CYBER THIS WEEK – MARCH 19, 2023
Cybersecurity: When Best Intentions Fall Short of the Threat Reality
Cybercriminals aren’t just hacking for activism or for fun. They’re running their attacks like a business, targeting organisations to extort money – and they’re getting smarter at it.
No company wants to be breached and many businesses of all sizes across industries are taking the correct steps to reduce their risk of being breached. However, I have seen first-hand that best intentions and efforts do only go so far.
Cybersecurity: When Best Intentions Fall Short of the Threat Reality – CPO Magazine
Manufacturing under attack: cyber security on the agenda
The drive towards a more digital future is key to the prosperity of manufacturing. However, digital transformation heralds a new era of connectivity which brings with it rising levels of cyber vulnerability. Indeed, the last few years has seen manufacturing overtake financial services as the most cyber attacked industry
Manufacturing under attack: cyber security on the agenda (themanufacturer.com)
Why red team exercises for AI should be on a CISO’s radar
As AI increasingly becomes part of systems under development, CISOs need to start considering the cyber risks that may originate from such systems and treat it like any traditional application, including running red team exercises.
Why red team exercises for AI should be on a CISO’s radar | CSO Online
4 Reasons Why Application Security is a Dedicated Discipline within Cybersecurity
As web applications increasingly become the focal point through which an organization’s business is done, application protections take an increasingly more important role. As its importance grows, the domain of application security is also growing in depth and complexity, with a unique set of attacks, tools and mechanisms available to mitigate attacks
4 Reasons Why Application Security is a Dedicated Discipline Within Cybersecurity | Radware Blog
Financial services DDoS resilience starts with understanding attack surface
The financial services industry has become a prominent target for DDoS threat actors, as these organizations hold a larger market share, and their users rely heavily on 24/7 access to the critical services they provide. As institutions shift their services online and become more digitally accessible through services like mobile banking, the DDoS attack surface expands, leaving them increasingly vulnerable to a potential attack.
Financial services DDoS resilience starts with understanding attack surface | Security Magazine
How CISOs Can Work With the CFO to Get the Best Security Budget
CFOs have heard from CISOs the doom-and-gloom predictions of the potential fiscal disaster of data breaches so often that it’s no longer resonating with them. Is there a more effective way to help the CFO understand why security needs to be far better funded? Yes: Present the CFO with a shared-risk scenario.
How CISOs Can Work With the CFO to Get the Best Security Budget (darkreading.com)
MKS Instruments hit with lawsuit following ransomware attack
Businesses are increasingly facing legal action from users, customers, employees and other victims when they suffer a data breach, often under the argument that they could have done more to bolster their cybersecurity and prevent unauthorized access.
MKS Instruments hit with lawsuit following ransomware attack | SC Media (scmagazine.com)
Breaking Down a Cyberattack, One Kill Chain Step at a Time
A cyber kill chain describes the various stages of a cyberattack pertaining to network security. Lockheed Martin developed the cyber kill chain framework to help organizations identify and prevent cyber intrusions. The steps in a kill chain trace the typical stages of an attack from early reconnaissance to completion
Breaking Down a Cyberattack, One Kill Chain Step at a Time (securityintelligence.com)
How far is threat intelligence data vital to a successful and well-rounded cyber strategy?
Threat intelligence gives businesses the tools to defend their networks and protect their data. A well-rounded cybersecurity strategy uses threat intelligence to automatically receive cyberthreat data, enabling organisations to prepare action plans based on possible attack scenarios
Supply Chains Need the Protection of Unified Multifunctional Cybersecurity
The ability to fully visualize an organization’s cybersecurity stack, attack surfaces and threat vectors provides the digital resilience it needs. Having a holistic view of everything—in conjunction with establishing a strong cybersecurity posture—allows IT, cybersecurity and risk management professionals to prioritize risks and work together more effectively to counteract threats.
Supply Chains Need the Protection of Unified Multifunctional Cybersecurity (forbes.com)