Malicious insiders pose an existential threat to any organization. Technical countermeasures only address part of the problem and are increasingly expensive. What are some new approaches to efficient and effective insider threat detection?
Late last year, it was announced that the major aluminum manufacturing firm, Norsk Hydro AS, received a $3.6 million cyberinsurance payout – the first around highly publicized, extensive cyber breach of March 2019. The large ransomware attack struck the company’s U.S. facilities – before spreading throughout the company, resulting in millions of dollars lost – destabilizing Norsk Hydro’s operations until the summer months. The payout covered merely six percent of the multi-million-dollar costs created by the incident and its aftermath.
Apparently, we are getting in our own way when it comes to advancing cybersecurity. According to a leading 2018 study by the Ponemon Institute LLC (sponsored by IBM), the three primary causes of data breaches were malicious or criminal attack, system glitch and human error. While the study reports that the length of time to identify and contain, and the cost, were lower for data breaches caused by human error as opposed to the other categories, it is an issue that nearly 27 percent of data breaches are caused by human error.
Artificial Intelligence (AI) rests on the verge of transforming both business and society. Financial firm UBS forecasts that next year, the AI market will be worth $12.5 billion due to huge improvements and broader adoption of the technology. And BCG Henderson Institute found that though most leaders have not yet seen significant impact from their AI initiatives, they firmly expect to within the next five years.
If enterprise security continues to mature as a business function, in most enterprises, senior management will ask for a set of metrics to measure performance.
January 1, 2020
What is the point of spending time, resources and money on your security program if you can't tell whether it's working or not? It's just as important to establish the right metrics for a security program as it is to have such a program in the first place.
2020 heralds a few major shifts that will transform cybersecurity: ransomware attacks, artificial intelligence, facial recognition and mobile cybersecurity.
As we enter the new year, conversations within the security community often inevitably deal with issues and programs that will be of greatest concern to leadership in the coming months.
In 10 months, U.S. citizens will elect a new president. As the race heats up and election day nears, a key component of the U.S. election infrastructure remains vulnerable to cyberattacks and misinformation campaigns.