Digital threats can have physical consequences. As we’ve seen this year, the United States government is taking the threat of ransomware seriously. That’s especially the case when it comes to physical infrastructure. If your business ⁠— like many — lives at the intersection of the Internet of Things and the things that make our world work, you need to protect those assets.

Let our news roundup this month tell you how. See what regulations are changing in terms of cybersecurity for critical infrastructure. Plus, cybersecurity careers are a hot commodity today, with skilled workers in demand. What if you don’t have what people think of as a technical background? There still might be room for you in the industry.

Quick Briefs: Top Insights From November

3-Minute Read 🕒

A New Cybersecurity Executive Order Puts the Heat on Critical Infrastructure Suppliers

A presidential executive order and five pieces of legislation passed by the House of Representatives addressed cybersecurity in the latter half of 2021. What exactly the executive order requires is still being hashed out. However, it’s a sign of a sea change. The government is taking cybersecurity, especially for infrastructures like energy and shipping, seriously. See what that means for your business

4-Minute Read 🕒

6 Potential Long-Term Impacts of a Data Breach

Were you part of any of the major consumer data breaches in the last few years? You probably felt a bit short of breath at the prospect of someone stealing your credit card information. While banks are pretty good at covering for people who got caught in a digital crime, it’s an even bigger problem if you’re the one captaining the ship. So, take a look at what organization’s leaders should know about how a data breach can disrupt operations and how to prevent problems.

3-Minute Read 🕒

Maritime Cybersecurity: A Rising Tide Lifts all Boats

Earlier this year, a digital attacker poked around in the systems of the Port of Houston. While they didn’t end up disrupting anything, the vulnerability in the 25-mile port highlights how big maritime operations need to keep a spyglass eye out for cyberattacks. After all, there may not be an IT person on board every ship, even though so much of shipping involves digital systems. See how to integrate good cybersecurity practices into your shipping business.

Worth Your While: In-Depth Coverage To Sharpen Your Skills & Tighten Security

6-Minute Read 🕒

Non-Traditional Cybersecurity Career Paths – One Experience Informs Another

As writers, we sometimes see ourselves as coming from a different world as people who end up in tech careers. But the two skill sets might have more in common than we think. The real-life cybersecurity professionals we interviewed came from all kinds of backgrounds. See how those experiences, from professional poker playing to performing arts, help people in their tech jobs today.

6-Minute Read 🕒

The Future of Cybersecurity: What Will it Look Like in 2031?

Hit the gas on the DeLorean, Marty. We’re taking a quick jaunt into the future to follow today’s cybersecurity trends to where they might be in 2031. Is the cloud really the way of tomorrow? Maybe not, says one of our three cybersecurity experts who weighed in on this Q&A.

7-Minute Read 🕒

From Thanos to Prometheus: When Ransomware Encryption Goes Wrong

The ransomware family called Thanos has been causing trouble. But IBM X-Force Red is on the job, and even — unusually for a ransomware case — ended up actively helping the organization that had been attacked. See what they discovered when they reverse-engineered some samples of the Prometheus malware, built on the base code of the Thanos malware. When Thanos is the problem, you’re going to find superheroes, too.

November’s Expert Insight: Threat Detection and Response With Open XDR

What is XDR? Extended detection and response offers cybersecurity professionals improved visibility and faster detection, investigation and response across multiple security layers. However, most people don’t know how it works — or how it’s built on the backbone of open-source, with security researchers providing their code to anyone. How does XDR work? Read on to find out — and about how to tell whether “open” in this case really means open.

Want to keep up with today’s cybersecurity news and best practices? Watch this space for the Security Intelligence newsletter.

More from CISO

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Boardroom cyber expertise comes under scrutiny

3 min read - Why are companies concerned about cybersecurity? Some of the main drivers are data protection, compliance, risk management and ensuring business continuity. None of these are minor issues. Then why do board members frequently keep their distance when it comes to cyber concerns?A report released last year showed that just 5% of CISOs reported directly to the CEO. This was actually down from 8% in 2022 and 11% in 2021. But even if board members don’t want to get too close…

The CISO’s guide to accelerating quantum-safe readiness

3 min read - Quantum computing presents both opportunities and challenges for the modern enterprise. While quantum computers are expected to help solve some of the world’s most complex problems, they also pose a risk to traditional cryptographic systems, particularly public-key encryption. To ensure their organization’s data remains secure now and in the future, chief information security officers (CISOs) should educate themselves about quantum computing, proactively address the coming quantum risks to cybersecurity and work to establish cryptographic agility in their enterprise.A future cryptographically…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today