CYBER THIS WEEK – JUNE 23 ,2024
Measure Success: Key Cybersecurity Resilience Metrics
Cyber resilience is key to business continuity and profitability. Here are top cybersecurity metrics that can be used to measure cyber resilience effectively.
Measure Success: Key Cybersecurity Resilience Metrics (informationweek.com)
How generative AI Is expanding the insider threat attack surface
As the adoption of generative AI (GenAI) soars, so too does the risk of insider threats. This puts even more pressure on businesses to rethink security and confidentiality policies.
How generative AI is expanding the insider threat attack surface (securityintelligence.com)
The CISO role will either flourish or vanish
We’re at a pivotal time for CISOs. Since its creation 20 years ago, the CISO role has evolved and has enormous potential, but it’s one that requires a great deal of support given an ever-evolving threat landscape.
The CISO role will either flourish or vanish | Security Magazine
Five Steps To Supercharge Your Offensive Security Program
Relying solely on traditional cybersecurity measures like defense tactics is no longer good enough. As an industry, it’s time to supercharge offensive security (OffSec) programs to proactively mitigate vulnerabilities before they are exploited.
Five Steps To Supercharge Your Offensive Security Program (forbes.com)
Disaster recovery vs ransomware recovery: Why CISOs need to plan for both
Disruptive events can affect an organization in multiple ways, but with the right strategy and practice CISOs can minimize downtime and accelerate the recovery process.
Disaster recovery vs ransomware recovery: Why CISOs need to plan for both | CSO Online
Compliance, security, and the role of identity
Compliance and security are often used interchangeably—yet, they serve different functions and are both vital to a strong identity program
Compliance, security, and the role of identity | CIO
OT protection: Is air-gapping the answer?
The risk associated with OT compromise is substantial: power or cooling failures can cripple an entire facility, potentially for weeks or months. Many operators believe their OT systems are protected by air gaps: systems that are entirely isolated from external network
OT protection: Is air-gapping the answer? – DCD (datacenterdynamics.com)
From the perimeter to SASE: The evolution of network security
Network security has changed drastically in the last 10 years. Gone is the old perimeter-based defense model. The rapid expansion of cloud computing and the explosion of remote work that accompanied the COVID-19 pandemic have led to the adoption of two complementary but different models of network security: zero trust and secure access service edge (SASE).
From the perimeter to SASE: The evolution of network security | SC Media (scmagazine.com)
Multifactor Authentication Is Not Enough to Protect Cloud Data
Ticketmaster, Santander Bank, and other large firms have suffered data leaks from a large cloud-based service, underscoring that companies need to pay attention to authentication.
Multifactor Authentication Is Not Enough to Protect Cloud Data (darkreading.com)
Why transport and supply chain ecosystems need to be cyber secured
Cyberattacks not only have the potential to disrupt operations; they also pose significant safety and environmental risks.
Why we must make transport and supply chains cyber secure | World Economic Forum (weforum.org)