CYBER THIS WEEK – JUNE 9 ,2024

How actuarial tools can optimize cybersecurity technology spending

Metrics and standardized tools offer a quantitative means to evaluate the investment in new technologies while aligning it with anticipated risks.

How actuarial tools can optimize cybersecurity technology spending | Security Info Watch

3 ways manufacturers can build a culture of cyber resilience

Over the past decade, the manufacturing sector has undergone rapid digital transformation, embracing innovations such as digital twins, robotics, artificial intelligence, cloud computing and the industrial internet of things (IIoT). While these advances drive growth and efficiency, they also expose the sector to cyber threats.

Making cyber resilience a top priority for manufacturers | World Economic Forum (weforum.org)

Challenges in applying the EU Cybersecurity Index globally

The world needs cyber resilience with preventive measures to minimize threats. Redesigning the CSI with separate sub-indices for prevention and deterrence can achieve this.

Challenges in applying the EU Cybersecurity Index globally (orfonline.org)

How Mitigating Your Cybersecurity Risk Can Transform Your Business

Cyber risk insurers can help your company hedge against cybercrime. But did you know your cyber risk insurance can be a catalyst that propels your company in exciting, unexpected directions?

How Mitigating Your Cybersecurity Risk Can Transform Your Business (forbes.com)

Security chiefs under pressure from boards to downplay cyber risk: study

Research from Trend Micro shows tension between CISOs and senior enterprise leadership. Many security leaders say they’re perceived as nags.

Security chiefs under pressure from boards to downplay cyber risk: study | CIO Dive

Understanding Security’s New Blind Spot: Shadow Engineering

In the rush to digital transformation, many organizations are exposed to security risks associated with citizen developer applications without even knowing it.

Understanding Security’s New Blind Spot: Shadow Engineering (darkreading.com)

Open source, open risks: The growing dangers of unregulated generative AI

While mainstream generative AI models have built-in safety barriers, open-source alternatives have no such restrictions. Here’s what that means for cyber crime.

Open source, open risks: The growing dangers of unregulated generative AI (securityintelligence.com)

Inside the ‘Secure By Design’ Revolution

The Secure by Design Pledge is a voluntary initiative that invites companies developing enterprise software, including on-premises, cloud, and SaaS products, to demonstrate progress toward seven goals.

Inside the ‘Secure By Design’ Revolution (informationweek.com)

The Snowflake data breach is a tangled mess

A major Snowflake data breach has been linked to the recent hacks of Santander and Ticketmaster, according to cybersecurity experts.

The Snowflake Data Breach Is A Tangled Mess – Dataconomy

How to identify and implement security automation use cases

Despite organization-wide interest in implementing security automation, security leaders often struggle with identifying common security automation scenarios and implementing custom automations

How to identify and implement security automation use cases | Cybersecurity Dive

 

Share: