CYBER THIS WEEK – APRIL 30, 2023
Strengthening the cyber risk lifecycle
In today’s business landscape, investing in tools that bring vulnerability data into comprehensive, easily digestible reports is the best way to secure a company’s operations and minimize exposure. When teams embrace a unified, automated approach to managing cyber risks across their organizations’ attack surfaces, they are taking an important step to enhance efficiency, reduce risks, minimize disruptions, increase credibility and support well-informed decisions.
Strengthening the cyber risk lifecycle | Security Magazine
Thousands of misconfigured container and artifact registries expose sensitive credentials
Shadow IT or careless configuration of container and artifact registries could give attackers access to sensitive data and inject malicious code.
2023 Marsh McLennan Cyber Handbook
The first installment of the 2023 Marsh McLennan Cyber Handbook features perspectives from business leaders across Marsh, Guy Carpenter, Mercer, and Oliver Wyman, who help clients become more resilient in managing cyber risk. Their expert insights explore some of the most significant trends in cyber readiness, cyber response, and new cyber regulations.
2023 Marsh McLennan Semi-annual Cyber Handbook: 1st
There’s No Silver Bullet for Cybersecurity
Governments are incapable of fixing the insecurity of the internet by themselves, and businesses are unlikely to do it until the economic pain of ignoring the insecurity of the internet becomes greater than the profits it can earn from it. There are no silver bullets beyond restructuring the internet to rely more on new secure private networks, particularly for the operation of critical infrastructure.
There’s No Silver Bullet for Cybersecurity (hbr.org)
Zero Trust Data Security: It’s Time to Make the Shift
Zero trust is more a security philosophy rather than a security architecture. For this reason, a successful transition to zero trust security requires strong leadership. Business leaders must avoid the misconception that zero trust is just another set of security tools
Zero Trust Data Security: It’s Time To Make the Shift (securityintelligence.com)
9 Questions for IT Leaders to Ask About Cloud Cybersecurity
Companies are increasingly leveraging cloud-based services to do business, driven by the benefits of efficiency and scalability. But rapid cloud migration is not without its challenges. Security is paramount but a considerable concern
9 Questions for IT Leaders to Ask About Cloud Cybersecurity (informationweek.com)
Cyber Certainty: Investing in Resilience During a Post-Correction Market
The combination of regulatory requirements and market reaction to cyber events is similarly elevating the role of the CISO to be more strategic in enhancing business productivity and success. CISOs and security experts must not only coexist, but they must also collaborate with the rest of the C-suite and board.
Cyber Certainty: Investing in Resilience During a Post-Correction Market (darkreading.com)
Why CISOs and legal need to be on the same page when their company is hacked
At the RSA 2023 Conference in San Francisco, a number of experts made the case that better coordination between a company’s security and legal shops can go a long way towards ensuring that companies practice good business and good security at the same time.
Increasing global cybersecurity regulation of private companies on the near horizon
Given that most companies have data assets that are global in nature, developing a unified security policy will become increasingly more nuanced and complex. Regulation requirements in various countries are inconsistent, and require a coordinated approach across international jurisdictions.
Why Backing up SaaS Is Necessary
Software-as-a-Service (SaaS) solutions have become widely adopted and mission-critical for many organisations. Many organisations ignore the threat that the data on their trusted SaaS provider’s platform might be at risk. This makes easy-to-use SaaS-protection solutions a necessity.