CYBER THIS WEEK – JANUARY 22, 2023

Ransomware revenue fell by $300 million in 2022 as more victims refuse to pay: report

Experts from block chain research firm Chainalysis attributed the drop to a variety of factors, most notably that more victims are simply refusing to pay up when threatened by criminal groups.

Ransomware revenue fell by $300 million in 2022 as more victims refuse to pay: report – The Record from Recorded Future News

Think like a cybercriminal: How to strengthen your organization’s security posture

With malicious actors working to take advantage of human nature, security leaders need to work with their teams to know how to quickly respond when a crisis strikes. To accomplish this, security leaders must stop thinking of their employees as their weakest link and instead work with them to turn them into their strongest asset.

Think like a cybercriminal: How to strengthen your organization’s security posture | Security Magazine

Zero Trust, Sustaining in a Difficult Economy, and Acceleration of the Decentralized Workforce Will Shape 2023

Overall this year will pose both challenges and opportunities in the cybersecurity and technology industries. Being strategic and resourceful in a pending downturn, while embracing the decentralized workplace can help you not only survive, but thrive into 2024.

Zero Trust, Sustaining in a Difficult Economy, and Acceleration of the Decentralized Workforce Will Shape 2023 – CPO Magazine

How to prioritize resilience in the face of cyber-attacks

The current focus on geopolitics and third-party risk offers an entry point for a wider conversation about cyber risk. The situation is improving, but insufficiently swiftly for most organizations and businesses to be confident that they are equipped to address a major cyber event. Resilience and preparation should be at the centre of strategy.

How to prioritize resilience in the face of cyber-attacks | World Economic Forum (weforum.org)

Navigating the evolving landscape of cyber threats by utilizing advanced data analytics

Cybersecurity analytics tools are designed to collect, process and analyze vast amounts of data from various sources, such as network logs, endpoint data, and security events. By providing actionable insights and intelligence, these tools can help organizations detect and respond to cyber threats more quickly and effectively, minimizing the potential impact on their operations and reputation.

Top 5 Cybersecurity Analytics Tools (2023) – Dataconomy

Cybersecurity Crisis Management and Business Continuity

The goal of crisis management is to minimize the aftermath, and any collateral damages, ensuring business continuity after a major incident. As so, every business that respects its reputation and cares for its prosperity and growth must be prepared to that end and build a rigid crisis management framework, in order to be able to remain resilient in the event of any unfortunate event.

Cybersecurity Crisis Management and Business Continuity | Tripwire

People, Process and Technology: The Incident Response Trifecta

We have identified the three key pillars of an incident response program, the question likely on most minds is: where do I invest? The answer is everywhere. It is the level of investment in each pillar that becomes trickier to determine. The answer to that question depends on your risk tolerance.

People, Process and Technology: The Trifecta of an Incident Response Program (securityintelligence.com)

Many ICS flaws remain unpatched as attacks against critical infrastructure rise

Patching vulnerabilities in industrial environments has always been challenging due to interoperability concerns, strict uptime requirements, and sometimes the age of devices. According to a recent analysis, a third of vulnerabilities don’t even have patches or remediations available.

Many ICS flaws remain unpatched as attacks against critical infrastructure rise | CSO Online

A ransomware negotiator shares 3 tips for victim organizations

Ransomware groups are known to exploit human psychology as a tactical advantage, but that behavioral response can create additional work and slow time to recovery.

A ransomware negotiator shares 3 tips for victim organizations | Cybersecurity Dive

Product Security Incident Response: Key Strategies and Best Practices

A Product Security Incident Response Team (PSIRT) is responsible for identifying, assessing, and addressing vulnerabilities in a product or service. There are several key strategies and best practices to create an effective PSIRT. Understanding these strategies and best practices ensures that your organization is prepared to manage and address vulnerabilities as they arise effectively.

Product Security Incident Response: Key Strategies and Best Practices (bleepingcomputer.com)

Share: