CYBER THIS WEEK – NOV 19, 2023
3 Ways Behavioral Economics Obstructs Cybersecurity
People are not robots; their decisions are based on emotion as much as data. Often, this can lead them to make mistakes with serious security implications for the business.
3 Ways Behavioral Economics Obstructs Cybersecurity (darkreading.com)
Easing the friction between IT and security
Considering how organizations, especially medium to large enterprises, often address security risks, the number flaunting security protocols isn’t so surprising. Instead of operating with a comprehensive strategy to protect their cyber resources, many still rely on a patchwork approach with separate IT operations and security teams, who often are at odds with one another.
Easing the friction between IT and security | Security Magazine
What Is a Business Logic Attack and How Do You Prevent It?
Rather than targeting technical vulnerabilities, a business logic attack (BLA) exploits an application’s intended functionality and processes to manipulate workflows, bypass traditional security measures, and misuse legitimate features.
What Is a Business Logic Attack and How Do You Prevent It? – CPO Magazine
Ransomware gang files SEC complaint against company that refused to negotiate
New US Securities and Exchange Commission rules require reporting of breaches that are material, giving cyber extortionists a new tactic to coerce payments.
Ransomware gang files SEC complaint against company that refused to negotiate | CSO Online
The Unique Cyber Vulnerabilities of Medical Devices
The prevailing belief in the industry was, until recently, that these medical devices constituted a low risk to security. Thus, budgets for security features were minimal and most devices did not have built-in security features due to the expense of creating them.
The Unique Cyber Vulnerabilities of Medical Devices (informationweek.com)
How to combat ransomware in the face of tight security staffing
Ransomware remains a threat for which all organizations must be prepared. But with much of today’s cybersecurity guidance geared toward larger companies, smaller organizations with tighter staffing are often left hanging. The advice in this article is for them.
How to combat ransomware in the face of tight security staffing | SC Media (scmagazine.com)
File-transfer services, rich with sensitive data, are under attack
This year has seen a trio of supply-chain attacks that created turmoil for thousands of corporate victims and their customers.
File-transfer services, rich with sensitive data, are under attack | Cybersecurity Dive
The evolution of ransomware: Lessons for the future
Evolving ransomware attacks are becoming increasingly more sophisticated as threat actors leverage vulnerabilities, social engineering and insider threats. While the future of ransomware is full of unknown threats, we can look to the past and recent trends to predict the future.
The evolution of ransomware: Lessons for the future (securityintelligence.com)
Using AI in Cyber Incident Response Demands a Total Safety Check
Cybersecurity incident response is a developing area that’s increasingly using artificial intelligence-based technology. AI and cyber threats are converging in a unique way—as AI generates a host of new and sophisticated cyber threats, it’s being deployed in software and service offerings that could make cybersecurity incident response more efficient and effective.
Using AI in Cyber Incident Response Demands a Total Safety Check (bloomberglaw.com)
Hands Off the Security Budget! Find Efficiencies to Reduce Risk
Security budgets will benefit from new priorities, streamlined responses rather than wholesale cost-cutting in light of cyberattacks and increased regulatory requirements
Hands Off the Security Budget! Find Efficiencies to Reduce Risk (darkreading.com)