CYBER THIS WEEK – FEBRUARY 5, 2023
Firms fear software stack breach as attack surface widens
Almost 80% believe their organization is vulnerable to multi-tiered cyber-attacks that can impact the entire application stack in the next 12 months, with 48% noting that an expanded attack surface has posed more challenges.
CEO, CIO or CFO: Who Should Your CISO Report To?
CISO is essential in almost every company that relies on digital information. They are responsible for developing and implementing strategies to harden the organization’s defenses against cyberattacks. This article will explore the advantages and disadvantages of different reporting structures and give you some points to consider when structuring your organization’s CISO reporting relationship.
Slow Adoption and Expanding Attack Surface; Zero Trust Will Not Stop Over 50% Of Attacks by 2026
Unlike the traditional network security that focuses on perimeter security, the zero trust security model explicitly identifies users and devices and grants them enough access to operate with minimal friction and risk. Despite its effectiveness and the current marketing hype, Gartner warned that zero trust uptake was slow, and threat actors were shifting focus to areas beyond zero trust coverage.
Make Developers the Driver of Software Security Excellence
Many businesses are falling behind in their cybersecurity strategies and existing infrastructure. The power of skilled people is often missed in a functioning defensive program. It’s time we assess the viable quick wins that are right in front of us and use the human resources we already have in-house.
98% of organizations worldwide connected to breached third-party vendors
A total of 98% of organizations worldwide have integrations with at least one third-party vendor that has been breached in the last two years, according to a report released Wednesday from SecurityScorecard and the Cyentia Institute.
More Must Be Done To Protect Essential Industries from Cyberattacks
Essential industries keep our society going, but they also face unique cybersecurity challenges such as budgetary restrictions, largely non-technical end users and stakeholders who might not fully recognize the risks they face in today’s threat landscape.
Keeping the Lights On: How Plant Operators Manage Cyber Risk
If a region can’t keep the lights on, pretty much everything must come to a halt until the issue is remedied. For this reason, the power and energy industry has become a prime target for cyberattacks on operational technology (OT).
Think of cyber risk as business risk
Cyber risk as business risk isn’t new. For example, cybersecurity compliance has long been a reality for organizations. But trends tied to a new post-pandemic reality for employees and businesses will accelerate the blurring of cyber and business risk lines this year.
Adversarial machine learning 101: A new cybersecurity frontier
Adversarial machine learning (AML) is a dynamic and multi-faceted discipline within the realm of cybersecurity that is gaining significant attention and traction in the current digital landscape. The exponential growth of digital data and the unrelenting advancement of cyber-attacks have made the need for effective AML solutions imperative.
Black swans events are shaping the cybersecurity present and future
The digital decentralization of 2020, industry growth of 2021 and inevitable bust of 2022 have been a whirlwind of events in just three short years. But their challenges and opportunities will move us forward to a more cyber secure world.