Monday, 31 October 2022

OT/ICS cybersecurity threats remain high

Organizations have significantly matured their security postures since last year in response to operational technology (OT) and industrial control systems (ICS) cybersecurity threats. 



from Cybersecurity News https://ift.tt/xGHshCT

Protecting operations and data against cyberattacks

How can organizations focus on building foundational security measures to take power away from cybercriminals? 



from Cybersecurity News https://ift.tt/7ClgxEI

Friday, 28 October 2022

Over 100 million accounts were breached in Q3 2022

108 million accounts were breached worldwide in Q3 2022, according to new cybersecurity research from Surfshark.



from Cybersecurity News https://ift.tt/yWfIHoO

With record-high data breaches, now is the time for cybersecurity storage adoption

Organizations must take proactive steps to address the fundamental challenges of data protection, data storage and data compliance processes with cyberstorage solutions.



from Cybersecurity News https://ift.tt/HXh7LsO

Thursday, 27 October 2022

CISA releases critical infrastructure cybersecurity performance goals

The Cybersecurity and Infrastructure Security Agency (CISA) has released the first iteration of the Cross-Sector Cybersecurity Performance Goals (CPGs). 



from Cybersecurity News https://ift.tt/uftV206

Wednesday, 26 October 2022

Ransomware in the US is down 51% compared to 2021

Ransomware levels in the United States are trending down, with a decrease of 51% of ransomware attack volume compared to 2021 levels.



from Cybersecurity News https://ift.tt/FzyeD6J

Over half of consumers use biometrics to secure mobile devices

The Digital Identity Services report by iProov surveyed 16,000 consumers globally to assess their attitudes toward facial verification in security practices.



from Cybersecurity News https://ift.tt/smKNTw0

Over 255m phishing attacks in 2022 so far

More than 255 million phishing attacks occurred over six months in 2022, a 61% increase in the rate of phishing attacks compared to 2021, SlashNext reports.



from Cybersecurity News https://ift.tt/sU31kOf

Strengthening infrastructure services security with cloud technology

Why is cloud-based data more secure than you think? And how can you solve on-prem security issues and minimize the risk of cloud breaches?



from Cybersecurity News https://ift.tt/SMeRyzx

Pam Presswood joins Valor as Chief Information Officer

Pam Presswood has been named the new Chief Information Officer (CIO) at Valor, a business services provider in mineral rights management.



from Cybersecurity News https://ift.tt/zroYqOL

Best practices for cryptocurrency firms and digital currency firms managing money

Cryptocurrency firms are not immune from regulatory and legal obligations. Three best practices, however, can help firms ensure compliance and minimize regulatory risks.




from Cybersecurity News https://ift.tt/kMWH0Ed

Tuesday, 25 October 2022

Cybersecurity is a top priority for physical security professionals

New research from Genetec shows that cybersecurity remains a top concern for physical security professionals going into 2023.



from Cybersecurity News https://ift.tt/NgOVDta

Leading ransomware variants in Q3

During Q3 of 2022, Intel 471 observed 455 ransomware attacks, a decrease of 72 attacks recorded from the second quarter of 2022, according to the Leading Ransomware Variants report.



from Cybersecurity News https://ift.tt/ZqJSCLI

CISOs struggle to articulate business impacts of cyber risks

With CISOs required to present to their boards, they now face the challenge of articulating cybersecurity risks and opportunities, according to a survey by FTI Consulting.



from Cybersecurity News https://ift.tt/YtZWILS

When bad things happen to good credentials

Identity and access management (IAM) has been a fundamental security touchstone for as long as information security has been around. Unfortunately, it is not good enough anymore.



from Cybersecurity News https://ift.tt/lWKgPQB

Scars of COVID-19 pandemic leave airlines vulnerable to payment fraud

Airline security leaders must mitigate fraud while maintaining positive passenger experience as they book tickets and fly with airlines.



from Cybersecurity News https://ift.tt/3LrSnKz

Monday, 24 October 2022

Can developers reduce open source cybersecurity risk?

State of the Software Supply Chain Report from Sonatype found legacy open source downloads leading to cybersecurity vulnerability exploitation.



from Cybersecurity News https://ift.tt/x3Nlt4b

K-8 students learn cybersecurity through gamification

K-8 students can learn cybersecurity techniques through a gamified education platform called Cyber Legends. Learn more in this case study.



from Cybersecurity News https://ift.tt/mA1L8Ih

The case for continuous threat simulation: Why annual audits will fail your business

Here are five reasons why continuous threat simulation will help improve your cybersecurity.  



from Cybersecurity News https://ift.tt/r03PJ5O

Friday, 21 October 2022

Global cybersecurity workforce grows to 4.7 million

The 2022 Cybersecurity Workforce Study from (ISC)² identified the current cyber workforce gap to be 3.4 million employees.



from Cybersecurity News https://ift.tt/uYD8JXp

Thursday, 20 October 2022

Security considerations for passwordless authentication

Passwordless authentication takes many forms, from biometrics to link-based access. Cybersecurity leaders can use these steps to secure their networks with passwordless strategies.



from Cybersecurity News https://ift.tt/BPOUCeS

Wednesday, 19 October 2022

Fighting the continued rise of wiper malware

Wiper malware deployments are rising in 2022. With the right know-how and the right cybersecurity tools, security teams can ensure they’re bolstered for this battle. 



from Cybersecurity News https://ift.tt/vVefOol

Zero trust, remote work & cloud lead to higher cybersecurity spending

The increase in remote and hybrid work, the transition from VPNs to zero trust network access and the shift to cloud-based delivery models are causing growth in cybersecurity spend, according to Gartner, Inc.



from Cybersecurity News https://ift.tt/h21APBe

CISOs needs to adapt cybersecurity guidance for millennials & Gen Z

What generations pose more cybersecurity risk than others? The 2022 Human Risk in Cybersecurity Survey from Ernst & Young LLP asked employees about their cyber habits.



from Cybersecurity News https://ift.tt/UxzfHc9

Tuesday, 18 October 2022

Identifying and mitigating “risky insiders” in the workplace

Insider risk remains an issue for organizations as hybrid work continues. Monitoring data, educating employees on cybersecurity and more can help companies remain secure.



from Cybersecurity News https://ift.tt/Cy2BS4R

Monday, 17 October 2022

How to safeguard your brand from spoofing attacks

Cyber risk is business risk, and protecting your brand from spoofing attacks is paramount to protecting your reputation and bottom line.



from Cybersecurity News https://ift.tt/vqSywBh

Setting the stage for ransomware recovery

Here's how to avoid common pitfalls that lead to increases in expenditures, excessive business interruption time, and a prolonged, difficult claims process, during ransomware recovery. 



from Cybersecurity News https://ift.tt/ywBvzSt

5 digital safety concerns for K-12 student privacy and wellbeing

The "Teacher and School Concerns and Actions on Elementary School Children Digital Safety" from North Carolina State University identified five digital safety concerns for K-12 students.



from Cybersecurity News https://ift.tt/x09jcBz

Phishing is the top cybersecurity threat targeting car dealerships

Auto dealerships across the U.S. have been targeted by phishing attacks. A new study examines what the car retailers are doing to mitigate cyber threats.



from Cybersecurity News https://ift.tt/uFeTzti

Cybersecurity founded on 3 pillars: Technology, process, and people

Comprehensive cybersecurity measures, such as security technology, risk management and education & training, are needed to secure the enterprise from inside out. 



from Cybersecurity News https://ift.tt/7UQTWd6

Balancing consumer expectations and fraud prevention

With the right tools and processes in place, businesses can provide consumers with a secure digital experience while mitigating fraud risks.



from Cybersecurity News https://ift.tt/IFvcepu

$4.35 Million — The average cost of a data breach

Discover five steps to boost data breach and cyberattack incident response.



from Cybersecurity News https://ift.tt/5vuwfit

Friday, 14 October 2022

4 things CISOs need to know about software supply chain security

Cybersecurity leadership needs to understand the security challenges of open source code to tackle software supply chain security threats.



from Cybersecurity News https://ift.tt/nhN5JDs

What organizations need to know about the new CPRA legislation

Everything you need to know about thCalifornia Privacy Rights Act (CPRA), including three ways to ensure compliance and consumer privacy. 



from Cybersecurity News https://ift.tt/DyoTdnH

Fostering diversity in cybersecurity

The cybersecurity industry could benefit significantly from diversifying its workforce, and when recruiting talent, it is critical that businesses strategically approach the onboarding process. 



from Cybersecurity News https://ift.tt/XWpTfFw

The weaponization of social media

We cannot afford for social media to continue being an insider threat blind spot. The fallout from not properly managing and mitigating digital risk can result in irreparable damage to both individuals and organizations alike. 



from Cybersecurity News https://ift.tt/0baCZ9N

Thursday, 13 October 2022

The way forward for Kubernetes security: Eliminate standing privileges

The most successful model for Kubernetes security will be one built on zero trust, one that embraces ephemeral JIT privileges, strong secrets governance and ZSP. 



from Cybersecurity News https://ift.tt/xSdT2Gc

Dark data: The underestimated cybersecurity threat

Enterprise organizations are concerned with the cybersecurity threat of dark data, according to a recent security report, "Understanding Risk: The Dark Side of Data" from Donnelley Financial Solutions.



from Cybersecurity News https://ift.tt/WhNOVyL

60% of SMBs experienced a cyberattack in the last year

Nearly two-thirds of small to mid-sized businesses experienced a cyberattack in the last 12 months, according to cybersecurity research from Devolutions.



from Cybersecurity News https://ift.tt/hWq7GKA

Wednesday, 12 October 2022

US critical infrastructure, airports targeted by pro-Russia hackers

A number of U.S. airport websites were temporarily taken offline after three pro-Russia cybercrime groups announced a wave of DDoS attacks targeting U.S. critical infrastructure.



from Cybersecurity News https://ift.tt/Xz7cp5s

Data breach prevention ranked top global cybersecurity priority

Cybersecurity leaders ranked data breach prevention and ransomware defense among their top security priorities, according to a WithSecure survey.

from Cybersecurity News https://ift.tt/pAxi8n5

Todd Dekkinga named Chief Information Security Officer at Zluri

Todd Dekkinga has been named Chief Information Security Officer (CISO) at Zluri, an enterprise Software as a Service (SaaS) management provider.



from Cybersecurity News https://ift.tt/YgmBnwp

Tuesday, 11 October 2022

Video wall technology aids SOC collaboration & efficiency

Legato Security integrated their video wall technology into their security operations center (SOC) to improve incident response and data visualization with a solution from Haivision.



from Cybersecurity News https://ift.tt/7MdI0eY

John Carlin named cybersecurity & data protection co-head at Paul, Weiss

National security and cybersecurity lawyer John P. Carlin has been named the new Co-Head of the Cybersecurity & Data Protection practice and as a Partner in Litigation at Paul, Weiss.



from Cybersecurity News https://ift.tt/H8yxmM2

Vasu Kohli named CISO at Iterable

Vasu Kohli, who has led Iterable’s Security organization for the past ten months, has been promoted to Chief Information Security Officer (CISO).



from Cybersecurity News https://ift.tt/DXHrLuk

It’s time to talk about securing your innovation supply chain

 Security leaders need to embrace strategies that can provide end-to-end visibility with open access to data across the entire innovation supply chain.



from Cybersecurity News https://ift.tt/UCYdZ4W

Reduce human error cyberattacks with security training & partnerships

Organizations can close the cybersecurity skills gap and reduce cyber risk by working with external partners, such as managed service providers.



from Cybersecurity News https://ift.tt/axVsiCG

Monday, 10 October 2022

Vulnerability exploitation is top initial access vector for ransomware

The 2022 State of the Threat Report from Secureworks identified software vulnerabilities as the primary initial access vector for ransomware.




from Cybersecurity News https://ift.tt/w03DM5m

Friday, 7 October 2022

Mona Harrington named Asst Director at CISA's National Risk Management Center

Cybersecurity executive Mona Harrington has been promoted to the Assistant Director role at the National Risk Management Center (NRMC), a division of CISA.



from Cybersecurity News https://ift.tt/mRHphWU

Randall Magiera named Director of Information Security at LucidLink

Dr. Randall Magiera has been named Director of Information Security and Privacy at LucidLink, where he will scale risk assessment, compliance and more cyber efforts.



from Cybersecurity News https://ift.tt/nTGSjvU

Thursday, 6 October 2022

5 questions CISOs should ask when evaluating cyber resiliency

What are the top five questions chief information security officers (CISOs) should ask when it comes to evaluating and improving cybersecurity resiliency?



from Cybersecurity News https://ift.tt/xdKzE5e

5 tips for cybersecurity insurance compliance

Organizations must meet compliance requirements in order to qualify for cyber insurance or reduce their insurance costs and cyber risk.



from Cybersecurity News https://ift.tt/ATRDFUa

Wednesday, 5 October 2022

Google to pay $85M settlement for privacy violations in Arizona

Google will pay an $85 million settlement to the State of Arizona for violating the state's Consumer Fraud Act with its location tracking feature.



from Cybersecurity News https://ift.tt/cPzFxrQ

Beware of chat apps: Your security and brand reputation are on the line

Customer data is not the only thing on the line, as fraudsters utilize chat apps for scams. Businesses’ reputations are at risk too.



from Cybersecurity News https://ift.tt/n6jCfPF

Monday, 3 October 2022

How COVID-19 has made small businesses more vulnerable to cyberattacks

The COVID-19 pandemic accelerated e-commerce initiatives for small businesses, but it also catalyzed increased cyberattacks and cybersecurity challenges.



from Cybersecurity News https://ift.tt/yD4Zsr8

Are small businesses prepared to defend against cyberattacks?

A survey from Nationwide identified weaknesses in small business cybersecurity posture, including a lack of employee cyber awareness and training.



from Cybersecurity News https://ift.tt/f4U5NBp

Data privacy is a challenge. Tech leaders have the solution

Data privacy has grown so complex that it demands a technological solution, and it falls on cybersecurity and technology leaders to transform the way their organizations use data.



from Cybersecurity News https://ift.tt/i39gyan

Security executives identify authentication challenges

Identity and access management challenges facing organizations include disparate authentication practices, compliance and more, according to an Axiad survey.



from Cybersecurity News https://ift.tt/926FRNg

Password month? How we can make CSAM work for everyone

The security community needs Cybersecurity Awareness Month, but we need to do it better in order to advance the mission of keeping people safe online.



from Cybersecurity News https://ift.tt/d93o0Hm