CYBER THIS WEEK – APRIL 9, 2023

Strategising cybersecurity: Why a risk-based approach is key

Boards can set an organization’s risk appetite, oversee risk management processes, allocate resources and ensure preparedness to respond to cyber threats. They can ensure accurate and timely reporting from management on risks and incidents as part of their broader role in managing risk.

Strategising cybersecurity: Why a risk-based approach is key | World Economic Forum (weforum.org)

How banks elevate security in the modern threat landscape

How best can security leaders ensure the safety of bank personnel and customers, and protect the integrity of banking operations, in this ever-changing landscape? With training and technology, as well as process and procedure. Here, banking security executives describe a number of key strategies for success.

How banks elevate security in the modern threat landscape | Security Magazine

CREST publishes guide for enhancing cyber resilience in developing countries

The guide outlines that, while increased financial inclusion is a global goal, the less privileged remain highly susceptible to cyberthreats. It also describes the need for appropriate, multi-party cyber resilience testing to ensure better cyber safety in developing nations, along with advice for governing authorities.

CREST publishes guide for enhancing cyber resilience in developing countries | CSO Online

Fostering-Financial-Sector-Cyber-Resilience-in-Developing-Countries.pdf (crest-approved.org)

Cybersecurity for the IoT: How trust can unlock value

For today’s fragmented Internet of Things (IoT) to reach its potential as a fully interconnected ecosystem, the answer may lie in the convergence of cybersecurity and the IoT.

Cybersecurity for the IoT: How trust can unlock value | McKinsey

Clop Ransomware Attacks: How Should CIOs Respond?

Clop Ransomware group targeted a zero-day vulnerability in Fortra’s GoAnywhere MFT file-transfer tool, which lets companies securely exchange files. Fortra released a patch on Feb. 7. More than 3,000 organizations use GoAnywhere, according to Fortra.

Clop Ransomware Attacks: How Should CIOs Respond? (informationweek.com)

The Cybersecurity Challenges Businesses Are Facing in 2023

Bitdefender surveyed 400 IT and security professionals globally, ranging from IT managers to CISOs, in various industry sectors working in organizations with 1,000+ employees to discover the biggest cybersecurity challenges businesses face in 2023.

The Cybersecurity Challenges Businesses Are Facing in 2023 (bitdefender.com)

How the Last Big Breach Will Help You Prepare for the Next Cyber Crisis

Learning lessons from the past is crucial to developing an effective incident response strategy in cybersecurity. Cybersecurity sector is typically bad at learning lessons. It doesn’t matter how many times we see these incidents, they continue to happen over and over again. Analyzing the findings from public enquiries into major events, and what they tell us about why such seismic, and often preventable, situations occur is also important.

How the Last Big Breach Will Help You Prepare for the Next Cyber Crisis – Infosecurity Magazine (infosecurity-magazine.com)

6 Tips for Improving Network Security

In recent years, the rising cost of cyber insurance premiums has become a major concern for enterprises of all sizes. This rate environment has been driven, in part, by the drastic increase in cyberattack claims globally. Due to the interconnected nature of cyberattacks, cyber insurers are even reevaluating what gets covered—such as social engineering campaigns or state-sponsored attacks—to ensure that they can sustain systemic risks.

Given these market conditions, improving cybersecurity practices is essential for organizations to better manage costs. The following are six cybersecurity best practices that can help organizations get started on hardening their networks

Risk Management Magazine – 6 Tips for Improving Network Security (rmmagazine.com)

The importance of zero trust architecture during economic uncertainty

ZTA-based solutions enable businesses to continuously monitor user activity and authenticate, which can minimise unnecessary lateral movement. In case suspicious activity is identified, granted access can be revoked immediately. In fact, advanced ZTA solutions can even alert relevant authorities within an organisation to help companies investigate the matter immediately. This makes ZTA a must have for companies to ensure high-level cybersecurity.

Implementing zero trust architecture during economic uncertainty (information-age.com)

4 Steps for Shifting Left & Winning the Cybersecurity Battle

One method that companies are embracing to strike this balance is implementing the “shift left.” The shift left in this context refers to moving practices related to testing software as early in the development process as possible. By embracing the shift left, technology teams — specifically DevOps teams — can identify bugs, errors, and vulnerabilities early on and resolve them, resulting in high-performing, highly secure software, and applications.

4 Steps for Shifting Left & Winning the Cybersecurity Battle (darkreading.com)

Share: