CYBER THIS WEEK – MARCH 19, 2023

Cybersecurity: When Best Intentions Fall Short of the Threat Reality

Cybercriminals aren’t just hacking for activism or for fun. They’re running their attacks like a business, targeting organisations to extort money – and they’re getting smarter at it. 

No company wants to be breached and many businesses of all sizes across industries are taking the correct steps to reduce their risk of being breached. However, I have seen first-hand that best intentions and efforts do only go so far.

Cybersecurity: When Best Intentions Fall Short of the Threat Reality – CPO Magazine

Manufacturing under attack: cyber security on the agenda

The drive towards a more digital future is key to the prosperity of manufacturing. However, digital transformation heralds a new era of connectivity which brings with it rising levels of cyber vulnerability. Indeed, the last few years has seen manufacturing overtake financial services as the most cyber attacked industry

Manufacturing under attack: cyber security on the agenda (themanufacturer.com)

Why red team exercises for AI should be on a CISO’s radar

As AI increasingly becomes part of systems under development, CISOs need to start considering the cyber risks that may originate from such systems and treat it like any traditional application, including running red team exercises.

Why red team exercises for AI should be on a CISO’s radar | CSO Online

4 Reasons Why Application Security is a Dedicated Discipline within Cybersecurity

As web applications increasingly become the focal point through which an organization’s business is done, application protections take an increasingly more important role. As its importance grows, the domain of application security is also growing in depth and complexity, with a unique set of attacks, tools and mechanisms available to mitigate attacks

4 Reasons Why Application Security is a Dedicated Discipline Within Cybersecurity | Radware Blog

Financial services DDoS resilience starts with understanding attack surface

The financial services industry has become a prominent target for DDoS threat actors, as these organizations hold a larger market share, and their users rely heavily on 24/7 access to the critical services they provide. As institutions shift their services online and become more digitally accessible through services like mobile banking, the DDoS attack surface expands, leaving them increasingly vulnerable to a potential attack.

Financial services DDoS resilience starts with understanding attack surface | Security Magazine

How CISOs Can Work With the CFO to Get the Best Security Budget

CFOs have heard from CISOs the doom-and-gloom predictions of the potential fiscal disaster of data breaches so often that it’s no longer resonating with them. Is there a more effective way to help the CFO understand why security needs to be far better funded? Yes: Present the CFO with a shared-risk scenario.

How CISOs Can Work With the CFO to Get the Best Security Budget (darkreading.com)

MKS Instruments hit with lawsuit following ransomware attack

Businesses are increasingly facing legal action from users, customers, employees and other victims when they suffer a data breach, often under the argument that they could have done more to bolster their cybersecurity and prevent unauthorized access.

MKS Instruments hit with lawsuit following ransomware attack | SC Media (scmagazine.com)

Breaking Down a Cyberattack, One Kill Chain Step at a Time

A cyber kill chain describes the various stages of a cyberattack pertaining to network security. Lockheed Martin developed the cyber kill chain framework to help organizations identify and prevent cyber intrusions. The steps in a kill chain trace the typical stages of an attack from early reconnaissance to completion

Breaking Down a Cyberattack, One Kill Chain Step at a Time (securityintelligence.com)

How far is threat intelligence data vital to a successful and well-rounded cyber strategy?

Threat intelligence gives businesses the tools to defend their networks and protect their data. A well-rounded cybersecurity strategy uses threat intelligence to automatically receive cyberthreat data, enabling organisations to prepare action plans based on possible attack scenarios

How far is threat intelligence data vital to a successful and well-rounded cyber strategy?   – Intelligent CISO

Supply Chains Need the Protection of Unified Multifunctional Cybersecurity

The ability to fully visualize an organization’s cybersecurity stack, attack surfaces and threat vectors provides the digital resilience it needs. Having a holistic view of everything—in conjunction with establishing a strong cybersecurity posture—allows IT, cybersecurity and risk management professionals to prioritize risks and work together more effectively to counteract threats.

Supply Chains Need the Protection of Unified Multifunctional Cybersecurity (forbes.com)

 

Share: