CYBER THIS WEEK – APR 28,2024
The biggest data breach fines, penalties, and settlements so far
Sizable fines assessed for data breaches in recent years suggest that regulators are getting more serious about cracking down on organizations that don’t properly protect consumer data.
The biggest data breach fines, penalties, and settlements so far | CSO Online
Preventing Ransomware Attacks at Scale
A future where ransomware attacks are significantly harder to pull off is possible. It’s time for software companies to make this future a reality
Preventing Ransomware Attacks at Scale (hbr.org)
Where Are You on the Cybersecurity Readiness Index? Cisco thinks you’re Probably Overconfident
The most alarming takeaway from Cisco’s new Cybersecurity Readiness Index report is that even after decades of having the importance of cybersecurity driven home, cyber threats are still taken too lightly.
Navigating Through the Storm: Cybersecurity and its Stakeholders
From disrupting critical navigation systems to potentially stealing sensitive cargo data, cyberattacks pose a significant risk to safety, security, and overall operational efficiency
Navigating Through the Storm: Cybersecurity and its Stakeholders (maritime-executive.com)
What is success in cybersecurity? Failing less.
Defenders aren’t measured by pure wins or losses. Intrusions will happen, and their job is to keep a bad situation from getting worse.
What is success in cybersecurity? Failing less. | Cybersecurity Dive
Minimum Viable Compliance: What You Should Care About and Why
Understand what security measures you have in place, what you need to keep secure, and what rules you have to show compliance with.
Minimum Viable Compliance: What You Should Care About and Why (darkreading.com)
Why cyber-attacks shouldn’t be viewed as isolated incidents
The cybercrime landscape is evolving. With too many threats to guarantee safety, businesses must focus on curating an effective security culture to stay prepared
Why cyber attacks shouldn’t be viewed as isolated incidents – Raconteur
Counting the Cost: The Price of Security Neglect
Security and privacy leaders have had to evolve to become powerful partners in convincing their organizations why investment in security is so important.
Counting the Cost: The Price of Security Neglect – CPO Magazine
Cybersecurity In A Data-Driven World: The Problem Of Invalid Data
Cybersecurity as an industry has a data-maturity problem and an even larger observability issue. We use anecdotal breach and vulnerability data when considering security tools and controls to invest in
Cybersecurity In A Data-Driven World: The Problem Of Invalid Data (forbes.com)
How threat intelligence can improve vulnerability management outcomes
Threat Intelligence in conjunction with established vulnerability management practices can help organizations identify, prioritize and remediate vulnerabilities that have a higher risk profile or have the potential to have a greater impact on an organization.
How threat intelligence can improve vulnerability management outcomes – Intelligent CIO APAC