{"id":5003,"date":"2021-12-30T12:23:22","date_gmt":"2021-12-30T12:23:22","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/?p=5003"},"modified":"2021-12-30T12:23:22","modified_gmt":"2021-12-30T12:23:22","slug":"it-security-news-mon-5-dec-2021","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2021\/12\/30\/it-security-news-mon-5-dec-2021\/","title":{"rendered":"IT Security News &#8211; Mon, 5 Dec 2021"},"content":{"rendered":"\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0aa73f9423bf4ba2\/618d94425b776178929f4f7a\/cybersecurity_RanczAndrei-AlamyStock.jpg\" width=\"16\">&nbsp;<strong>Gauging Cybersecurity Resiliency and Why It Matters<\/strong><br><em>Joao-Pierre S. Ruth<\/em><br><em>Information Week<\/em><br>Early this month, Accenture released results of its annual State of Cyber Resilience study, which asked more than 4,700 executives questions about their organizations\u2019 effectiveness in halting cyberattacks.<br>Ryan LaSalle, senior managing director and Accenture Security\u2019s North America lead, says resiliency (as the survey defines it) is a measure of the ability to survive and thrive while under cyberattack.<br>Which Cyber Defender Are You?<br>\u201cBusiness Blockers\u201d sought to prioritize cybersecurity resilience over the organization\u2019s business strategy even to the point of being seen as impeding business objectives.<br>\u201cThe Vulnerable\u201d did not have security measures aligned with their business strategy and held security at bare minimum.<br>\u201cCyber Risk Takers\u201d focused on business growth and speed to market for the sake of the company strategy, though they understood and accepted the risks.<br>\u201cCyber Champions\u201d pursued a balance where they aimed to protect the organization\u2019s key assets while also aligning with business strategy so key objectives could still be pursued in a meaningful, reasonable fashion.<br>Security spending is up, LaSalle says, coming in at 15% of IT budgets in 2021 compared with 10% in 2020.<br>How organizations invest in security can determine whether increased spending actually results in improved performance, he says. \u201cFor a lot of people in the \u2018Vulnerable\u2019 category, their security and technology debt is pretty high,\u201d he says. \u201cThey haven\u2019t historically kept up with [tech] investment; they haven\u2019t been able to get security embedded into all the programs they need; they\u2019re always playing catchup and they will always be behind the curve.\u201d<br>Numerous enterprises are still trying to figure out how to securely advance their business strategies in the cloud.<br>The conversation is changing, he says, with organizations showing that by making security part of the plan early, it is possible to accelerate cloud adoption. \u201cYou can get there faster and more surely by having security at the table in the beginning and starting to look at ways to automate the capabilities that are needed,\u201d LaSalle says.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.informationweek.com\/security-and-risk-strategy\/gauging-cybersecurity-resiliency-and-why-it-matters?_mc=NL_IWK_EDT_IWK_daily_20211116&amp;cid=NL_IWK_EDT_IWK_daily_20211116&amp;elq_mid=10759\">https:\/\/www.informationweek.com\/security-and-risk-strategy\/gauging-cybersecurity-resiliency-and-why-it-matters?_mc=NL_IWK_EDT_IWK_daily_20211116&amp;amp;cid=NL_IWK_EDT_IWK_daily_20211116&amp;amp;elq_mid=10759<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/webrequest-proxy-df5h6gms3a-ue.a.run.app\/_ssl\/proxy.php\/http\/vsdaily.com\/\" width=\"16\">&nbsp;<strong>90% of IT Decision Makers Believe Organizations Compromise on Cybersecurity in Favor of Other Goals<\/strong><br><em>VS Daily<\/em><br>Trend Micro Incorporated has announced new research revealing that 90% of IT decision makers claim their business would be willing to compromise on cybersecurity in favor of digital transformation, productivity, or other goals.<br>Additionally, 82% have felt pressured to downplay the severity of cyber risks to their board.<br><br>The research reveals that just 50% of IT leaders and 38% of business decision makers believe the C-suite completely understand cyber risks.<br>Although some think this is because the topic is complex and constantly changing, many believe the C-suite either doesn\u2019t try hard enough (26%) or doesn\u2019t want (20%) to understand.<br><br>However, 31% of respondents believe cybersecurity is the biggest business risk today, and 66% claiming it has the highest cost impact of any business risk \u2013 a seemingly conflicting opinion given the overall willingness to compromise on security.<br><br>There are three main ways respondents believe the C-suite will sit up and take notice of cyber risk:<br>62% think it would take a breach of their organization<br>62% it would help if they could better report on and more easily explain the business risk of cyber threats<br>61% say it would make an impact if customers start demanding more sophisticated security credentials<br><strong>Link:<\/strong>&nbsp;<a href=\"http:\/\/vsdaily.com\/90-of-it-decision-makers-believe-organizations-compromise-on-cybersecurity-in-favor-of-other-goals\/\">http:\/\/vsdaily.com\/90-of-it-decision-makers-believe-organizations-compromise-on-cybersecurity-in-favor-of-other-goals\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/mma.prnewswire.com\/media\/1492212\/JupiterOne_Logo.jpg\" width=\"16\">&nbsp;<strong>Study Reveals 70% of Security and IT Pros Find Security Hygiene and Posture Management Increasingly Challenging Over the Past Two Years<\/strong><br><em>TMC Net News<\/em><br>MORRISVILLE, N.C., Nov. 18, 2021 \/PRNewswire\/ &#8212; JupiterOne, the cybersecurity industry&#8217;s leading cyber asset management and governance solutions provider, today announced the findings of a new survey by Enterprise Strategy Group (ESG), which warns of inadequate security hygiene and posture management practices at many organizations.<br><br>The ESG research found that 86% of organizations believe they follow best practices for security hygiene and posture management.<br>However, 70% of organizations said they use more than ten security tools to manage security hygiene and posture management, which raises concerns about data management and operations overhead, according to Jon Oltsik, ESG Principal Analyst and Fellow, and author of the report.<br><br>In addition, 73% of security professionals admitted that they still depend on spreadsheets to manage security hygiene and posture at their organizations.<br>As a result, 70% of respondents said that security hygiene and posture management had become more difficult over the past two years as their attack surfaces have grown.<br><br>Overall, the report suggests that security asset management programs are too often informal, disorganized, and immature.<br>It sugests that organizations would benefit from adopting greater integration technologies, advanced analytics, and process automation, according to ESG.<br><br>The survey exposed many dangerous vulnerabilities, as nearly one-third of respondents (31%) said they discovered sensitive data in previously unknown locations, and 30% found websites with a path to their organizations.<br>In addition, 29% uncovered employee corporate credentials or misconfigured user permissions, while 28% exposed previously unknown SaaS applications.<br><br>Perhaps most troubling is the fact that 69% of organizations admitted they had experienced at least one cyber-attack that started through the exploit of an unknown or unmanaged internet-facing asset, including software, cloud-based workloads, user accounts, and IoT devices.<br><br>As a result of these threats, the survey found that 80% of organizations plan to increase spending for security hygiene and posture management within the next 18 months.<br>The top budget priorities areas include data security tools (31%); cyber-risk quantification tools (30%); and cloud security posture management (28%).<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.tmcnet.com\/usubmit\/2021\/11\/18\/9496001.htm\">https:\/\/www.tmcnet.com\/usubmit\/2021\/11\/18\/9496001.htm<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/mma.prnewswire.com\/media\/1688824\/Xenith_appoints_Bill_Long_as_CISO.jpg\" width=\"16\">&nbsp;<strong>Xenith Names Bill Long Chief Information Security Officer<\/strong><br><em>TMC Net News<\/em><br>RESTON, Va., Nov. 17, 2021 \/PRNewswire\/ &#8212; Xenith Solutions (Xenith) today announced Bill Long has been named as the new Chief Information Security Officer (CISO) overseeing cybersecurity operations and strategy for Xenith and TRI-COR Industries (TCI); a wholly owned subsidiary of Xenith.<br><br>Mr. Long, who has been working as a Sr.<br>Cybersecurity Engineer for Xenith since it was founded, has over 40 years of industry experience in large enterprise network environments specializing in cybersecurity architecture, design, engineering, and operations.<br>Mr. Long will report directly to the owners of Xenith.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.tmcnet.com\/usubmit\/2021\/11\/17\/9494467.htm\">https:\/\/www.tmcnet.com\/usubmit\/2021\/11\/17\/9494467.htm<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/vigilance-securitymagazine.com\/templates\/shaper_news365\/images\/favicon.ico\" width=\"16\">&nbsp;<strong>Survey Finds CISOs are Missing Holidays like Thanksgiving and Not Taking Vacation Due to Work Demands<\/strong><br><em>Vigilance Security Magazine<\/em><br>A new report from Human Layer Security company Tessian reveals that two in five Chief Information Security Officers (CISOs) have missed holidays like Thanksgiving due to work demands.<br>In addition, one-quarter have not taken time off work in the past 12 months.<br><br>In addition to missing national holidays, Tessian\u2019s report reveals that CISOs work, on average, 11 more hours than they\u2019re contracted to each week while one in 10 works 20 to 24 hours extra a week.<br>As a result of their stressful jobs, 59% of CISOs say they struggle to always switch off from work once the working day is over.<br><br>A quarter of security leaders said they spend between nine and 12 hours per month investigating and remediating each threat caused by human error, while more than one in 10 spend over a day.<br>So it\u2019s no surprise that 34% of CISOs reported spending excessive time on triaging and investigation.<br><br>In addition, 38% of CISOs believe they\u2019re spending too much time in departmental meetings and reporting to the board on cybersecurity, while one-third also feel drained by administrative tasks.<br>Similarly, 38% of CISOs also report feeling that they are spending too little time on their own career development.<br>When asked to elaborate on what they are not spending enough time on, CISOs said: hiring talent for my team (36%), attending non-departmental meetings (38%), communicating to customers (35%), researching new industry updates and trends (36%) and working on my own career development (38%).<br><br>In addition, 42% of CISOs say they have missed a federal or national holiday like Thanksgiving or Christmas, and 40% have missed a family vacation due to work.<br>One-third of CISOs report being unable to exercise regularly.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/vigilance-securitymagazine.com\/news\/top-categories\/case-studies\/10900-survey-finds-cisos-are-missing-holidays-like-thanksgiving-and-not-taking-vacation-due-to-work-demands\">https:\/\/vigilance-securitymagazine.com\/news\/top-categories\/case-studies\/10900-survey-finds-cisos-are-missing-holidays-like-thanksgiving-and-not-taking-vacation-due-to-work-demands<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/venturebeat.com\/wp-content\/themes\/vb-news\/img\/favicon.ico\" width=\"16\">&nbsp;<strong>Report: Only half of companies employ a CISO<\/strong><br><em>Venture Beat<\/em><br>According to a new report from managed cloud service provider Navisite, nearly half (45%) of companies surveyed do not employ a chief information security officer (CISO).<br>However, 58% believe they should hire a CISO or CSO.<br><br>Due to a noticeable lack of cybersecurity leadership, Navisite found that 60% rely on other parts of their organization outside the CISO\/CSO or security team, including IT, executive leadership, and compliance.<br>75% of organizations also reported an increase in overall threat volume over the last year, with ransomware (37%) and phishing\/spear-phishing (33%) reported as the top cyberthreats.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/venturebeat.com\/2021\/11\/19\/report-only-half-of-companies-employ-a-ciso\/\">https:\/\/venturebeat.com\/2021\/11\/19\/report-only-half-of-companies-employ-a-ciso\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/securelist.com\/wp-content\/themes\/securelist2020\/assets\/images\/content\/site-icon.png\" width=\"16\">&nbsp;<strong>The dangers of \u201cconnected\u201d healthcare: predictions for 2022<\/strong><br><em>Maria Namestnikova<\/em><br><em>Secure List<\/em><br>For a second consecutive year, the time for Kaspersky to make its predictions for the healthcare sector comes amid the global COVID-19 pandemic.<br>Unfortunately, the virus still dominates most aspects of our lives, and, of course, the pandemic remained the biggest and most-discussed topic in medicine.<br><br>Predictions for the year 2022<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Telemedicine will continue evolving.<\/li><li>malicious counterfeits of telehealth apps will most likely appear in app stores: fake apps that will imitate the real thing and promise to deliver the same functionality.<\/li><li>Demand for fake digital medical documents will increase, as will supply.<\/li><li>The sensitivity of the medical data found in leaks will grow.<\/li><li>The medical theme will forever be a popular one for use as bait in cybercrime schemes.<\/li><\/ul>\n\n\n\n<p>If the year 2022 does not see a wide-scale training process \u2013 and none is expected at the moment \u2013 we will witness a continued increase in the type of attacks in question.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/securelist.com\/connected-healthcare-predictions-for-2022\/104969\/\">https:\/\/securelist.com\/connected-healthcare-predictions-for-2022\/104969\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/www.rtinsights.com\/wp-content\/uploads\/2021\/11\/cyber-security-Depositphotos_63185655_S-e1637594907478.jpg\" width=\"16\">&nbsp;<strong>Next Up on the Network Security Hype Cycle: CAASM<\/strong><br><em>Elizabeth Wallace<\/em><br><em>RT Insights<\/em><br>Gartner\u2019s Hype Cycle for network security has identified Cyber Asset Attack Surface Management (CAASM) as an emerging technology.<br>It could help companies and enterprises reduce vulnerability without reducing the visibility of cyber assets.<br><br>Gartner identifies the following drivers for CAASM adoption:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Companies have full visibility into all digital assets for the first time, allowing for better security coverage.<\/li><li>Companies see gaps and ensure remediated security steps throughout the environment.<\/li><li>Companies also significantly reduce the time and effort going into audit compliance.<\/li><li>CAASM reduces laborious manual retrieval systems and unites all assets across a single environment.<\/li><\/ul>\n\n\n\n<p>When audits happen, no one has to go looking for missing information.<br>It consolidates all assets into a platform with a single, normalized view.<br>All teams have access to this view, including any stakeholders responsible for the security or who could benefit from such a consolidated view and query capability.<br>Companies can finally accomplish bringing third party and shadow IT systems into the fold.<br>CAASM experiences less resistance than other solutions and could offer vital control back to IT.<br>CAASM is on Gartner\u2019s \u201con the rise\u201d list for good reason.<br>It\u2019s experiencing increasing maturity, but still, some obstacles remain to its full market saturation.<br><br>Because it\u2019s so new, companies may have challenges scaling CAASM and finding tools that integrate with it.<br>Integration teams may also block access.<br><br>The good news is that being on Gartner\u2019s hype cycle provides incentives for companies to address both of these challenges.<br>Businesses looking to adopt these measures can keep an eye out for emerging resources as the cycle moves forward.<br><br>Although Gartner identifies a less than 1% adoption rate at the current moment, this emerging solution could be the next big thing in cybersecurity.<br>Companies must address security weaknesses in their networked applications as well as non-IT-controlled ones, and CAASM may finally provide a solution.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/www.rtinsights.com\/next-up-on-the-network-security-hype-cycle-caasm\/\">https:\/\/www.rtinsights.com\/next-up-on-the-network-security-hype-cycle-caasm\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/federalnewsnetwork.com\/wp-content\/uploads\/2017\/12\/cropped-icon-512x512-1-300x300.png\" width=\"16\">&nbsp;<strong>Agencies entering \u2018execution\u2019 phase of Biden\u2019s cyber executive order<\/strong><br><em>Justin Doubleday<\/em><br><em>Federal News Network<\/em><br>Agencies have seen a deluge of new guidance and standards released since President Joe Biden\u2019s May cybersecurity executive order, and a top White House cyber official says the government is now shifting into the execution phase of the sprawling directive.<br><br>The White House Office of Management and Budget also released a draft zero trust strategy, outlining the security architecture that underpins the executive order\u2019s push to overhaul federal cybersecurity practices.<br><br>Earlier this month, the Cybersecurity and Infrastructure Security Agency also released a binding operational directive requiring agencies to patch a series of known vulnerabilities.<br>Agencies had two weeks to patch vulnerabilities discovered this year, and six months to remediate those identified between 2017 and 2020.<br><br>OMB is focused on ensuring agencies aren\u2019t just aware of the vulnerabilities that are on their networks, but also have the resources to remediate them, DeRusha said.<br><br>The federal CISO was also recently given a second title as deputy national cyber director for federal cybersecurity within Chris Inglis\u2019 new office at the White House.<br>As the national cyber director, Inglis serves as \u201ca principal advisor to the president on cybersecurity policy and strategy, and cybersecurity engagement with industry and international stakeholders,\u201d according to the White House.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/federalnewsnetwork.com\/cybersecurity\/2021\/11\/agencies-entering-execution-phase-of-bidens-cyber-executive-order\/\">https:\/\/federalnewsnetwork.com\/cybersecurity\/2021\/11\/agencies-entering-execution-phase-of-bidens-cyber-executive-order\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/astig.ph\/wp-content\/uploads\/2017\/03\/cropped-sun-red-1-3-270x270.png\" width=\"16\">&nbsp;<strong>Top 5 hottest topics at this year\u2019s largest cybersecurity conference<\/strong><br><em>ASTIG<\/em><br>PHILIPPINES \u2013 DECODE 2021, the country\u2019s largest cybersecurity conference hosted free of charge by Trend Micro Philippines, welcomed over 1,200 Filipinos on its first day.<br>1) Now, Else Be Too Late: Relevant Just-in-Time Decisions<br>2) Ransomware: 2021 Threat Landscape<br>3) Cybercrime Through the Lens of Law Enforcement and Private Partners<br>4) The Evolution of a CISO Role<br>5) Get IT Girl, Careers in Cybersecurity, and Cybersecurity Fundamentals<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/astig.ph\/decode-2021-hot-topics\/\">https:\/\/astig.ph\/decode-2021-hot-topics\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/i1.wp.com\/nationalcybersecurity.com\/wp-content\/uploads\/security-conference_buzz_mobile.jpg?fit=520%2C239&amp;ssl=1\" width=\"16\">&nbsp;<strong>Top cybersecurity conferences for when Black Hat and RSA aren\u2019t right | #cybersecurity | #conferences | #cybersecurity | #infosecurity | #hacker<\/strong><br><em>Angela Dennis<\/em><br><em>National Cyber Security<\/em><br>DerbyCon<br>Security BSides<br>ShmooCon<br>CanSecWest<br>Ultimately, the decision of which cybersecurity conferences to attend will depend on which ones best meet the needs of the individual.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/nationalcybersecurity.com\/top-cybersecurity-conferences-for-when-black-hat-and-rsa-arent-right-cybersecurity-conferences-cybersecurity-infosecurity-hacker\/\">https:\/\/nationalcybersecurity.com\/top-cybersecurity-conferences-for-when-black-hat-and-rsa-arent-right-cybersecurity-conferences-cybersecurity-infosecurity-hacker\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/vmblog.com\/archive\/2021\/11\/22\/favicon.ico\" width=\"16\">&nbsp;<strong>Zero Trust Truths, Ransomware Risks, IoT Threats &amp; Reality Recognition<\/strong><br><em>Tim Eades<\/em><br><em>vm Blog.com<\/em><br>2021 was the year when ransomware went mainstream, and so did the realization that much of our digital life counts as essential infrastructure for work, play and survival.<br>For organizations dealing with cyber vulnerabilities, accelerated digital transformation and migration to complex cloud environments, the consequences of increased vulnerabilities became more stark.<br>After a record year for both cyberattacks and enterprises transforming their IT infrastructures, don&#8217;t expect to see this change any time soon.<br><br>In 2022, we can expect to see four main challenges created by organizations&#8217; lack of cyber preparedness and visibility into their IT environments.<br><br>First, Zero Trust will continue to be a high-level concept that means something different to everyone.<br>Next, C-suites will continue to be threatened by the specter of ransomware attacks.<br>Another trend that will continue to accelerate is the merging of the physical realm, e.g., the Internet of Things (IoT), and the realm of cybersecurity.<br>Finally, 2022 is shaping up to be the year when observability emerges as a primary element to provide comprehensive security and increased resilience to the enterprise.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/vmblog.com\/archive\/2021\/11\/22\/varmour-2022-predictions-zero-trust-truths-ransomware-risks-iot-threats-reality-recognition.aspx\">https:\/\/vmblog.com\/archive\/2021\/11\/22\/varmour-2022-predictions-zero-trust-truths-ransomware-risks-iot-threats-reality-recognition.aspx<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/istart.com.au\/wp-content\/uploads\/2014\/11\/i_129x129.png\" width=\"16\">&nbsp;<strong>Deloitte: Absolute security \u2018an unrealistic nirvana\u2019<\/strong><br><em>Heather Wright<\/em><br><em>iStart<\/em><br>\u201cAbsolute security is an unrealistic nirvana,\u201d says Simon Owen, Deloitte global clients and industries leader, in the Deloitte 2021 Future of Cyber report.<br><br>Seventy-two percent of the nearly 600 global C-level executives surveyed for the report said their organisations experienced between one and 10 cyber incidents and breaches in the past year.<br><br>In Australia the ACSC received more than 67,500 cybercrime reports in the year to July \u2013 that\u2019s one report every eight minutes.<br>The latest report from Cert NZ, meanwhile, shows there were more than 1,350 cyber security incidents responded to by the agency in Q2.<br><br>Unsurprisingly, the Deloitte report notes the impact of digital transformation as a factor in the increase in cyberattacks, with 69 percent of global leaders \u2013 consistent across all geographies \u2013 saying they\u2019ve noted a significant increase in attacks.<br><br>\u201cLeadership must make intelligent risk-based decisions on what to protect, and what assets are less important,\u201d Owen says.<br><br>Those decisions need to be made swiftly, he warns, with continual reassessment as environments inside and outside the organisation changes.<br><br>Collective global spending has now reached $145 billion a year and is predicted to exceed $1 trillion by 2035, according to the World Economic Forum.<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/istart.co.nz\/nz-news-items\/deloitte-absolute-security-an-unrealistic-nirvana\/\">https:\/\/istart.co.nz\/nz-news-items\/deloitte-absolute-security-an-unrealistic-nirvana\/<\/a><\/p>\n\n\n\n<p><img loading=\"lazy\" decoding=\"async\" height=\"16\" src=\"https:\/\/vmblog.com\/favicon.ico\" width=\"16\">&nbsp;<strong>New Cybercriminal Capabilities and Talent Challenges Ahead<\/strong><br><em>Tal Mozes<\/em><br><em>vm Blog.com<\/em><br>1) DarkCloud Is Coming.<br>Get Ready for a Stormy 2022<br>Ransomware and malware are already available as a service, and will use cloud native technologies to attack cloud infrastructure at scale.<br>2) Cyber Insurance Will Require Incident Readiness<br><br>3) Three Ransomware Trends to Watch in 2022<br>Regulators will increase the responsibility and accountability of victims of ransomware for their part in the game.<br>Boards of directors will bear personal responsibility if their organization is a victim of ransomware, increasing the importance of preparedness for risk, cyber risk, and ransomware.<br>Attackers will become more sophisticated.<br>Upping the ante from encryption to double extortion will no longer be enough.<br>Now attackers will have enough data and environment access to be able to conduct denial of service attacks, making it that much harder for organizations struggling with DDoS (on top of encryption and extortion) to return to business as usual.<br><br>4) More Cloud = Bigger Resource Gap<br><br>5) New Cyber Talent Will Turn to Hacking<br><br>6) Increased Attacks on SaaS<br><br>7) Pandemic Increases Pressure on CISOs to Improve Readiness<br><strong>Link:<\/strong>&nbsp;<a href=\"https:\/\/vmblog.com\/archive\/2021\/11\/23\/mitiga-2022-predictions-new-cybercriminal-capabilities-and-talent-challenges-ahead.aspx\">https:\/\/vmblog.com\/archive\/2021\/11\/23\/mitiga-2022-predictions-new-cybercriminal-capabilities-and-talent-challenges-ahead.aspx<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;Gauging Cybersecurity Resiliency and Why It MattersJoao-Pierre S. RuthInformation WeekEarly this month, Accenture released results of its annual State of Cyber Resilience study, which asked more than 4,700 executives questions about their organizations\u2019 effectiveness in halting cyberattacks.Ryan LaSalle, senior managing director and Accenture Security\u2019s North America lead, says resiliency (as&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-5003","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/5003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=5003"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/5003\/revisions"}],"predecessor-version":[{"id":5004,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/5003\/revisions\/5004"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=5003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=5003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=5003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}