CYBER THIS WEEK – OCTOBER 30, 2022
Optus Data Breach Compensation Can Be Worth Billions of Dollars
Even while the average economic loss per consumer may be modest, when the prospective class-action pool is large enough—up to 10 million plaintiffs—compensatory damages—even in the absence of exemplary damages— Optus Data Breach compensation could potentially reach billions of dollars.
Establishing Advanced Persistent Security to Combat Long-Term Threats
With entire infrastructures and mounds of sensitive data living in the cloud, how we secure it remains one of the most significant undertakings within the public and private sectors. We need automated and accelerated cloud security capabilities so that security isn’t a bottleneck to business innovation
The role of bots in API attacks
Bots are playing an increasingly prominent role in cyberattacks. Defending against bots is challenging because they can be difficult to detect. While any instance of bots being used in cyberattacks is a cause for concern, bots have been used more often in API attacks. One of the main reasons for this is that APIs are built for multiple clients, so they are more likely to expose too much information and be left unsecured.
Wanted: Cybersecurity Training That Breaks Down Silos
In a risk landscape where cybersecurity is increasingly expensive and hard to get, and where regulations tighten all the time, it’s up to organizations to take a risk-based approach to protect themselves where they’re most vulnerable — their people.
Five Tips for Neophyte CISOs in a Bear Market
Good human resources are not just scarce but unaffordable and that CISO budgets are not going up. Here are five tips for surviving the downturn with your network, your sensitive data and (hopefully) your job intact
A Day in the Life: Working in Cyber Incident Response
As a cybersecurity incident responder, your life can go from zero to 100 in a heartbeat. One moment you are sipping a beverage reading the latest threat intelligence or getting the kids ready for bed; the next, you may be lunging for your “go bag” because you cannot remote in to the breached system. It’s all part of the game.
Unsecured printers are a potential data risk
Once a person gains unauthorized access to an IoT device such as a printer, the malicious actor can then use this access to gain control of the user’s network to launch even more cyber-attacks.
Red Storm Rising? Data Breaches Rise Globally in Q3 2022
Global data from Surfshark’s data breach statistics tool shows the scope and origin of users that have been breached since 2004 and records a growth of 44.52M breached users over the last quarter. The latest statistics update (Q3’2022) ranked Russia 1st in the world by leaked accounts (22.3M), followed by France (13.8M), Indonesia (13.3M), The U.S. (8.5M), and Spain (3.9M).
8 hallmarks of a proactive security strategy
More CISOs are balancing their response and recovery capabilities with proactive measures that anticipate attacks and vulnerabilities.
The Birth of Cybersecurity
To honor the 18th year of Cybersecurity Awareness Month, it’s great time to look back at the beginning of cybersecurity.