Tag: resilience
-
Cyber Resilienz muss neu gedacht werden
Eine aktuelle Umfrage zeigt: Deutsche Unternehmen rüsten auf “šResilient by Design’ wird zur Priorität, um sich gegen unausweichliche Ausfälle zu wappnen. 63 Prozent erwarten binnen eines Jahres ein bedeutendes Ausfallszenario, 53 Prozent haben in den vergangenen sechs Monaten bereits eins erlebt. First seen on itsicherheit-online.com Jump to article: www.itsicherheit-online.com/news/security-management/cyber-resilienz-muss-neu-gedacht-werden/
-
What Is the Board’s Role in Cyber-Risk Management in OT Environments?
By taking several proactive steps, boards can improve their organization’s resilience against cyberattacks and protect their critical OT assets. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/board-role-cyber-risk-management-ot-environments
-
Deepwatch Acquires Dassana to Boost Cyber-Resilience With AI
Acquisition strengthens Deepwatch Platform capabilities with actionable insights and risk-based prioritization. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/deepwatch-acquires-dassana-to-boost-cyber-resilience-with-ai
-
Deepwatch Acquires Dassana to Boost Cyber Resilience With AI
Acquisition strengthens Deepwatch Platform capabilities with actionable insights and risk-based prioritization. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/deepwatch-acquires-dassana-to-boost-cyber-resilience-with-ai
-
How to break down barriers to cyber resilience
First seen on scworld.com Jump to article: www.scworld.com/resource/how-to-break-down-barriers-to-cyber-resilience
-
Cybersecurity in 2025: AI, Attack Surfaces and the Shift to Cyber Resilience
Hello, I’m Krista Case, research director on the team here at The Futurum Group. I’m here today to walk you through three of the key trends that we’re going to be watching in the cybersecurity space. The first topic is the fact that AI is accelerating the race between attackers and defenders. The second topic..…
-
3 Steps to Take to Meet DORA Compliance Before April 30, 2025
Chief Information Security Officers (CISOs) face an important milestone on April 30th, 2025: ensuring their organizations are ready to meet the strict requirements of the EU’s Digital Operational Resilience Act (DORA). By April 30th, companies must have established comprehensive registers of information related to their Information and Communication Technology (ICT) services. This involves not only……
-
Cybersecurity as a Business Imperative: Embracing a Risk Management Approach
Cybersecurity is much more than just a technical challenge. It’s now a critical business imperative that requires a strategic risk management approach. By integrating cybersecurity into broader risk management frameworks, you can proactively address threats, improve resilience, and align your security efforts with your core business objectives. Shifting your organization’s collective mindset around this concept…
-
Digitale Infrastrukturen: Redundanz und Resilienz zur Stärkung der Sicherheit in Europa
Tags: resilienceFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/digital-infrastrukturen-redundanz-resilienz-staerkung-sicherheit-europa
-
How to evaluate and mitigate risks to the global supply chain
Tags: access, business, ceo, ciso, communications, compliance, control, cyberattack, cybersecurity, data, framework, governance, government, intelligence, international, ISO-27001, kaspersky, microsoft, mitigation, monitoring, office, resilience, risk, risk-assessment, risk-management, russia, service, soc, software, supply-chain, technology, threat, tool, update, vulnerabilityMaintain a diversified supply chain: Organizations that source from international technology suppliers need to ensure they are not overly reliant on a single vendor, single region or even a single technology. Maintaining a diversified supply chain can mitigate costly disruptions from a cyberattack or vulnerability involving a key supplier, or from disruptions tied to regulatory…
-
New GRC and cyber risk strategies emphasize risk adaptability
MetricStream has unveiled its annual forecast of key trends shaping the future of GRC and Cyber GRC. These 2025 predictions offer a roadmap for building resilience strategies, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/02/14/grc-predictions/
-
From Reactive to Predictive: Building Cyber Resilience for 2025
When you’re resilient to something, you don’t just endure; you adapt, recover, and emerge stronger. This idea is what should motivate companies to focus more on cyber resilience. It’s not enough to simply weather the storm of a cyberattack; true resilience means predicting the storm’s arrival, minimizing its impact, and ensuring business operations bounce back…
-
The blueprint for cyber resilience: How businesses can adapt and thrive
First seen on scworld.com Jump to article: www.scworld.com/resource/the-blueprint-for-cyber-resilience-how-businesses-can-adapt-and-thrive
-
Cyber resilience: A C-suite game plan for balancing innovation, compliance and risk
First seen on scworld.com Jump to article: www.scworld.com/resource/cyber-resilience-a-c-suite-game-plan-for-balancing-innovation-compliance-and-risk
-
Jeder fünfte CISO vertuscht Compliance-Probleme
Compliance-Verfehlungen unter den Teppich zu kehren, sollte sich für CISOs falsch anfühlen.CISOs befinden sich zunehmend in der Zwickmühle, wenn es darum geht, eine gesunde Balance zwischen Loyalität zu ihrer Organisation und ihren rechtlichen Verantwortlichkeiten zu finden. Zumindest legt das eine aktuelle Studie des Sicherheitsanbieter Splunk nahe, in deren Rahmen 600 CISOs weltweit befragt wurden. Demnach:geben…
-
UK monitoring group to classify cyber incidents on earthquake-like scale
Risk management: The CMC hopes this increased understanding will spur the development of improved incident response planning. Experts quizzed by CSO on CMC welcomed its launch.Ivan Milenkovich, vice president of cyber risk technology in EMEA at Qualys, said data from the CMC has the potential to allow IT security professionals to make better risk assessments,…
-
The Rise of Typhoon Cyber Groups
Tags: access, attack, breach, communications, control, cyber, cyberattack, cybersecurity, data, defense, dns, endpoint, espionage, exploit, finance, government, group, infrastructure, intelligence, iot, military, monitoring, network, phone, resilience, supply-chain, tactics, threat, tool, vulnerability, zero-day -
Resilient by Design ist erforderlich zur Vorbereitung auf unvermeidliche Ausfallszenarien
Laut einer aktuellen Zscaler-Umfrage sind höhere Prioritäten und Investitionen in – Cyber-Resilienz-Strategien erforderlich zur Vorbereitung auf unvermeidliche Ausfallszenarien. Die weltweite Umfrage von Zscaler hat eine kritische Diskrepanz zwischen dem Vertrauen von IT-Führungskräften in die Fähigkeit ihres Unternehmens aufgezeigt, mögliche Ausfallszenarien wie Cyberangriffe zu überstehen, und der Effektivität ihrer aktuellen Sicherheitsansätze. Laut der von […] First…
-
Sicherheitsanforderungen im Maschinenbau – Wie der Cyber Resilience Act den Maschinenbau verändert
First seen on security-insider.de Jump to article: www.security-insider.de/cyber-resilience-act-auswirkungen-chancen-maschinenbau-a-990351a8ba51e2e7def561f4aeb5f365/
-
Top 5 ways attackers use generative AI to exploit your systems
Tags: access, ai, attack, authentication, awareness, banking, captcha, chatgpt, china, control, cyber, cybercrime, cybersecurity, defense, detection, exploit, extortion, finance, flaw, fraud, group, hacker, intelligence, LLM, malicious, malware, network, phishing, ransomware, resilience, service, spam, tactics, theft, threat, tool, vulnerability, zero-dayFacilitating malware development: Artificial intelligence can also be used to generate more sophisticated or at least less labour-intensive malware.For example, cybercriminals are using gen AI to create malicious HTML documents. The XWorm attack, initiated by HTML smuggling, which contains malicious code that downloads and runs the malware, bears the hallmarks of development via AI.”The loader’s…
-
Wettbewerbsvorteil statt Compliance-Übung Warum DORA mehr ist als ein Hürdenlauf
Die digitale Transformation im Finanzsektor schreitet unaufhaltsam voran und mit ihr wachsen die Anforderungen an die IT-Sicherheit. Mit dem Digital Operational Resilience Act (DORA) hat die EU nun einen wegweisenden Regulierungsrahmen geschaffen, der die digitale Widerstandsfähigkeit von Finanzinstituten stärken soll. Die neue Verordnung betrifft nicht nur Banken und Versicherungen, sondern den gesamten Finanzsektor inklusive […]…
-
DORA ist mehr als nur ein weiteres Regelwerk: Wettbewerbsvorteil statt Compliance-Übung
[link text=”DORA” id=”39656″] markiert einen Wendepunkt in der Regulierung digitaler Resilienz im Finanzsektor. Der Erfolg in der Umsetzung wird maßgeblich davon abhängen, wie gut es Unternehmen gelingt, technische, prozedurale Lösungen wie IGA mit organisatorischen Maßnahmen und einem Risikomanagement zu verbinden. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/dora-ist-mehr-als-nur-ein-weiteres-regelwerk-wettbewerbsvorteil-statt-compliance-uebung/a39736/
-
Why cyber hygiene remains critical in the era of AI-driven threats
Tags: access, ai, attack, authentication, breach, business, cyber, cyberattack, cybersecurity, data, email, exploit, Internet, login, malicious, mfa, network, phishing, resilience, risk, software, strategy, technology, threat, update, vulnerability, zero-trustCyber-attacks are an assumed inevitable for businesses today. As companies increasingly handle large amounts of valuable data, safeguarding operations has never been more important. Now, half (50%) of IT decision-makers report information security as their most time-consuming task[1].While AI offers a promising solution, security leaders must get the basics right first. Only by practicing good…
-
Fortifying cyber security: What does secure look like in 2025?
Tags: access, ai, attack, authentication, business, compliance, cyber, cybercrime, cybersecurity, deep-fake, exploit, finance, Hardware, intelligence, least-privilege, malware, mfa, nis-2, phishing, regulation, resilience, risk, risk-management, scam, software, threat, training, update, vulnerability, zero-trustThe evolving cybersecurity landscape has increased security pressures for IT leaders. With the World Economic Forum estimating, the global cost of cybercrime is projected to reach $10.5trillion annually in 2025, the situation is only escalating[1]. The rise of new technologies, such as Artificial Intelligence (AI), and the complexities introduced by flexible working have made IT…
-
Security validation: The new standard for cyber resilience
Security validation has officially turned a corner. Once considered a “nice-to-have” it’s now a top priority for security leaders worldwide. This shift has been accelerated by … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/02/10/cyber-resilience-security-validation/
-
SolarWinds to Be Purchased By Turn/River Capital for $4.4B
CEO: Going Private Will Help SolarWinds Expand Its Operational Resilience Vision. SolarWinds agreed to be bought by Turn/River Capital for $4.4 billion just six years after the observability and IT management software firm went public. The proposed deal will help SolarWinds expand its vision in operational resilience and ensure the company’s IT infrastructure remains robust.…
-
CIOs and CISOs grapple with DORA: Key challenges, compliance complexities
Tags: access, automation, banking, business, cio, ciso, communications, compliance, control, country, cyber, cybersecurity, data, dora, finance, framework, GDPR, governance, jobs, law, monitoring, network, nis-2, penetration-testing, privacy, regulation, resilience, risk, risk-management, service, skills, supply-chain, technology, threat, tool, training, vulnerabilityIn force since January, the Digital Operational Resilience Act (DORA) has required considerable effort from CIOs and CISOs at 20 types of financial entities to achieve compliance. For many, the journey is not complete.”In the past months, financial entities targeted by DORA have been busy internally defining roles and responsibilities related to ICT security, identifying…
-
21% of CISOs pressured to not report compliance issues
Tags: awareness, breach, business, ceo, ciso, compliance, control, corporate, cybersecurity, data, dora, finance, framework, governance, incident response, infrastructure, insurance, law, nis-2, regulation, resilience, risk, security-incident, trainingCISOs are increasingly getting caught between business pressures and regulatory obligations, leaving them struggling to balance corporate loyalty and legal accountability.To wit: One in five (21%) security leaders have been pressured by other executives or board members not to report compliance issues at their companies, according to a recent study by security vendor Splunk.The same…
-
Anomalies are not Enough
Tags: ai, attack, ciso, communications, country, cybersecurity, data, data-breach, defense, email, government, LLM, mail, marketplace, mitre, ml, network, resilience, risk, service, siem, threat, toolMitre Att&ck as Context Introduction: A common theme of science fiction authors, and these days policymakers and think tanks, is how will the humans work with the machines, as the machines begin to surpass us across many dimensions. In cybersecurity humans and their systems are at a crossroads, their limitations daily exposed by ever more innovative,…

