CYBER THIS WEEK – JULY 17, 2022

Data breaches explained: Types, examples, and impact

When data is lost in a breach, the costs and consequences for the companies that hold the data and the individuals whose data is stolen can be significant and long-lasting

Data breaches explained: Types, examples, and impact | CSO Online

How organisations can use vulnerability to create cyber resilience

For organizations to move past this protracted mistrust, they must exploit a different kind of critical vulnerability from what cyber professionals are used to—the vulnerability of an organization to be truly seen. They must embrace the willingness to be transparent within their organization and ecosystem about shortcomings in cyber resilience posture

Cyber trust issues: How vulnerability creates cyber resilience | World Economic Forum (weforum.org)

6 Ways SASE Helps Protect Your Data

Secure access service edge (SASE) converges traditional networking security and Network-as-a-Service technologies into one single comprehensive framework. It is not a new technology. The technology already exists, but rather than users coming to your network (i.e., clunky VPNs), SASE brings the network to every user, device and app. Let’s dig into six use cases where a SASE framework is valuable.

6 Ways SASE Helps Protect Your Data (securityintelligence.com)

Why We Need Accountability for Effective Cybersecurity Frameworks

The shared responsibility model, which delineates ownership of specific risks by different participants in the ecosystem so all bases are covered by those in the best position to do so, provides a useful mechanism for minimizing the frequency and seriousness of security incidents and simplifying the management of the problem.

Why We Need Accountability For Effective Cybersecurity Frameworks (forbes.com)

Rethinking Vulnerability Management in a Heightened Threat Landscape

Companies must take strategic steps immediately to ensure their business-critical applications remain secure, and they must do so with their current resources. Prioritizing the modernization of aging technology stacks will be essential to mitigate rising cybersecurity vulnerabilities and ensure the security of the organization’s critical systems and applications from malicious cyber campaigns. To do this effectively, hard prioritization decisions will have to happen.

Rethinking Vulnerability Management in a Heightened Threat Landscape | Threatpost

Cyber Attacks in the Manufacturing Sector

The rapid evolution in digital technologies must be met with corresponding modifications to the cybersecurity approach. However, making these modifications is a demanding task, especially given the pace of change, as well as the advanced skill sets required. Here are a few solutions that will become relevant for implementing change in the future.

Cyber Attacks In The Manufacturing Sector – New Technology – India (mondaq.com)

The Race Is On to Fight a Cyber Threat That Doesn’t Exist

The cybersecurity community was set alight last week by the announcement of new cryptographic algorithms designed to protect our digital futures. Now the race is on to roll out software and hardware that will secure computers against a threat that still only exists in theory.

The Race Is On to Fight a Cyber Threat That Doesn’t Exist – Bloomberg

DHS Review Board Deems Log4j an ‘Endemic’ Cyber Threat

Vulnerability will remain a “significant” threat for years to come and highlighted the need for more public and private sector support for open source software ecosystem, Cyber Safety Review Board says.

DHS Review Board Deems Log4j an ‘Endemic’ Cyber Threat (darkreading.com)

New Lilith ransomware emerges with extortion site, lists first victim

Lilith is a C/C++ console-based ransomware discovered by JAMESWT and designed for 64-bit versions of Windows. Like most ransomware operations launching today, Lilith performs double-extortions attacks, which is when the threat actors steal data before encrypting devices.

New Lilith ransomware emerges with extortion site, lists first victim (bleepingcomputer.com)

5 Key Things We Learned from CISOs of Smaller Enterprises Survey

As business begins its return to normalcy (however “normal” may look), CISOs at small and medium-size enterprises (500 – 10,000 employees) were asked to share their cybersecurity challenges and priorities, and their responses were compared the results with those of a similar survey from 2021.

5 Key Things We Learned from CISOs of Smaller Enterprises Survey (thehackernews.com)

 

Share: