{"id":6381,"date":"2019-10-24T19:55:39","date_gmt":"2019-10-24T23:55:39","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/?p=6381"},"modified":"2019-10-24T19:55:39","modified_gmt":"2019-10-24T23:55:39","slug":"cyware-weekly-threat-intelligence-october-14-october-18-2019","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/2019\/10\/24\/cyware-weekly-threat-intelligence-october-14-october-18-2019\/","title":{"rendered":"Cyware Weekly Threat Intelligence, October 14 &#8211; October 18, 2019"},"content":{"rendered":"<p>This link gives weekly news about cyber security, this includes the good and bad stuff.<\/p>\n<div><strong>The Good<\/strong><\/div>\n<div>Another week has almost come to an end, and it was quite an eventful one in cyberspace. Let\u2019s begin our weekly roundup with the positive cybersecurity advancements. The Medical Imaging &amp; Technology Alliance (MITA) has released a cybersecurity playbook on medical device security and risk management processes. The Healthcare and Public Health Sector Coordinating Council (HSCC) has published guidance focusing on supply chain cybersecurity risk management. Meanwhile, Microsoft and NIST are working on a new guide to make enterprise patch management easier.<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>https:\/\/cyware.com\/weekly-threat-briefing\/cyware-weekly-threat-intelligence-october-14-october-18-2019-ddd4<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This link gives weekly news about cyber security, this includes the good and bad stuff. The Good Another week has almost come to an end, and it was quite an eventful one in cyberspace. Let\u2019s begin our weekly roundup with the positive cybersecurity advancements. The Medical Imaging &amp; Technology Alliance (MITA) has released a cybersecurity [&hellip;]<\/p>\n","protected":false},"author":22923,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[805801],"tags":[],"class_list":{"0":"post-6381","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-08-social-engineering-encoding-and-encryption","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/posts\/6381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/users\/22923"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/comments?post=6381"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/posts\/6381\/revisions"}],"predecessor-version":[{"id":6382,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/posts\/6381\/revisions\/6382"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/media?parent=6381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/categories?post=6381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2019\/wp-json\/wp\/v2\/tags?post=6381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}