BWGStrategy: Enhance Your Email Marketing Strategy for 2023 (Feb. 16th)
IT - Security

Finally, Ransomware Victims Are Refusing To Pay Up
The Register, January 19th, 2023
The amount of money paid to ransomware attackers dropped significantly in 2022, and not because the number of attacks fell.

It's that more victims are refusing to pay the ransoms, blockchain research firm Chainalysis said in a report Thursday.

They estimate that since 2019, victim payment rates have fallen from 76 percent to just 41 percent. For context, that number was 50 percent in 2021 by their figures.

Chainalysis data indicates that total ransomware revenue fell to at least $456.8 million last year, a 40.3 percent drop from the $765.6 million in 2021, and "the evidence suggests that this is due to victims' increasing unwillingness to pay ransomware attackers.".


3 Lessons Learned In Vulnerability Management
DARKReading, January 20th, 2023
In 2022, multiple high-profile vulnerabilities like Log4j and OpenSSL provided important takeaways for future public reporting.

As we pass the first anniversary of the Log4j vulnerability disclosure, it's a timely reminder that when a vulnerability is serious, it deserves our utmost attention. Organizations taking vulnerability disclosure more seriously is a net positive for the industry, especially because patching is so vital for basic cyber hygiene and accountability.

But, when a vulnerability is overblown or overpromoted, it can misguide the security community and distract from other more serious incidents - or cause other serious problems, like alert fatigue.


Penetration testing is a vital part of cybersecurity strategy development, evaluating the strength of an organization's infrastructure.

To prevent attackers from exploiting security flaws in your software or networks, you want to discover them as soon as possible. Penetration testing is becoming increasingly common because it anticipates attacks instead of waiting for them to happen, allowing people to be more proactive in their security initiatives.

5 Top Vulnerability Management Trends In 2023
Datamation, January 20th, 2023
Vulnerability management seeks to lower risk by identifying and dealing with any possible lines of incursion into a network by cybercriminals.

The field of vulnerability management includes automated scans, configuration management, regular penetration testing, patching, keeping track of various metrics, and reporting. The category has been evolving rapidly within cybersecurity, and here are some of the top trends in the vulnerability management market:

1. More Than Scans

2. Vulnerability Management Broadens

3. Vulnerability Management As A Service

4. Container Vulnerabilities

5. Autonomous Endpoint Approach


6 Cybersecurity Buzzwords To Know In 2023
SearchSecurity, January 20th, 2023
Enterprise Strategy Group research indicates many organizations will increase cybersecurity spending in 2023, and with that comes an evolving set of vendor buzzwords to sort out.

Vendors will engage in buzzword bingo at upcoming cybersecurity conferences and elsewhere throughout the year. Security professionals need to define these terms based on existing defenses, requirements and resources.

According to the "2023 Technology Spending Intentions Survey" conducted by TechTarget's Enterprise Strategy Group (ESG), 65% of organizations will increase cybersecurity spending in 2023. This is due to the following undisputed facts:


Craft specific awareness training for high-exposure teams like finance, and reinforce other critical awareness training across the organization.

After hardening our corporate environment and improving our device management as the chief information security officer (CISO) with other organizations, I began to notice the threat landscape changing and evolving rapidly. Specifically, social engineering and phishing tactics shifted seemingly overnight and continued to stay steps ahead of our awareness training.

Instead of sending emails to corporate addresses protected with multiple security solutions, cybercriminals started doing their homework, using social media sites like LinkedIn to capture names, roles, and photos to build dossiers on individual users.


IT Security Challenges Emerge In Smart Cities
ITProToday, January 19th, 2023
Smart cities promise a more sustainable urban life, but with it comes specific security challenges.

By 2050, 68% of the world will live in cities, the UN projects. With rapid urbanization, city planners are adopting technology to foster sustainable development and meet the demands of residents, transforming cities into 'smart cities.'

Smart cities rely on IoT and AI technologies to collect data on various facets of city life, such as traffic, health, weather, and waste management, and automate processes. IoT devices include traffic cameras, utility meters, smart grid sensors, and air quality monitors.


Get your eyepatch out: Cyber attacks on the high seas are trending

A Norwegian maritime risk management business is getting a lesson in that very area, after a ransomware attack forced its ShipManager software offline and left 1,000 ships without a connection to on-shore servers.

DNV said the attack happened on January 7, and updated its report yesterday to say it involved ransomware - but affected vessels are not in any danger and can still operate normally, it added.

"All vessels can still use the onboard, offline functionalities of the ShipManager software, other systems onboard the vessels are not impacted," DNV said. It doesn't believe any other servers or data were affected.


Security In 2023: 6 Trends For IT Leaders
The Enterprisers Project, January 17th, 2023
From continued supply chain concerns to challenges related to edge and AI/ML adoption, here are the top security trends to watch in the coming year

Here's a New Year prediction you're probably never going to hear: 'IT security solved!'

Sure, maybe an overeager vendor or three might imbue their pitch with that kind of energy, but sensible IT pros know that's an unrealistic state. There will always be cybersecurity threats and risks. That's true this year, next year, and - unless humanity universally unplugs and returns to the agrarian, hunter-gatherer life - forever.

That's because IT systems and the professionals that run them are fallible, always. And there will likely always be malicious systems and professionals that look to exploit that reality.


CISOs are navigating an ever-more challenging and complex world as the level of cyber risk heightens. Taking control of this difficult situation means being sure of priorities. Here Christine Bejerasco explores the issues that should be high on every CISO's list of strategic priorities.

Have both a top-down and bottom-up strategy

While CISOs and their teams are tasked with designing the cyber security roadmap of the organization, when the rubber hits the road, some of these best laid plans will be hindered by a lack of budget, lax enforcement, and an overabundance of information that is often not remembered by teams in the organization who are not regularly exposed to it. As such, if CISOs stay in their not-so-ivory towers drafting policies, standards, and requirements, they will end up alienating their role from the realities of the business.


I believe it's exponentially easier to defend when you can anticipate the offense. So what will cyber offense start doing this year, and how can you prepare?

I'm David Brumley, CEO of ForAllSecure, and here are my top three predictions for offense in 2023:

1. Hackers are going to ransom our cars.

2. Attackers will start creating zero day exploit farms.

3. The OSS "tragedy of the commons" will continue.


In today's increasingly connected world, cybersecurity is more important than ever before. Organizations of all sizes, and across all industries, are at risk of cyber threats that can damage their reputation, hit their bottom line and leave them falling foul of data privacy laws.

To improve data security and prevent attackers from stealing sensitive information, a cybersecurity strategy is essential.

In traditional cybersecurity plans, data had little to no role to play. These programs were typically managed in an ad hoc manner and manually handled by security analysts and other members of a company's IT team.

See all Archived IT - Security articles See all articles from this issue