CYBER THIS WEEK – JANUARY 22, 2023
Ransomware revenue fell by $300 million in 2022 as more victims refuse to pay: report
Experts from block chain research firm Chainalysis attributed the drop to a variety of factors, most notably that more victims are simply refusing to pay up when threatened by criminal groups.
Think like a cybercriminal: How to strengthen your organization’s security posture
With malicious actors working to take advantage of human nature, security leaders need to work with their teams to know how to quickly respond when a crisis strikes. To accomplish this, security leaders must stop thinking of their employees as their weakest link and instead work with them to turn them into their strongest asset.
Zero Trust, Sustaining in a Difficult Economy, and Acceleration of the Decentralized Workforce Will Shape 2023
Overall this year will pose both challenges and opportunities in the cybersecurity and technology industries. Being strategic and resourceful in a pending downturn, while embracing the decentralized workplace can help you not only survive, but thrive into 2024.
How to prioritize resilience in the face of cyber-attacks
The current focus on geopolitics and third-party risk offers an entry point for a wider conversation about cyber risk. The situation is improving, but insufficiently swiftly for most organizations and businesses to be confident that they are equipped to address a major cyber event. Resilience and preparation should be at the centre of strategy.
Navigating the evolving landscape of cyber threats by utilizing advanced data analytics
Cybersecurity analytics tools are designed to collect, process and analyze vast amounts of data from various sources, such as network logs, endpoint data, and security events. By providing actionable insights and intelligence, these tools can help organizations detect and respond to cyber threats more quickly and effectively, minimizing the potential impact on their operations and reputation.
Cybersecurity Crisis Management and Business Continuity
The goal of crisis management is to minimize the aftermath, and any collateral damages, ensuring business continuity after a major incident. As so, every business that respects its reputation and cares for its prosperity and growth must be prepared to that end and build a rigid crisis management framework, in order to be able to remain resilient in the event of any unfortunate event.
People, Process and Technology: The Incident Response Trifecta
We have identified the three key pillars of an incident response program, the question likely on most minds is: where do I invest? The answer is everywhere. It is the level of investment in each pillar that becomes trickier to determine. The answer to that question depends on your risk tolerance.
Many ICS flaws remain unpatched as attacks against critical infrastructure rise
Patching vulnerabilities in industrial environments has always been challenging due to interoperability concerns, strict uptime requirements, and sometimes the age of devices. According to a recent analysis, a third of vulnerabilities don’t even have patches or remediations available.
A ransomware negotiator shares 3 tips for victim organizations
Ransomware groups are known to exploit human psychology as a tactical advantage, but that behavioral response can create additional work and slow time to recovery.
Product Security Incident Response: Key Strategies and Best Practices
A Product Security Incident Response Team (PSIRT) is responsible for identifying, assessing, and addressing vulnerabilities in a product or service. There are several key strategies and best practices to create an effective PSIRT. Understanding these strategies and best practices ensures that your organization is prepared to manage and address vulnerabilities as they arise effectively.