CYBER THIS WEEK – NOVEMBER 6, 2022

Detecting Cyber Risks Before They Lead to Downtime

All cybersecurity begins with knowing what’s on your network. Beyond that, manufacturers must know what cyber and operational risks exist across sites and be able to detect and prioritize response to threats before they lead to downtime.

Detecting Cyber Risks Before They Lead to Downtime | Manufacturing.net

‘Point solutions just need to die’: The end of the one-trick security tool

There is a glut of cybersecurity tools that do one thing. Many organizations pay for dozens of these products or services, some of which go forgotten or otherwise unused. Organizations are often better served by cybersecurity tools that integrate across an entire stack.

‘Point solutions just need to die’: The end of the one-trick security tool | CIO Dive

Cyber espionage remains a real threat to both Governments and Businesses

Today, cyber espionage is a reality of life. Governments and businesses take numerous precautions to protect themselves from cyber espionage attempts. The staff at the company is taught about security and its critical role. They are made fully aware of the need to protect sensitive information.

What is cyber espionage: Examples, types, tactics, and more (dataconomy.com)

Dropbox Data Breach another Multifactor Fail

Add DropBox to the list of tech companies experiencing a multifactor fail moment. The file storage and sharing company acknowledged Tuesday that employees fell for a well-crafted phishing campaign that gave hackers access to internal code repositories and some personally identifying information.

Dropbox Data Breach Another Multifactor Fail – DataBreachToday

4 Major Benefits of Next Gen SIEM

Next gen SIEM is a cloud-native cybersecurity tool that utilizes artificial intelligence and machine learning to discover malicious activity in real time.

4 Major Benefits of Next Gen SIEM (hackread.com)

Microsoft says “it’s just too difficult” to effectively disrupt ransomware

The problem with the efforts by law enforcement globally to try to address ransomware is that the challenges of conducting traditional law enforcement investigations and prosecutions against ransomware actors are just too difficult given the cross-border nature of that activity, the fact that a lot of the actors are beyond the reach of law enforcement that care about this issue. It’s just too difficult

Microsoft says “it’s just too difficult” to effectively disrupt ransomware | IT PRO

Microsoft Digital Defense Report 2022 | Microsoft Security

What the Growth of Ransomware Variants Says About the Evolving Cybercrime Ecosystem

The fact that ransomware variations have almost doubled in just the last six months tells us that cyber-criminals know when they’ve found a good thing, and they’re going after it with all the resources they have. Ongoing training, the use of AI and a shared intelligence strategy will all help organizations overcome the serious threat that ransomware poses.

What the Growth of Ransomware Variants Says about the Evolving Cybercrime Ecosystem – Infosecurity Magazine (infosecurity-magazine.com)

The cybersecurity impacts of bots on e-commerce in 2022

The State of Security Within eCommerce 2022 report, a 12-month analysis by Imperva Threat Research, identified cyber threats facing online retailers. The attacks on retailers’ websites, applications, and APIs throughout the calendar year and during the peak holiday shopping season is a continued business risk for the retail industry.

The cybersecurity impacts of bots on e-commerce in 2022 | Security Magazine

The future starts now: 10 major challenges facing cybersecurity

Organizations large and small have never been more at risk from cyberattacks, to the point that the litany of evolving and escalating cyber threats have made cybersecurity a key boardroom-level agenda item. As security is the backbone of a successful digital transformation, getting a grip on it becomes vital.

The future starts now: 10 major challenges facing cybersecurity | WeLiveSecurity

CISA releases cybersecurity performance goals to reduce risk and impact of adversarial threats

Working in coordination with the National Institute of Standards and Technology (NIST) and the interagency community, CISA developed “baseline cybersecurity performance goals that are consistent across all critical infrastructure sectors.”

CISA releases cybersecurity performance goals to reduce risk and impact of adversarial threats | CSO Online

Share: