Digital threats can have physical consequences. As we’ve seen this year, the United States government is taking the threat of ransomware seriously. That’s especially the case when it comes to physical infrastructure. If your business ⁠— like many — lives at the intersection of the Internet of Things and the things that make our world work, you need to protect those assets.

Let our news roundup this month tell you how. See what regulations are changing in terms of cybersecurity for critical infrastructure. Plus, cybersecurity careers are a hot commodity today, with skilled workers in demand. What if you don’t have what people think of as a technical background? There still might be room for you in the industry.

Quick Briefs: Top Insights From November

3-Minute Read 🕒

A New Cybersecurity Executive Order Puts the Heat on Critical Infrastructure Suppliers

A presidential executive order and five pieces of legislation passed by the House of Representatives addressed cybersecurity in the latter half of 2021. What exactly the executive order requires is still being hashed out. However, it’s a sign of a sea change. The government is taking cybersecurity, especially for infrastructures like energy and shipping, seriously. See what that means for your business

4-Minute Read 🕒

6 Potential Long-Term Impacts of a Data Breach

Were you part of any of the major consumer data breaches in the last few years? You probably felt a bit short of breath at the prospect of someone stealing your credit card information. While banks are pretty good at covering for people who got caught in a digital crime, it’s an even bigger problem if you’re the one captaining the ship. So, take a look at what organization’s leaders should know about how a data breach can disrupt operations and how to prevent problems.

3-Minute Read 🕒

Maritime Cybersecurity: A Rising Tide Lifts all Boats

Earlier this year, a digital attacker poked around in the systems of the Port of Houston. While they didn’t end up disrupting anything, the vulnerability in the 25-mile port highlights how big maritime operations need to keep a spyglass eye out for cyberattacks. After all, there may not be an IT person on board every ship, even though so much of shipping involves digital systems. See how to integrate good cybersecurity practices into your shipping business.

Worth Your While: In-Depth Coverage To Sharpen Your Skills & Tighten Security

6-Minute Read 🕒

Non-Traditional Cybersecurity Career Paths – One Experience Informs Another

As writers, we sometimes see ourselves as coming from a different world as people who end up in tech careers. But the two skill sets might have more in common than we think. The real-life cybersecurity professionals we interviewed came from all kinds of backgrounds. See how those experiences, from professional poker playing to performing arts, help people in their tech jobs today.

6-Minute Read 🕒

The Future of Cybersecurity: What Will it Look Like in 2031?

Hit the gas on the DeLorean, Marty. We’re taking a quick jaunt into the future to follow today’s cybersecurity trends to where they might be in 2031. Is the cloud really the way of tomorrow? Maybe not, says one of our three cybersecurity experts who weighed in on this Q&A.

7-Minute Read 🕒

From Thanos to Prometheus: When Ransomware Encryption Goes Wrong

The ransomware family called Thanos has been causing trouble. But IBM X-Force Red is on the job, and even — unusually for a ransomware case — ended up actively helping the organization that had been attacked. See what they discovered when they reverse-engineered some samples of the Prometheus malware, built on the base code of the Thanos malware. When Thanos is the problem, you’re going to find superheroes, too.

November’s Expert Insight: Threat Detection and Response With Open XDR

What is XDR? Extended detection and response offers cybersecurity professionals improved visibility and faster detection, investigation and response across multiple security layers. However, most people don’t know how it works — or how it’s built on the backbone of open-source, with security researchers providing their code to anyone. How does XDR work? Read on to find out — and about how to tell whether “open” in this case really means open.

Want to keep up with today’s cybersecurity news and best practices? Watch this space for the Security Intelligence newsletter.

More from CISO

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today