The CrowdStrike Meltdown: A Wake-up Call for Cybersecurity

The incident serves as a stark reminder of the fragility of our digital infrastructure. By adopting a diversified, resilient approach to cybersecurity, we can mitigate the risks and build a more secure digital future.

The CrowdStrike Meltdown: A Wake-up Call for Cybersecurity (darkreading.com)

Ensuring quality in DORA compliance

The interplay between compliance and quality is crucial in cyber security. So, as regulatory frameworks like DORA begin to shape cyber security practices, it is imperative that organizations are integrating quality assurance measures to mitigate risk effectively.

Quality in DORA compliance (cshub.com)

SMEs can turn cybersecurity risk into opportunity. Here’s how

In today’s digital landscape, the size of an enterprise no longer dictates its vulnerability to cyber threats. Cybercriminals often target smaller companies that serve larger clients, exploiting weaker security measures as a gateway to more lucrative targets.

Here’s how SMEs can turn cybersecurity risk into opportunity | World Economic Forum (weforum.org)

Surging data breach disruption drives costs to record highs

Security teams are getting better at detecting and responding to breach incursions, but attackers are inflicting greater pain on organizations’ bottom lines.

Surging data breach disruption drives costs to record highs (securityintelligence.com)

How to measure the success of identity security initiatives

Modern organizations recognize the potential dangers of poor identity practices and are now embracing a security-first approach. As enterprise security leaders work to improve their identity security postures, they are turning to new metrics to benchmark their efforts and measure success.

How to measure the success of identity security initiatives | Security Magazine

CISO mentoring – who to turn to when the worst happens

Those who get the role of a CISO may have overcome some professional hurdles, but are they ready to face what comes as part of the job? And who do they ask for advice? 

CISO mentoring – who to turn to when the worst happens | Computer Weekly

Where Does Liability Reside After the CrowdStrike Outage?

Responsibility for the outage’s repercussions may have to be decided in court. That could set a tone for policies on third-party tech snafus.

Where Does Liability Reside After the CrowdStrike Outage? (informationweek.com)

Will the public nature of ransom payments change CISO strategy over whether to pay?

Reports that a Fortune 50 company paid a $75 million ransom to the Dark Angels ransomware group back in March is raising questions about whether CISOs should revisit their ransomware decision processes.

Will the public nature of ransom payments change CISO strategy over whether to pay? | CSO Online

How Continuous Cyber Assessment Can Improve Third-Party Cyber Risk Management

Organizations should adopt continuous monitoring to effectively manage third-party risk and stay ahead of the ever-changing threat landscape. By doing so, they can ensure a more resilient security posture, protecting their assets, reputation and bottom line from the growing array of cyber threats.

How Continuous Cyber Assessment Can Improve Cyber Risk Management (forbes.com)

Why hugely profitable corporations won’t spend enough to keep hackers from stealing your private info

Data breaches affecting hundreds of thousands or millions of consumers have become such familiar features of the consumer landscape that the guilty companies respond with a standard playbook replete with promises to customers.

Column: The ATT and UnitedHealth breaches put the public at risk – Los Angeles Times (latimes.com)

 

Share: