CYBER THIS WEEK – JUNE 9 ,2024
How actuarial tools can optimize cybersecurity technology spending
Metrics and standardized tools offer a quantitative means to evaluate the investment in new technologies while aligning it with anticipated risks.
How actuarial tools can optimize cybersecurity technology spending | Security Info Watch
3 ways manufacturers can build a culture of cyber resilience
Over the past decade, the manufacturing sector has undergone rapid digital transformation, embracing innovations such as digital twins, robotics, artificial intelligence, cloud computing and the industrial internet of things (IIoT). While these advances drive growth and efficiency, they also expose the sector to cyber threats.
Making cyber resilience a top priority for manufacturers | World Economic Forum (weforum.org)
Challenges in applying the EU Cybersecurity Index globally
The world needs cyber resilience with preventive measures to minimize threats. Redesigning the CSI with separate sub-indices for prevention and deterrence can achieve this.
Challenges in applying the EU Cybersecurity Index globally (orfonline.org)
How Mitigating Your Cybersecurity Risk Can Transform Your Business
Cyber risk insurers can help your company hedge against cybercrime. But did you know your cyber risk insurance can be a catalyst that propels your company in exciting, unexpected directions?
How Mitigating Your Cybersecurity Risk Can Transform Your Business (forbes.com)
Security chiefs under pressure from boards to downplay cyber risk: study
Research from Trend Micro shows tension between CISOs and senior enterprise leadership. Many security leaders say they’re perceived as nags.
Security chiefs under pressure from boards to downplay cyber risk: study | CIO Dive
Understanding Security’s New Blind Spot: Shadow Engineering
In the rush to digital transformation, many organizations are exposed to security risks associated with citizen developer applications without even knowing it.
Understanding Security’s New Blind Spot: Shadow Engineering (darkreading.com)
Open source, open risks: The growing dangers of unregulated generative AI
While mainstream generative AI models have built-in safety barriers, open-source alternatives have no such restrictions. Here’s what that means for cyber crime.
Open source, open risks: The growing dangers of unregulated generative AI (securityintelligence.com)
Inside the ‘Secure By Design’ Revolution
The Secure by Design Pledge is a voluntary initiative that invites companies developing enterprise software, including on-premises, cloud, and SaaS products, to demonstrate progress toward seven goals.
Inside the ‘Secure By Design’ Revolution (informationweek.com)
The Snowflake data breach is a tangled mess
A major Snowflake data breach has been linked to the recent hacks of Santander and Ticketmaster, according to cybersecurity experts.
The Snowflake Data Breach Is A Tangled Mess – Dataconomy
How to identify and implement security automation use cases
Despite organization-wide interest in implementing security automation, security leaders often struggle with identifying common security automation scenarios and implementing custom automations
How to identify and implement security automation use cases | Cybersecurity Dive