CYBER THIS WEEK – JUNE 18 , 2023

How Do Some Companies Get Compromised Again and Again?

After a major attack, every organization should do some soul-searching. It’s important to evaluate how leadership failed to lead, how the company failed to invest, how the policies were inadequate and how the company culture around cybersecurity was insufficient to prevent malicious attacks through social engineering or other methods.

How Do Some Companies Get Compromised Again and Again? (securityintelligence.com)

The Evolution Of The Modern Security Operations Center

The role of the SOC has evolved to a greater level, becoming a critical apparatus for organizations operating in this globalized digital economy. It now has an important mission: to enable digital transformation and business resilience

The Evolution Of The Modern Security Operations Center (forbes.com)

What One Hospital’s Slow Recovery from a Cyberattack Means for Patients

In the aftermath of a breach, the focus frequently falls on the risk of confidential patient information being exposed, but these attacks can also leave hospitals hemorrhaging millions of dollars in the months that follow, and also cause disruptions to patient care, potentially putting lives at stake.

What One Hospital’s Slow Recovery From a Cyberattack Means for Patients | KFF Health News

75% of OT organizations had at least 1 intrusion in the last year

Fortinet recently released the 2023 State of Operational Technology and Cybersecurity Report, the results of which represent the current state of operational technology (OT) security and provides some best practices to help IT and security teams secure their environments.

75% of OT organizations had at least 1 intrusion in the last year | Security Magazine

2023 State of Operational Technology and Cybersecurity Report (fortinet.com)

Top Cyber Threats Faced by the Aviation Industry

As the digital landscape of the aviation industry grows more complex, so do the threats it faces. Cybercriminals are becoming more innovative and sophisticated in their attack methods, causing serious repercussions for this critical industry.

Top Cyber Threats Faced by the Aviation Industry – Flare

The Intersection of Cybersecurity and IoT: Analyzing Attack Surface Impact

The future of cybersecurity and IoT lies in a collaborative effort to establish industry-wide security standards, promote secure development practices, and leverage emerging technologies responsibly.

The Intersection of Cybersecurity and IoT: Analyzing Attack Surface Impact – ReadWrite

Leveraging AI to improve Ineffective Security Trainings 

When it comes to cybersecurity training, improving efficiency in areas like content development, analytics, and enhanced accessibility is something organizations should look to take advantage of immediately. Additional capabilities, such as direct AI-human interaction and the ability to overlay across real work environments, will continue to emerge as AI becomes more advanced and societal trust in AI grows.

Leveraging AI to improve Ineffective Security Trainings – CPO Magazine

SEC delays final rule on proposed four-day breach notification for public companies until October

The SEC disclosed the update in its spring 2023 unified agenda of regulatory and deregulatory actions. Financial and cybersecurity observers were expecting the rule to be finalized as early as May, but the notice indicates that the earliest possible timeframe for a final rule will be in October later this year

SEC delays final rule on proposed four-day breach notification for public companies until October | SC Media (scmagazine.com)

10 Important Security Tasks You Shouldn’t Skip

A number of security processes, procedures, best practices, and initiatives require a significant investment in time and money. Yet skipping them is a big mistake for security teams. While not an exhaustive list, here are 10 items that require an investment in time and money yet pay huge dividends for security teams.

10 Important Security Tasks You Shouldn’t Skip (darkreading.com)

Exploring the Role of Return Oriented Programming in Advanced Persistent Threats: Techniques and Countermeasures

The rise of Return Oriented Programming in Advanced Persistent Threats represents a significant challenge for cybersecurity professionals. By leveraging existing code fragments to bypass traditional security mechanisms, ROP-based attacks pose a potent threat to organizations and critical infrastructure.

The Role of Return Oriented Programming in Advanced Persistent Threats (APTs) (citylife.capetown)

Share: