Dr. Chase Cunningham - Weekly cybersecurity news September 6, 2023

  • News
  • By Daniel Michan
  • Published on September 6, 2023

Top 10 Things to Know in Cybersecurity This Week

Hello and welcome to this week's edition of the top ten things you need to know in cybersecurity. I'm Chase Cunningham, Dr. Zero Trust, reporting for Cybersecurity HQ. Let's dive right in and discuss the most important updates and news in the industry.

1. US Air Force's Years-Long Plan for Zero Trust (ZT)

The US Air Force has announced its comprehensive plan for implementing Zero Trust principles within its organization. This underscores the importance of Zero Trust in the cybersecurity landscape. The Air Force's projected timeline for achieving a definable Zero Trust environment is set for 2027. While it may seem lengthy, it demonstrates that even large agencies can work towards Zero Trust implementation over time.

2. SEC Cyber Rules and Increased Liabilities for CFOs

The Security Exchange Commission (SEC) has put new cybersecurity rules into effect, raising the stakes for CFOs and other corporate leaders. These rules expose CFOs to increased personal liability risks and highlight the necessity for a better understanding of cybersecurity risks. Failure to comply with these rules can result in breach of fiduciary duty and significant penalties.

3. Achieving Max Security with Zero Trust

An article in Enterprise Security Magazine explores the adoption of Zero Trust principles and discusses the use of technologies like User and Entity Behavior Analytics (UEBA). UEBA can provide valuable insights into user activities and help identify anomalies, making it an effective tool in achieving maximum security within organizations.

4. Addressing Easily Avoidable Certificate Management Issues

According to a study published by AppViewX, 60% of data breaches can be attributed to avoidable digital certificate-related management issues. Organizations that neglect proper certificate management face risks such as unplanned outages and significant financial losses. It is crucial for businesses to prioritize the management of certificates to enhance cybersecurity.

5. Detection and Prevention of Malware Attacks

BlackBerry's statistical data reveals that their AI-powered endpoint protection solution reported and blocked a total of 1.6 million malware-based attacks in just 90 days. The number of unique attacks reached 200,000 during that period. This highlights the continuous need for strong cybersecurity measures to counter the ever-evolving threat landscape.

6. Securing BYOD with Zero Trust

Bring Your Own Device (BYOD) policies have become increasingly common in organizations. An article in Cybersecurity News emphasizes the importance of adopting Zero Trust principles to ensure the security of personal devices accessing corporate networks. Implementing robust security measures is vital to protect sensitive data and prevent potential breaches.

7. Making the Case for Cybersecurity Budgets

It is essential for organizations not to cut cybersecurity budgets, as doing so can have severe repercussions. A resource from It Pro Today explains how to make the case for cybersecurity budgets, highlighting the value of effective cybersecurity measures as a competitive differentiator, revenue source, and branding opportunity. Estimating the cost of inaction and leveraging regulatory hazards can help emphasize the importance of cybersecurity investment.

8. Cybersecurity's Impact on Patient Care

In the healthcare industry, cybersecurity plays a critical role in patient safety and care. Cybersecurity breaches can result in the compromise of sensitive patient data and violations of regulations like HIPAA. Ensuring robust cybersecurity measures within healthcare organizations is crucial to maintain patient trust, protect sensitive information, and comply with relevant regulations.

9. Cybersecurity Failures in UK Election System

The UK Electoral Commission recently failed a cybersecurity audit, raising concerns about the security of election systems. This failure highlights the vulnerability of electoral processes to cyber threats. It serves as a reminder for all countries, including the US, to prioritize the security of their election systems and take necessary steps to mitigate risks.

10. Funding Challenges for State and Local Election Security

State and local governments in the US face significant challenges in securing their election systems due to limited budgets and resources. Additional requirements imposed by the federal government create financial burdens that may divert funds from critical services like water and power. This highlights the need for comprehensive federal support to ensure the security and integrity of state and local election systems.

In closing, these ten topics provide valuable insights into the current state of cybersecurity. It is essential to stay informed about the latest trends, threats, and regulatory changes to effectively protect organizations and individuals from cyber-attacks. Stay smart, stay safe, and stay secure!