CYBER THIS WEEK – SEPTEMBER 11, 2022
Chasing the Cyber 1%: How to Beat the Cybersecurity Poverty Line
In cybersecurity, there are the haves and have-nots. For the latter, improving their security posture to defend against threats is rarely straightforward. While attackers become more high-tech, the gap between ‘the cyber 1%’ and those companies below the ‘cybersecurity poverty line’ grows wider. That poses a threat to all companies.
Chasing the Cyber 1%: How to Beat the Cybersecurity Poverty Line (securityintelligence.com)
Crash Course on E-Discovery for CIOs and CDOs
Here’s a quick tutorial on what e-discovery is, what one looks like when it lands on your organization, and how to handle it.
E-Discovery: 9 Important Things for CIOs and CDOs to Understand (informationweek.com)
Cognitive Overload: The hidden cybersecurity threat
At a time when cybersecurity talent has become more critical than ever, mitigating their stress – and the factors leading to burnout – must stay a priority. Start by focusing on cognitive overload: establish a cybersecurity plan, cut excess tooling and above all, listen to the analysts.
Cognitive Overload: The hidden cybersecurity threat | SC Media (scmagazine.com)
Using Backups to Turn the Tables on Ransomware
Considering the damage that a successful attack can do to the business model, it’s time for all organizations, large and small, to start fighting back. Foremost, all should focus on taking away the profitability of ransomware by becoming more resilient to data theft and system lockdown.
Using Backups to Turn the Tables on Ransomware – Security Boulevard
7 ways to create a more IT-savvy C-suite
Just as enterprise leaders need to gain IT knowledge, CIOs should work to become more business savvy. For a CIO to effectively communicate to and educate their colleagues, they must also possess a clear understanding of business priorities and how the business operates. This understanding will help the CIO effectively advise board members and management on emerging technologies and trends in the marketplace
7 ways to create a more IT-savvy C-suite | CIO
Global companies say supply chain partners expose them to ransomware
Supply chains are an attractive target because they can offer either a poorly defended access vector and/or an opportunity to multiply illicit profits by infecting many organizations through a single supplier
Global companies say supply chain partners expose them to ransomware | CSO Online
Vulnerability Exploits, Not Phishing, Are the Top Cyberattack Vector for Initial Compromise
A report from Kaspersky this week identified more initial intrusions last year resulting from exploitation of vulnerabilities in Internet-facing applications than breaches involving malicious emails and compromised accounts combined.
Why Companies Need to Start Sharing More Information about Cyberattacks
Increasing the amount and quality of cyberattack reports would be one of the most effective ways to improve the cybersecurity of our organizations. The cybercriminals do a great job in sharing information on the Dark Web. The “good guys” (that is, us) need to get to be at least as good.
Why Companies Need to Start Sharing More Information about Cyberattacks – WSJ
Challenges of User Authentication: What You Need to Know
In the digital age, authentication is paramount to a strong security strategy. As virtually every aspect of day-to-day life and business is conducted online, the added convenience has also brought added risk. Information privacy, data sovereignty, and financial safety are front of mind for organizations worldwide – and if they’re not, they should be
Challenges of User Authentication: What You Need to Know Security Affairs
A summer of Security? It can only be done With a Zero-trust Approach
The zero-trust approach continues to be relevant in 2022. It is essential that companies adopt it to kickstart their cybersecurity journey. A three step approach – the MAP – to create a comprehensive, scalable and framework-aligned cyber security strategy that fits into the remote and hybrid workplace is the path to take
A summer of Security? It can only be done With a Zero-trust Approach – CPO Magazine