CYBER THIS WEEK – JULY 31, 2022


Why Layer 8 Is Great

The difference between the legitimate use of an application and abuse of that application (i.e., fraud) is the intent of the end user responsible for the activity. When we look at the concept of fraud in this manner, it is easy to see that visibility into “what” the end user is doing inside the application session isn’t enough. We also need visibility into “how” they are doing it. 

Why Layer 8 Is Great (darkreading.com)

Six cyber security holes you need to plug now

Just because you’re not a large enterprise or a household name, that doesn’t mean your business doesn’t need to worry about security breaches. Indeed, it might surprise you to discover the truth is actually quite the opposite: smaller businesses are the most likely to be vulnerable, and attackers know that.

Six cyber security holes you need to plug now | IT PRO 

Digital Trust Is the Goal of Cybersecurity: Why Zero Trust Needs To Evolve To Include Identity-First Security

The enterprise environment is made up of a complex combination of hybrid and multicloud environments, as well as swathes of applications and processes—each requiring new tools, new approaches and a paradigm shift to ensure operations, compliance and security.

Digital Trust Is The Goal Of Cybersecurity: Why Zero Trust Needs To Evolve To Include Identity-First Security (forbes.com)

Data Protection for Whatever Comes Next

Cybersecurity boils down to securing your data or data protection. But that simple concept has turned into a monumental task that is only exacerbated every time we move our data to a new platform. How do we secure data today, to be ready for whatever comes next in computing?

Data Protection for Whatever Comes Next – CISO Series

Researchers Warns of Increase in Phishing Attacks Using Decentralized IPFS Network

The decentralized file system solution known as IPFS is becoming the new “hotbed” for hosting phishing sites, researchers have warned.

Researchers Warns of Increase in Phishing Attacks Using Decentralized IPFS Network (thehackernews.com)

Threat Actors Pivot around Microsoft’s Macro-Blocking in Office

Cybercriminals turn to container files and other tactics to get around the company’s attempt to thwart a popular way to deliver malicious phishing payloads.

Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office | Threatpost

Data breach costs record $4.3M with firms passing buck to customers

Average cost of a data security breach has hit another record-high of $4.35 million and 60% of businesses have opted to increase the price of their products and services to buffer the loss incurred, reveals IBM’s 2022 research.

Data breach costs record $4.3M with firms passing buck to customers | ZDNet

Half of 10.0 CVSS vulnerabilities reported so far in 2022 scored incorrectly

Flashpoint on Thursday released its mid-year vulnerability intelligence report which found that while Flashpoint collected 11,860 vulnerabilities in the first six months of 2022, the CVE/NVD services failed to report and detail some 27.3% of them.

SC Media | Half of 10.0 CVSS vulnerabilities reported so far in 2022 scored incorrectly (scmagazine.com)

Confessions Of A Cybersecurity Pro: We’re Making It Too Easy For Attackers

“Never trust, always verify” should become the guiding principle throughout your organization. From individual contributors to managers to executives and boards, we must all look for ways to adopt zero-trust tenets and make them easier to adopt. This includes the security posture.

Confessions Of A Cybersecurity Pro: We’re Making It Too Easy For Attackers (forbes.com)

India Must Build A Strong Cyber Infrastructure Before Welcoming CBDCs

Reserve Bank of India’s (RBI) central bank digital currency (CBDC) is curiously awaited. There have been various interpretation regarding CBDCs. It will definitely be a game changer to the country’s economy, but the most important fact is its security.

India Must Build A Strong Cyber Infrastructure Before Welcoming CBDCs – BW Businessworld

Share: