CYBER THIS WEEK – JULY 17, 2022
Data breaches explained: Types, examples, and impact
When data is lost in a breach, the costs and consequences for the companies that hold the data and the individuals whose data is stolen can be significant and long-lasting
How organisations can use vulnerability to create cyber resilience
For organizations to move past this protracted mistrust, they must exploit a different kind of critical vulnerability from what cyber professionals are used to—the vulnerability of an organization to be truly seen. They must embrace the willingness to be transparent within their organization and ecosystem about shortcomings in cyber resilience posture
6 Ways SASE Helps Protect Your Data
Secure access service edge (SASE) converges traditional networking security and Network-as-a-Service technologies into one single comprehensive framework. It is not a new technology. The technology already exists, but rather than users coming to your network (i.e., clunky VPNs), SASE brings the network to every user, device and app. Let’s dig into six use cases where a SASE framework is valuable.
Why We Need Accountability for Effective Cybersecurity Frameworks
The shared responsibility model, which delineates ownership of specific risks by different participants in the ecosystem so all bases are covered by those in the best position to do so, provides a useful mechanism for minimizing the frequency and seriousness of security incidents and simplifying the management of the problem.
Rethinking Vulnerability Management in a Heightened Threat Landscape
Companies must take strategic steps immediately to ensure their business-critical applications remain secure, and they must do so with their current resources. Prioritizing the modernization of aging technology stacks will be essential to mitigate rising cybersecurity vulnerabilities and ensure the security of the organization’s critical systems and applications from malicious cyber campaigns. To do this effectively, hard prioritization decisions will have to happen.
Cyber Attacks in the Manufacturing Sector
The rapid evolution in digital technologies must be met with corresponding modifications to the cybersecurity approach. However, making these modifications is a demanding task, especially given the pace of change, as well as the advanced skill sets required. Here are a few solutions that will become relevant for implementing change in the future.
The Race Is On to Fight a Cyber Threat That Doesn’t Exist
The cybersecurity community was set alight last week by the announcement of new cryptographic algorithms designed to protect our digital futures. Now the race is on to roll out software and hardware that will secure computers against a threat that still only exists in theory.
DHS Review Board Deems Log4j an ‘Endemic’ Cyber Threat
Vulnerability will remain a “significant” threat for years to come and highlighted the need for more public and private sector support for open source software ecosystem, Cyber Safety Review Board says.
New Lilith ransomware emerges with extortion site, lists first victim
Lilith is a C/C++ console-based ransomware discovered by JAMESWT and designed for 64-bit versions of Windows. Like most ransomware operations launching today, Lilith performs double-extortions attacks, which is when the threat actors steal data before encrypting devices.
5 Key Things We Learned from CISOs of Smaller Enterprises Survey
As business begins its return to normalcy (however “normal” may look), CISOs at small and medium-size enterprises (500 – 10,000 employees) were asked to share their cybersecurity challenges and priorities, and their responses were compared the results with those of a similar survey from 2021.