Cybersecurity Leadership
21.0K views | +17 today
Follow
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
Scoop.it!

4 ways organizations can take back the advantage from attackers

4 ways organizations can take back the advantage from attackers | Cybersecurity Leadership | Scoop.it
By reorienting systems defense around resilience, “we become more like attackers, we become nimble, empirical, curious,” Kelly Shortridge said at Black Hat USA 2023.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The Changing Face of Cybercrime in a Recession

The Changing Face of Cybercrime in a Recession | Cybersecurity Leadership | Scoop.it

The economic turmoil and its uncertainties will no doubt have knock-on effects, not only across legitimate markets, but in the cybercriminal underworld as well: a general rise in criminal activity, unlikely actors turning to cybercrime, and cybercriminals turning the tables on their peers.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Victims of ransomware attacks paid hackers 4.5 times less in crypto in 2022 than in 2021

Victims of ransomware attacks paid hackers 4.5 times less in crypto in 2022 than in 2021 | Cybersecurity Leadership | Scoop.it

Known cryptocurrency payments to ransomware hackers “totaled a mere $16 million, compared to nearly $74 million USD in 2021,” blockchain intelligence firm Crystal Blockchain says.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Ransom payments fall as fewer victims choose to pay hackers

Ransom payments fall as fewer victims choose to pay hackers | Cybersecurity Leadership | Scoop.it
Ransomware statistics from the second quarter of the year show that the ransoms paid to extortionists have dropped in value, a trend that continues since the last quarter of 2021.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The hacker-for-hire industry is now too big to fail

The hacker-for-hire industry is now too big to fail | Cybersecurity Leadership | Scoop.it

This is a big moment of turbulence and change for the hacking business. But the demand is here to stay.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

SolarWinds hackers have a whole bag of new tricks for mass compromise attacks

SolarWinds hackers have a whole bag of new tricks for mass compromise attacks | Cybersecurity Leadership | Scoop.it
The Kremlin-backed hacking outfit's toolbox seems to grow by the month.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Inertia is the enemy of cybersecurity

Inertia is the enemy of cybersecurity | Cybersecurity Leadership | Scoop.it

It’s not just individual behavioral inertia that makes it easy for bad actors. Organizational inertia is equally a problem, and it’s often the largest organizations that are most stuck in their ways.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

The next big cyberthreat isn't ransomware. It's killware. And it's just as bad as it sounds.

The next big cyberthreat isn't ransomware. It's killware. And it's just as bad as it sounds. | Cybersecurity Leadership | Scoop.it
Hackers increasingly target infrastructure – from hospitals and water supplies to banks and transit – in ways that could injure or kill.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Beyond Kaseya: Everyday IT Tools Can Offer ‘God Mode’ for Hackers

Beyond Kaseya: Everyday IT Tools Can Offer ‘God Mode’ for Hackers | Cybersecurity Leadership | Scoop.it
Attackers are increasingly attuned to the power and potential of remote management software.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The Colonial Pipeline Ransomware Hackers Had a Secret Weapon: Self-Promoting Cybersecurity Firms

The Colonial Pipeline Ransomware Hackers Had a Secret Weapon: Self-Promoting Cybersecurity Firms | Cybersecurity Leadership | Scoop.it
Five months before DarkSide attacked the Colonial pipeline, two researchers discovered a way to rescue its ransomware victims. Then an antivirus company’s announcement alerted the hackers.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Why there is urgency to banking's battle vs cybercrime

Why there is urgency to banking's battle vs cybercrime | Cybersecurity Leadership | Scoop.it
Financial criminals are becoming more daring and sophisticated. Global finance must pursue advanced strategies such as AI-based encryption and anomaly detection to stay ahead of the hackers
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Three Cybersecurity Lessons From The SolarWinds Hack

Three Cybersecurity Lessons From The SolarWinds Hack | Cybersecurity Leadership | Scoop.it

Security is not just about technology, but governance, policies, processes and people.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

U.S. Government Warning on Ransomware Payments: What Does It Mean?

U.S. Government Warning on Ransomware Payments: What Does It Mean? | Cybersecurity Leadership | Scoop.it
Is it illegal to pay hackers in a ransomware attack? U.S. Treasury Department issues a new advisory warning those involved in the ransom payment process.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

MIT researchers devise a way to evaluate cybersecurity methods

MIT researchers devise a way to evaluate cybersecurity methods | Cybersecurity Leadership | Scoop.it
MIT researchers created a generic framework that enables an engineer or scientist to evaluate the effectiveness of defense schemes that seek to limit a hacker’s ability to learn secret information by observing the behavior of a victim computer program.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Predicting which hackers will become persistent threats

Predicting which hackers will become persistent threats | Cybersecurity Leadership | Scoop.it

Taken together, these findings offer insight into the development of proactive cybersecurity solutions.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Know thy enemy: thinking like a hacker can boost cybersecurity strategy

Know thy enemy: thinking like a hacker can boost cybersecurity strategy | Cybersecurity Leadership | Scoop.it
Putting on a red hat and trying to understand the motivations, expectations, behaviors, and goals of bad actors can be a key part of a solid cybersecurity plan.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The Hacker Is In The Details

The Hacker Is In The Details | Cybersecurity Leadership | Scoop.it
If a traditional approach doesn't provide your ideal edge against hackers, the next reasonable step is to effectively disrupt the hacker's kill chain.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Despite Decades of Hacking Attacks, Companies Leave Vast Amounts of Sensitive Data Unprotected

Despite Decades of Hacking Attacks, Companies Leave Vast Amounts of Sensitive Data Unprotected | Cybersecurity Leadership | Scoop.it
A surge in identity theft during the pandemic underscores how easy it has become to obtain people’s private data. As hackers are all too happy to explain, many of them are cashing in on it.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Why you and I will pay the price for the next big cybersecurity crisis

Why you and I will pay the price for the next big cybersecurity crisis | Cybersecurity Leadership | Scoop.it
As a former top civil servant has pointed out, private firms seem happy to let governments pick up the pieces when hackers strike
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Cybercrime matures as hackers are forced to work smarter

Cybercrime matures as hackers are forced to work smarter | Cybersecurity Leadership | Scoop.it
An analysis of 500 hacking incidents across a wide range of industries has revealed trends that characterize a maturity in the way hacking groups operate today.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

A Hacker's Perspective on Cybersecurity in a Hybrid Environment

A Hacker's Perspective on Cybersecurity in a Hybrid Environment | Cybersecurity Leadership | Scoop.it

Why don’t enough business leaders take cybersecurity seriously — especially in this age of remote work, when it’s more crucial than ever?

No comment yet.
Scooped by JC Gaillard
Scoop.it!

As Ransomware Hackers Sit On Millions In Extorted Money, America’s Military Is Urged To Hack Back

As Ransomware Hackers Sit On Millions In Extorted Money, America’s Military Is Urged To Hack Back | Cybersecurity Leadership | Scoop.it
A case stemming from an attack last year shows how companies paid millions in Bitcoin to resume normal operations. It also shows the evolving tactics of law enforcement.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

A Peek Inside the Underground Ransomware Economy

A Peek Inside the Underground Ransomware Economy | Cybersecurity Leadership | Scoop.it
Threat hunters weigh in on how the business of ransomware, the complex relationships between cybercriminals, and how they work together and hawk their wares on the Dark Web.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Why the SolarWinds Hack Is a Wake-Up Call

Why the SolarWinds Hack Is a Wake-Up Call | Cybersecurity Leadership | Scoop.it
The sweeping cyber espionage campaign shows how sophisticated adversaries can bypass even well-defended targets.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

How do you combine ethics and cybersecurity?

How do you combine ethics and cybersecurity? | Cybersecurity Leadership | Scoop.it
After promises of a truce, cyberattacks against hospitals suggest that there is no such thing as ethics among hackers. Really?
No comment yet.