Digital threats can have physical consequences. As we’ve seen this year, the United States government is taking the threat of ransomware seriously. That’s especially the case when it comes to physical infrastructure. If your business ⁠— like many — lives at the intersection of the Internet of Things and the things that make our world work, you need to protect those assets.

Let our news roundup this month tell you how. See what regulations are changing in terms of cybersecurity for critical infrastructure. Plus, cybersecurity careers are a hot commodity today, with skilled workers in demand. What if you don’t have what people think of as a technical background? There still might be room for you in the industry.

Quick Briefs: Top Insights From November

3-Minute Read 🕒

A New Cybersecurity Executive Order Puts the Heat on Critical Infrastructure Suppliers

A presidential executive order and five pieces of legislation passed by the House of Representatives addressed cybersecurity in the latter half of 2021. What exactly the executive order requires is still being hashed out. However, it’s a sign of a sea change. The government is taking cybersecurity, especially for infrastructures like energy and shipping, seriously. See what that means for your business

4-Minute Read 🕒

6 Potential Long-Term Impacts of a Data Breach

Were you part of any of the major consumer data breaches in the last few years? You probably felt a bit short of breath at the prospect of someone stealing your credit card information. While banks are pretty good at covering for people who got caught in a digital crime, it’s an even bigger problem if you’re the one captaining the ship. So, take a look at what organization’s leaders should know about how a data breach can disrupt operations and how to prevent problems.

3-Minute Read 🕒

Maritime Cybersecurity: A Rising Tide Lifts all Boats

Earlier this year, a digital attacker poked around in the systems of the Port of Houston. While they didn’t end up disrupting anything, the vulnerability in the 25-mile port highlights how big maritime operations need to keep a spyglass eye out for cyberattacks. After all, there may not be an IT person on board every ship, even though so much of shipping involves digital systems. See how to integrate good cybersecurity practices into your shipping business.

Worth Your While: In-Depth Coverage To Sharpen Your Skills & Tighten Security

6-Minute Read 🕒

Non-Traditional Cybersecurity Career Paths – One Experience Informs Another

As writers, we sometimes see ourselves as coming from a different world as people who end up in tech careers. But the two skill sets might have more in common than we think. The real-life cybersecurity professionals we interviewed came from all kinds of backgrounds. See how those experiences, from professional poker playing to performing arts, help people in their tech jobs today.

6-Minute Read 🕒

The Future of Cybersecurity: What Will it Look Like in 2031?

Hit the gas on the DeLorean, Marty. We’re taking a quick jaunt into the future to follow today’s cybersecurity trends to where they might be in 2031. Is the cloud really the way of tomorrow? Maybe not, says one of our three cybersecurity experts who weighed in on this Q&A.

7-Minute Read 🕒

From Thanos to Prometheus: When Ransomware Encryption Goes Wrong

The ransomware family called Thanos has been causing trouble. But IBM X-Force Red is on the job, and even — unusually for a ransomware case — ended up actively helping the organization that had been attacked. See what they discovered when they reverse-engineered some samples of the Prometheus malware, built on the base code of the Thanos malware. When Thanos is the problem, you’re going to find superheroes, too.

November’s Expert Insight: Threat Detection and Response With Open XDR

What is XDR? Extended detection and response offers cybersecurity professionals improved visibility and faster detection, investigation and response across multiple security layers. However, most people don’t know how it works — or how it’s built on the backbone of open-source, with security researchers providing their code to anyone. How does XDR work? Read on to find out — and about how to tell whether “open” in this case really means open.

Want to keep up with today’s cybersecurity news and best practices? Watch this space for the Security Intelligence newsletter.

More from CISO

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today