The Case Against Abandoning CrowdStrike Post-Outage

October 31, 2024 at 10:01AM The July CrowdStrike outage highlighted risks in vendor security, prompting discussions on industry responses to such events. Companies should assess vendor reliability, avoid hasty changes, and maintain a balanced approach to updates. Leaders must act cautiously, avoiding panic-driven decisions while improving cybersecurity resilience and business continuity strategies. ### Meeting Takeaways … Read more

Fortifying the Weakest Link: How to Safeguard Against Supply Chain Cyberattacks

September 26, 2024 at 07:55AM Cybercriminals are exploiting vulnerabilities in widely-used IT and security tools, leading to major security incidents. Recent examples include attacks on Ivanti enterprise VPNs, TeamCity, and Fortra GoAnywhere MFT. These incidents underscore the importance of safeguarding against supply chain cyberattacks. Strategies to mitigate these risks include advanced supplier risk management, securing … Read more

AT&T to Pay $13 Million in Settlement Over 2023 Data Breach

September 18, 2024 at 08:24AM AT&T has agreed to pay $13 million in a settlement with the FCC over a 2023 data breach compromising customer information. The FCC’s consent decree addresses AT&T’s failure to protect customer data and mandates investments in data protection measures. AT&T is required to limit vendor access to customer information and … Read more

Unexpected Lessons Learned From the CrowdStrike Event

July 25, 2024 at 02:44PM Many organizations are facing global IT issues due to a defect in CrowdStrike’s Falcon sensor content update, impacting operations across sectors. This event highlights the importance of improving cyberattack response capabilities. Lessons include evaluating detection speed, prioritizing recovery, executing business continuity plans effectively, and addressing supply chain risks to enhance … Read more

Supply Chain Breaches Up 68% Year Over Year, According to DBIR

May 6, 2024 at 07:57PM Supply chain breaches rose steeply in 2023, with 15% involving third parties, up from 9% in 2022. Verizon’s DBIR considers not only vendor compromises but also vulnerabilities in third-party software. Exploited vulnerabilities, primarily in ransomware attacks, were the most common issue, prompting the suggestion to assess vendor choices and prioritize … Read more

Southern Company Builds SBOM for Electric Power Substation

March 6, 2024 at 08:03AM Southern Company undertook a project to create a software bill of materials (SBOM) for its Mississippi substation, involving inventorying hardware, software, and firmware, and gathering supply-chain information from 17 vendors. The process included challenges such as limited vendor cooperation and outdated SBOMs upon receipt. The project highlighted the importance of … Read more

Redefining Cybersecurity for a Comprehensive Security Posture

January 26, 2024 at 10:15AM Cybersecurity involves securing business infrastructure and endpoints from unauthorized access, with various specialized teams leading different aspects. The discipline of fraud prevention has further fragmented the landscape. Combining these disciplines under one umbrella is beneficial, offering a comprehensive cybersecurity posture, efficient resource utilization, reduced capital burn, and a unified response … Read more

Tips for Modernizing SecOps Teams

December 14, 2023 at 08:48AM The security operations center serves as the first line of defense against active attacks, but is often underfunded and understaffed. Dark Reading’s special report “Key Elements Enterprises Needs to Include in Modern SecOps” details the challenges facing modern enterprise security operations centers and suggests strategies for investing in tools, automation, … Read more