CYBER THIS WEEK – OCTOBER 30, 2022

Optus Data Breach Compensation Can Be Worth Billions of Dollars

Even while the average economic loss per consumer may be modest, when the prospective class-action pool is large enough—up to 10 million plaintiffs—compensatory damages—even in the absence of exemplary damages— Optus Data Breach compensation could potentially reach billions of dollars.

How to get Optus Data Breach compensation: Class action investigations explained – Dataconomy

Establishing Advanced Persistent Security to Combat Long-Term Threats

With entire infrastructures and mounds of sensitive data living in the cloud, how we secure it remains one of the most significant undertakings within the public and private sectors. We need automated and accelerated cloud security capabilities so that security isn’t a bottleneck to business innovation

Establishing Advanced Persistent Security to Combat Long-Term Threats – CPO Magazine

The role of bots in API attacks

Bots are playing an increasingly prominent role in cyberattacks. Defending against bots is challenging because they can be difficult to detect. While any instance of bots being used in cyberattacks is a cause for concern, bots have been used more often in API attacks. One of the main reasons for this is that APIs are built for multiple clients, so they are more likely to expose too much information and be left unsecured.

The role of bots in API attacks | Security Magazine

Wanted: Cybersecurity Training That Breaks Down Silos

In a risk landscape where cybersecurity is increasingly expensive and hard to get, and where regulations tighten all the time, it’s up to organizations to take a risk-based approach to protect themselves where they’re most vulnerable — their people.

Wanted: Cybersecurity Training That Breaks Down Silos (darkreading.com)

Five Tips for Neophyte CISOs in a Bear Market

Good human resources are not just scarce but unaffordable and that CISO budgets are not going up. Here are five tips for surviving the downturn with your network, your sensitive data and (hopefully) your job intact

Five Tips For Neophyte CISOs In A Bear Market (forbes.com)

A Day in the Life: Working in Cyber Incident Response

As a cybersecurity incident responder, your life can go from zero to 100 in a heartbeat. One moment you are sipping a beverage reading the latest threat intelligence or getting the kids ready for bed; the next, you may be lunging for your “go bag” because you cannot remote in to the breached system. It’s all part of the game.

A Day in the Life: Working in Cyber Incident Response (securityintelligence.com)

Unsecured printers are a potential data risk

Once a person gains unauthorized access to an IoT device such as a printer, the malicious actor can then use this access to gain control of the user’s network to launch even more cyber-attacks.

Unsecured printers are a potential data risk | Security Info Watch

Red Storm Rising? Data Breaches Rise Globally in Q3 2022

Global data from Surfshark’s data breach statistics tool shows the scope and origin of users that have been breached since 2004 and records a growth of 44.52M breached users over the last quarter. The latest statistics update (Q3’2022) ranked Russia 1st in the world by leaked accounts (22.3M), followed by France (13.8M), Indonesia (13.3M), The U.S. (8.5M), and Spain (3.9M).

Red Storm Rising? Data Breaches Rise Globally in Q3 2022 (complexdiscovery.com)

8 hallmarks of a proactive security strategy

More CISOs are balancing their response and recovery capabilities with proactive measures that anticipate attacks and vulnerabilities.

8 hallmarks of a proactive security strategy | CSO Online

The Birth of Cybersecurity

To honor the 18th year of Cybersecurity Awareness Month, it’s great time to look back at the beginning of cybersecurity.

The Birth of Cybersecurity  | Radware Blog

Share: