CYBER THIS WEEK – JUNE 18 , 2023
How Do Some Companies Get Compromised Again and Again?
After a major attack, every organization should do some soul-searching. It’s important to evaluate how leadership failed to lead, how the company failed to invest, how the policies were inadequate and how the company culture around cybersecurity was insufficient to prevent malicious attacks through social engineering or other methods.
The Evolution Of The Modern Security Operations Center
The role of the SOC has evolved to a greater level, becoming a critical apparatus for organizations operating in this globalized digital economy. It now has an important mission: to enable digital transformation and business resilience
What One Hospital’s Slow Recovery from a Cyberattack Means for Patients
In the aftermath of a breach, the focus frequently falls on the risk of confidential patient information being exposed, but these attacks can also leave hospitals hemorrhaging millions of dollars in the months that follow, and also cause disruptions to patient care, potentially putting lives at stake.
75% of OT organizations had at least 1 intrusion in the last year
Fortinet recently released the 2023 State of Operational Technology and Cybersecurity Report, the results of which represent the current state of operational technology (OT) security and provides some best practices to help IT and security teams secure their environments.
Top Cyber Threats Faced by the Aviation Industry
As the digital landscape of the aviation industry grows more complex, so do the threats it faces. Cybercriminals are becoming more innovative and sophisticated in their attack methods, causing serious repercussions for this critical industry.
The Intersection of Cybersecurity and IoT: Analyzing Attack Surface Impact
The future of cybersecurity and IoT lies in a collaborative effort to establish industry-wide security standards, promote secure development practices, and leverage emerging technologies responsibly.
Leveraging AI to improve Ineffective Security Trainings
When it comes to cybersecurity training, improving efficiency in areas like content development, analytics, and enhanced accessibility is something organizations should look to take advantage of immediately. Additional capabilities, such as direct AI-human interaction and the ability to overlay across real work environments, will continue to emerge as AI becomes more advanced and societal trust in AI grows.
SEC delays final rule on proposed four-day breach notification for public companies until October
The SEC disclosed the update in its spring 2023 unified agenda of regulatory and deregulatory actions. Financial and cybersecurity observers were expecting the rule to be finalized as early as May, but the notice indicates that the earliest possible timeframe for a final rule will be in October later this year
10 Important Security Tasks You Shouldn’t Skip
A number of security processes, procedures, best practices, and initiatives require a significant investment in time and money. Yet skipping them is a big mistake for security teams. While not an exhaustive list, here are 10 items that require an investment in time and money yet pay huge dividends for security teams.
Exploring the Role of Return Oriented Programming in Advanced Persistent Threats: Techniques and Countermeasures
The rise of Return Oriented Programming in Advanced Persistent Threats represents a significant challenge for cybersecurity professionals. By leveraging existing code fragments to bypass traditional security mechanisms, ROP-based attacks pose a potent threat to organizations and critical infrastructure.