CYBER THIS WEEK – JULY 31, 2022
Why Layer 8 Is Great
The difference between the legitimate use of an application and abuse of that application (i.e., fraud) is the intent of the end user responsible for the activity. When we look at the concept of fraud in this manner, it is easy to see that visibility into “what” the end user is doing inside the application session isn’t enough. We also need visibility into “how” they are doing it.
Why Layer 8 Is Great (darkreading.com)
Six cyber security holes you need to plug now
Just because you’re not a large enterprise or a household name, that doesn’t mean your business doesn’t need to worry about security breaches. Indeed, it might surprise you to discover the truth is actually quite the opposite: smaller businesses are the most likely to be vulnerable, and attackers know that.
Six cyber security holes you need to plug now | IT PRO
Digital Trust Is the Goal of Cybersecurity: Why Zero Trust Needs To Evolve To Include Identity-First Security
The enterprise environment is made up of a complex combination of hybrid and multicloud environments, as well as swathes of applications and processes—each requiring new tools, new approaches and a paradigm shift to ensure operations, compliance and security.
Data Protection for Whatever Comes Next
Cybersecurity boils down to securing your data or data protection. But that simple concept has turned into a monumental task that is only exacerbated every time we move our data to a new platform. How do we secure data today, to be ready for whatever comes next in computing?
Data Protection for Whatever Comes Next – CISO Series
Researchers Warns of Increase in Phishing Attacks Using Decentralized IPFS Network
The decentralized file system solution known as IPFS is becoming the new “hotbed” for hosting phishing sites, researchers have warned.
Threat Actors Pivot around Microsoft’s Macro-Blocking in Office
Cybercriminals turn to container files and other tactics to get around the company’s attempt to thwart a popular way to deliver malicious phishing payloads.
Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office | Threatpost
Data breach costs record $4.3M with firms passing buck to customers
Average cost of a data security breach has hit another record-high of $4.35 million and 60% of businesses have opted to increase the price of their products and services to buffer the loss incurred, reveals IBM’s 2022 research.
Data breach costs record $4.3M with firms passing buck to customers | ZDNet
Half of 10.0 CVSS vulnerabilities reported so far in 2022 scored incorrectly
Flashpoint on Thursday released its mid-year vulnerability intelligence report which found that while Flashpoint collected 11,860 vulnerabilities in the first six months of 2022, the CVE/NVD services failed to report and detail some 27.3% of them.
Confessions Of A Cybersecurity Pro: We’re Making It Too Easy For Attackers
“Never trust, always verify” should become the guiding principle throughout your organization. From individual contributors to managers to executives and boards, we must all look for ways to adopt zero-trust tenets and make them easier to adopt. This includes the security posture.
Confessions Of A Cybersecurity Pro: We’re Making It Too Easy For Attackers (forbes.com)
India Must Build A Strong Cyber Infrastructure Before Welcoming CBDCs
Reserve Bank of India’s (RBI) central bank digital currency (CBDC) is curiously awaited. There have been various interpretation regarding CBDCs. It will definitely be a game changer to the country’s economy, but the most important fact is its security.
India Must Build A Strong Cyber Infrastructure Before Welcoming CBDCs – BW Businessworld