3 Ways Behavioral Economics Obstructs Cybersecurity

People are not robots; their decisions are based on emotion as much as data. Often, this can lead them to make mistakes with serious security implications for the business.

3 Ways Behavioral Economics Obstructs Cybersecurity (darkreading.com)

Easing the friction between IT and security

Considering how organizations, especially medium to large enterprises, often address security risks, the number flaunting security protocols isn’t so surprising. Instead of operating with a comprehensive strategy to protect their cyber resources, many still rely on a patchwork approach with separate IT operations and security teams, who often are at odds with one another.

Easing the friction between IT and security | Security Magazine

What Is a Business Logic Attack and How Do You Prevent It?

Rather than targeting technical vulnerabilities, a business logic attack (BLA) exploits an application’s intended functionality and processes to manipulate workflows, bypass traditional security measures, and misuse legitimate features.

What Is a Business Logic Attack and How Do You Prevent It? – CPO Magazine

Ransomware gang files SEC complaint against company that refused to negotiate

New US Securities and Exchange Commission rules require reporting of breaches that are material, giving cyber extortionists a new tactic to coerce payments.

Ransomware gang files SEC complaint against company that refused to negotiate | CSO Online

The Unique Cyber Vulnerabilities of Medical Devices

The prevailing belief in the industry was, until recently, that these medical devices constituted a low risk to security. Thus, budgets for security features were minimal and most devices did not have built-in security features due to the expense of creating them.

The Unique Cyber Vulnerabilities of Medical Devices (informationweek.com)

How to combat ransomware in the face of tight security staffing

Ransomware remains a threat for which all organizations must be prepared. But with much of today’s cybersecurity guidance geared toward larger companies, smaller organizations with tighter staffing are often left hanging. The advice in this article is for them.

How to combat ransomware in the face of tight security staffing | SC Media (scmagazine.com)

File-transfer services, rich with sensitive data, are under attack

This year has seen a trio of supply-chain attacks that created turmoil for thousands of corporate victims and their customers.

File-transfer services, rich with sensitive data, are under attack | Cybersecurity Dive

The evolution of ransomware: Lessons for the future

Evolving ransomware attacks are becoming increasingly more sophisticated as threat actors leverage vulnerabilities, social engineering and insider threats. While the future of ransomware is full of unknown threats, we can look to the past and recent trends to predict the future.

The evolution of ransomware: Lessons for the future (securityintelligence.com)

Using AI in Cyber Incident Response Demands a Total Safety Check

Cybersecurity incident response is a developing area that’s increasingly using artificial intelligence-based technology. AI and cyber threats are converging in a unique way—as AI generates a host of new and sophisticated cyber threats, it’s being deployed in software and service offerings that could make cybersecurity incident response more efficient and effective.

Using AI in Cyber Incident Response Demands a Total Safety Check (bloomberglaw.com)

Hands Off the Security Budget! Find Efficiencies to Reduce Risk

Security budgets will benefit from new priorities, streamlined responses rather than wholesale cost-cutting in light of cyberattacks and increased regulatory requirements

Hands Off the Security Budget! Find Efficiencies to Reduce Risk (darkreading.com)

Share: