Addressing growing concerns about cybersecurity in manufacturing

Manufacturing has become increasingly reliant on modern technology, including industrial control systems (ICS), Internet of Things (IoT) devices and operational technology (OT). While these innovations boost productivity and streamline operations, they’ve vastly expanded the cyberattack surface. According to the 2024 IBM Cost of a Data Breach report, the average total cost of a data breach in […]

The post Addressing growing concerns about cybersecurity in manufacturing appeared first on Security Intelligence.

Continue reading Addressing growing concerns about cybersecurity in manufacturing

What’s behind the 51% drop in ransomware attacks?

In a world where cyber threats feel omnipresent, a recent report has revealed some unexpected good news: ransomware attacks on state and local governments have dropped by 51% in 2024. Still, this decline does not signal the end of the ransomware threat, nor should it lead to complacency. As the nature of ransomware evolves, so […]

The post What’s behind the 51% drop in ransomware attacks? appeared first on Security Intelligence.

Continue reading What’s behind the 51% drop in ransomware attacks?

How governance, risk and compliance (GRC) addresses growing data liability concerns

In an era where businesses increasingly rely on artificial intelligence (AI) and advanced data capabilities, the effectiveness of IT services is more critical than ever. Yet despite the advancements in technology, business leaders are increasingly dissatisfied with their IT departments. According to a study by IBM’s Institute for Business Value, confidence in the effectiveness of […]

The post How governance, risk and compliance (GRC) addresses growing data liability concerns appeared first on Security Intelligence.

Continue reading How governance, risk and compliance (GRC) addresses growing data liability concerns

Are we getting better at quantifying risk management?

As cyber threats grow more sophisticated and pervasive, the need for effective risk management has never been greater. The challenge lies not only in defining risk mitigation strategy but also in quantifying risk in ways that resonate with business leaders. The ability to translate complex technical risks into understandable and actionable business terms has become […]

The post Are we getting better at quantifying risk management? appeared first on Security Intelligence.

Continue reading Are we getting better at quantifying risk management?

Are we getting better at quantifying risk management?

As cyber threats grow more sophisticated and pervasive, the need for effective risk management has never been greater. The challenge lies not only in defining risk mitigation strategy but also in quantifying risk in ways that resonate with business leaders. The ability to translate complex technical risks into understandable and actionable business terms has become […]

The post Are we getting better at quantifying risk management? appeared first on Security Intelligence.

Continue reading Are we getting better at quantifying risk management?

Cost of a data breach: The industrial sector

Industrial organizations recently received a report card on their performance regarding data breach costs. And there’s plenty of room for improvement. According to the 2024 IBM Cost of a Data Breach (CODB) report, the average total cost of a data breach in the industrial sector was $5.56 million. This reflects an 18% increase for the […]

The post Cost of a data breach: The industrial sector appeared first on Security Intelligence.

Continue reading Cost of a data breach: The industrial sector

Digital solidarity vs. digital sovereignty: Which side are you on?

The landscape of international cyber policy continues to evolve rapidly, reflecting the dynamic nature of technology and global geopolitics. Central to this evolution are two competing concepts: digital solidarity and digital sovereignty. The U.S. Department of State, through its newly released International Cyberspace and Digital Policy Strategy, has articulated a clear preference for digital solidarity, […]

The post Digital solidarity vs. digital sovereignty: Which side are you on? appeared first on Security Intelligence.

Continue reading Digital solidarity vs. digital sovereignty: Which side are you on?

Generative AI security requires a solid framework

How many companies intentionally refuse to use AI to get their work done faster and more efficiently? Probably none: the advantages of AI are too great to deny. The benefits AI models offer to organizations are undeniable, especially for optimizing critical operations and outputs. However, generative AI also comes with risk. According to the IBM […]

The post Generative AI security requires a solid framework appeared first on Security Intelligence.

Continue reading Generative AI security requires a solid framework

Important details about CIRCIA ransomware reporting

In March 2022, the Biden Administration signed into law the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA). This landmark legislation tasks the Cybersecurity and Infrastructure Security Agency (CISA) to develop and implement regulations requiring covered entities to report covered cyber incidents and ransomware payments. The CIRCIA incident reports are meant to enable […]

The post Important details about CIRCIA ransomware reporting appeared first on Security Intelligence.

Continue reading Important details about CIRCIA ransomware reporting

AI cybersecurity solutions detect ransomware in under 60 seconds

Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in 2022. And more recent activity is tracking even higher. Meanwhile, other dangers are appearing on […]

The post AI cybersecurity solutions detect ransomware in under 60 seconds appeared first on Security Intelligence.

Continue reading AI cybersecurity solutions detect ransomware in under 60 seconds