    • In addition to biometric and biographic screening and vetting of every individual encountered, CBP has expanded information sharing agreements with international partners to enhance their ability to prevent, detect, and investigate trafficking and other crimes. CBP’s National Targeting Center continuously works to detect individuals and travelers that threaten our country's security, while also building a network of partner nations committed to fighting global threats.  
    • DHS launched the Prevention Resource Finder (PRF) website in March 2023 in collaboration with more than a dozen federal partners. The PRF is a comprehensive web repository of federal resources available to help communities understand, mitigate, and protect themselves from targeted violence and terrorism.  
    • The DHS Center for Faith-Based and Neighborhood Partnerships engages a coalition of faith-based and community organizations, as well as members of the Faith-Based Security Advisory Council (FBSAC), which DHS reconstituted in July 2022, to help build the capacity of faith-based and community organizations seeking to protect their places of worship and community spaces.  
    • I&A’s National Threat Evaluation and Reporting Program continues to provide tools and resources for federal, state, local, tribal, and territorial partners on preventing terrorism and targeted violence, including online suspicious activity reporting training.  
    • DHS’s Transportation Security Administration (TSA) Intermodal Security Training and Exercise Program (I-STEP) and Exercise Information System (EXIS®) work with government and private sector partners – including owners and operators of critical transportation infrastructure – to enhance security and reduce risks posed by acts of terrorism.  
    • Among many investments and initiatives to counter fentanyl and transnational criminal organizations, the Department's recent Operations Blue Lotus and Four Horsemen stopped nearly 10,000 pounds of fentanyl in just two months. CBP’s Operation Artemis is building on that effort by leveraging intelligence and investigative information derived from Operation Blue Lotus to target the fentanyl supply chain. Concurrently, USBP’s Operation Rolling Wave is significantly increasing inbound inspections at Southwest border checkpoints and HSI is running Blue Lotus 2.0, to continue significantly increasing resources to Ports of Entry, while increasing coordination of operations to target the fentanyl supply chain.  
    • DHS’s Cybersecurity and Infrastructure Security Agency (CISA) works with government and private sector partners – including owners and operators of critical infrastructure and public gathering places – to prepare for and respond to cyberattacksas well as enhance security and mitigate risks posed by acts of terrorism and targeted violence by providing resources addressing Active ShootersSchool Safety, Bombing Prevention, and Soft Targets-Crowded Places.  
    • DHS’s Center for Prevention Programs and Partnerships (CP3) educates and trains stakeholders on how to identify indicators of radicalization to violence, where to seek help, and the resources that are available to prevent targeted violence and terrorism. 
    • In 2021, 2022, and 2023 DHS designated domestic violent extremism as a “National Priority Area” within its Homeland Security Grant Program (HSGP), enabling our partners to access critical funds that help prevent, prepare for, protect against, mitigate, respond to, and recover from related threats.  
    • SchoolSafety.gov consolidates school safety-related resources from across the government. Through this website, the K-12 academic community can also connect with school safety officials and develop school safety plans.  

    See Original Post

  • October 17, 2023 9:43 PM | Anonymous

    Reposted from CISA

    The Cybersecurity and Infrastructure Security Agency (CISA) is pleased to announce the release of a new resource titled, Security Planning Workbook, which can assist critical infrastructure owners and operators with developing a foundational security plan. This workbook is designed to be flexible and scalable to suit the needs of most facilities. It is intended for any individual who is involved with an organization’s security planning efforts, including those with varying degrees of security expertise, who are charged with the safety and security of facilities and people. This product also provides descriptions of critical elements of security planning information, offers a multitude of resources, and includes fillable fields to guide stakeholder efforts.

    See Original Post

  • October 17, 2023 9:38 PM | Anonymous

    Reposted from CISA

    Today, the Cybersecurity and Infrastructure Security Agency (CISA) is pleased to release a new resource, Protecting Houses of Worship: Perimeter Security Considerations Infographic. This product is a companion piece to the CISA and Federal Bureau of Investigation (FBI) co-branded Protecting Places of Worship: Six Steps to Enhance Security Fact SheetThe infographic provides Houses of Worship stakeholders with low- to no-cost protective measures to enhance physical security. It also highlights grants and resources available to assist houses of worship in conducting vulnerability assessments, developing and updating security strategies and plans, bolstering physical security, and minimizing the impact of a potential attack.

    See Original Post

  • October 17, 2023 9:31 PM | Anonymous

    Reposted from CISA

    • On September 28, the Cybersecurity and Infrastructure Security Agency (CISA) kicked off the 20th Cybersecurity Awareness Month. In tandem, CISA also launched a new, enduring cybersecurity awareness program known as “Secure Our World.” The Secure Our World program promotes behavioral change in all Americans, with a particular focus on how individuals, families and small to medium-sized businesses can Secure Our World by focusing on four critical actions: using strong passwords and a password manager, turning on multifactor authentication (MFA), recognizing and reporting phishing, and updating software. It also asks technology manufacturers to Secure our Products by designing products that are cybersecure right out of the box. Secure Our World is the theme for this year’s Cybersecurity Awareness Month and will remain the enduring theme for future awareness month campaigns.

      This October and year-round, CISA challenges everyone to help secure our

      ·        Use strong passwords that are long, random, and unique to each account, and use a password manager to generate them and to save them.

      ·        Turn on multifactor authentication on all accounts that offer it. We need more than a password on our most important accounts, like email, social media, and financial accounts.

      ·        Recognize and report phishing, as we like to say, think before you click. Be cautious of unsolicited emails or texts or calls asking you for personal information, and don't click on links or open attachments from unknown sources.

      ·        Update software. In fact, enable automatic updates on software so the latest security patches keep devices we are connected to continuously up to date.

    •  world by adopting four simple steps that everyone can take to stay safe online:

    • Additionally, as part of the effort to Secure Our World, we offer resources and tips: 

    ·        For individuals and families, the Secure Our World program emphasizes the importance of securing personal accounts, offering guidance on personal device safety, safe internet browsing practices, social media usage, and protecting personal information online. 

    ·        Small and medium-sized businesses (SMBs) face unique challenges, so we are working to help them Secure Our World by offering tools and resources that can help keep their businesses, employees, customers and, ultimately, our communities safer.

    ·        Tech manufacturers can Secure Our World by implementing security features built-in by design. Default settings should have the highest security measures implemented, and individuals can manually bypass security features if they don’t want them. Users should not have to opt-in to necessary security measures to make their products safe to use. Products should be safe for end users right out of the box.

    By committing to safe online behaviors, we can easily minimize or prevent cybercriminals and hackers from infiltrating our devices and online accounts.

    See Original Post


  • October 17, 2023 9:24 PM | Anonymous

    Reposted from CISA

    Today, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Emergency Management Agency (FEMA) announced the opening of the application process for the Tribal Cybersecurity Grant Program (TCGP) to help tribal governments address cybersecurity risks and threats. The cyber grant program, established by the State and Local Cybersecurity Improvement Act as part of the Bipartisan Infrastructure Law, helps address the unique challenges tribal governments face when defending against cyber threats.    

      

    Digital threats impacting Native American and Alaska Native tribes are increasing and becoming more complex. Tribal sovereignty creates unique cybersecurity challenges for these groups that often lack or can’t easily access resources needed to address them.    

      See Original Post

  • October 17, 2023 9:17 PM | Anonymous

    Reposted from CISA

    Today, CISA and the National Security Agency (NSA) published Identity and Access Management: Developer and Vendor Challenges, authored by the Enduring Security Framework (ESF), a CISA- and NSA-led working panel that includes a public-private cross-sector partnership. ESF aims to address risks that threaten critical infrastructure and national security systems.

    This publication, which follows ESF's Identity and Access Management Recommended Best Practices Guide for Administrators, assesses and addresses challenges developers and technology manufacturers face in identity and access management (IAM). The guidance specifically addresses technology gaps that limit the adoption and secure employment of multifactor authentication (MFA) and single sign-on (SSO) technologies within organizations.

    Although the publication primarily addresses challenges facing large organizations, it also provides recommendations applicable to smaller organizations. CISA encourages cybersecurity defenders to review this guidance and to speak to their software vendors about implementing its recommendations.

    See Original Post


  
 

1305 Krameria, Unit H-129, Denver, CO  80220  Local: 303.322.9667
Copyright © 1999 International Foundation for Cultural Property Protection.  All Rights Reserved