Market Moves: Cybersecurity - Mar 6th, 2024
 
 
Market Moves: Cybersecurity | View online
 
March 6, 2024
From the Editor

A Broadening Threat Landscape

The landscape of cyber threats has evolved into a Chinese restaurant menu-like array of selections. In one instance threats can come hot and heavy at critical infrastructure and then manifest as deepfake AI-generated misinformation bombs. And during it all cybersecurity leaders must stay focused on what matters most.

On the heels of the recent MGM cyberattack, large organizations are reminded of how devastating a simple breach can be for business, reputation and the bottom line, according to Max Vetter in his feature; Are cyber leaders focusing on the wrong things? He writes that unfortunately, ransomware continues to run rampant, and such attacks have doubled in cost over the past two years. Cyber-attacks aren’t a matter of “if” anymore, but a matter of “when.”

An article on How to unmask the threat of AI-generated deepfakes by Dominic Forrest discusses the evolving threats that deepen the need for secure biometrics in enterprise security strategies. Forrest introduces a relatively new concept facing legacy authentication solutions, once the guardians trusted to secure sensitive information that is now grappling with the unpredictable nature of cybercrime. Today, we find ourselves in the era of "Crime as a Service," (CaaS) where cybercriminal networks operate with alarming sophistication and speed. These networks leverage extensive communication channels, trading profitable tools, techniques, and stolen information, including identities, within the dark web.

We also highlight a compelling piece from Joe Weis detailing how the U.S. electric industry is not responding to cyber-vulnerable Chinese equipment and why the utility sector continues to ignore the cyber threat from Chinese equipment. The electric grid is interconnected. The interconnectivity goes not only between utilities but also between facilities connected to the grid. This fact is pointed out in various interoperability studies. The Chinese (and other threat actors) are exploiting this cybersecurity gap.

Read on and thanks.

Steve Lasky, Editorial Director for the EBM Security Media Group

 

Cyber attacks aren’t a matter of “if” anymore, but a matter of “when.”
The utility sector continues to ignore the cyber threat from Chinese equipment.
The evolving threats deepen the need for secure biometrics in enterprise security strategies
Fraudsters are keeping a close eye on ever-evolving technology and finding the best ways to leverage it in new and sophisticated ways to make committing fraud easier and more difficult to detect.
Sponsored

Unleash your marketing superpowers with data-driven insights and informed content marketing. Leverage our market expertise to create on-point strategies and connect with your audience like never before.

The report, DDoS: Here to Stay, revealed that more than one-third (35%) of all DDoS attacks in 2023 were aimed at the financial services industry.
The new federal agency-focused training helps address government cybersecurity mandates and pillars of the National Cybersecurity Strategy.
Dell Managed Detection and Response is now available for global customers with the CrowdStrike Falcon XDR Platform as a direct solution and through channel partners.
New protections will secure organizations – by default – from attempted attacks, abuse, and tampering as they increasingly rely on AI models.
Learn and hear stories from a mixture of our top GSE experts, security leaders, and cyber talent managers on how you can apply their experiences and career journey to maximize your own success.
Ed Levy discusses defining CI, what makes CI a dynamic operating environment, and the importance of leadership on the CI front.