“Mapping Cybersecurity Threats to Defenses: A Strategic Approach to Risk Mitigation” Most of the time we talk about reducing risk by implementing controls, but we don’t talk about if the implemented controls will reduce the Probability or Impact of the Risk. The below matrix helps organizations build a robust, prioritized, and strategic cybersecurity posture while ensuring risks are managed comprehensively by implementing controls that reduces the probability while minimising the impact. Key Takeaways from the Matrix 1. Multi-layered Security: Many controls address multiple attack types, emphasizing the importance of defense in depth. 2. Balance Between Probability and Impact: Controls like patch management and EDR reduce both the likelihood of attacks (probability) and the harm they can cause (impact). 3. Tailored Controls: Some attacks (e.g., DDoS) require specific solutions like DDoS protection, while broader threats (e.g., phishing) are countered by multiple layers like email security, IAM, and training. 4. Holistic Approach: Combining technical measures (e.g., WAF) with process controls (e.g., training, third-party risk management) creates a comprehensive security posture. This matrix can be a powerful tool for understanding how individual security controls align with specific threats, helping organizations prioritize investments and optimize their cybersecurity strategy. Cyber Security News ®The Cyber Security Hub™
Enhancing Security Measures
Explore top LinkedIn content from expert professionals.
-
-
CPTED is about changing the built environment. Once upon a time, we had a corporate client who owned a soccer field. While the field served as a community resource, it became a target for gang activity and vandalism. Despite the presence of security personnel, police, and contracted patrols, the issues persisted. Vandals, in particular, were using ATVs that tore up their fields. To address this, we implemented an innovative solution by automating the site’s industrial sprinkler system. We installed pyramid motion sensors on existing light masts and connected them to a timed relay that activated the sprinkler (zones) on motion. If you’ve ever seen an industrial sprinkler in action, it’s essentially a fire hose on a rotating base. The result? The vandalism stopped within a week. As for the gang activity, we tackled that by constructing a storage facility at the field’s entrance for the Sheriff's Department, which lacked adequate space for their Harley-Davidsons in their newly built Police station ( A fact we determined during reachout with them). We prominently painted the Sheriff's emblem across the garage door. This not only provided necessary space for law enforcement but also created activity support—drawing a regular police presence to the area with no cost. CPTED in this case was very cost effective, free police patrols, and a two one-time capital expnditures.. This video illustrates how modifying the built environment can influence behavior. It serves as a real-world example ahead of a CPTED article I am currently writing.Campus Safety and Security IAPSC - International Association of Professional Security Consultants
-
A 'secure SDLC' is a much broader term than DevSecops or application security. It incorporates security (CIA controls) into all phases of software development, from requirements gathering to maintenance. While individual security measures such as web security, SAST, DAST and secure coding are effective in their own right, they do not provide comprehensive end-to-end software security. Product security is another emerging term along the same lines. To truly fortify software against evolving threats, organizations should consider embracing the concept of Secure SDLC. By embracing Secure SDLC, organizations build a foundation of proactive risk mgmt, robust change mgmt., secure architecture, thorough testing, and ongoing vigilance, ensuring the software's cyber resilience. Additionally, organizations can focus on: 1. Building a security culture - This can be achieved through a variety of means, such as setting security goals, providing security training, and rewarding security-minded behaviour for its software and technology specialists. 2. Security tools and technologies - Leveraging technology solutions for tasks such as static and dynamic analysis, and penetration testing. 3. Engaging with security partners - Partners can provide security expertise, tools, and technologies that can help to identify and mitigate security risks within secure SDLC space. #applicationsecurity #websecurity #softwaresecurity #ethicalhacking #devsecops CYTAD #apisecurity #penetrationtesting
-
✏️CEPS (Centre for European Policy Studies) has just published the report "Strengthening the EU transition to a quantum-safe world" This 125-page publication offers a comprehensive and very timely analysis of the global transition toward quantum-safety, highlighting key recommendations and identifying the hurdles that we, as a community, still need to overcome. Accross its 10 general recommendations and 16 additional sector-specific ones, two key aspects take a prominent role: 👉 Operational challenges of the transition, like establishing business-level priorities, building executive support, addressing the limited cryptographic talent issue, cryptographic homogeneization in products, and building cryptographic inventories based on priorities. 👉 Coordination and the role for regulators, identifying that the EU lacks a coherent, unified transition framework, the need to ensure alignment and coherence across roadmaps and the risks of a fragmented transition. Key conclusions on the later, aligned with previous statements from the Europol Quantum Safe Financial Forum and FS-ISAC, is that quantum-safety is already part of the EU's operational resilience compliance through the “state of the art” security principle embedded in GDPR, DORA, CRA and NIS2. However, there is a recognised need for further guidance that can be achieved through open collaboration between the public and private sector. Although the report focuses on the financial, public, and defence sectors, its main takeaways can easily be extended to other critical domains—transport, energy, healthcare, and many more. The principles are the same, and the urgency is the same. This report is an important step forward, and my hope is that the ideas it lays out help shape the conversations and, more importantly, the actions we need across the EU. A well-aligned and coordinated transition is essential if we want the whole ecosystem to move toward a new age where we manage cryptography in a more mature, proactive, and resilient way. Kudos to CEPS, lorenzo pupillo, Carolina Polito, Swann A. and Afonso Ferreira, PhD for achieving this milestone. https://lnkd.in/dpWJ86q2
-
🌍International Guidance for Enhanced Cybersecurity: Best Practices for Event Logging and Threat Detection🌍 The Australian Government's Australian Cyber Security Centre (ACSC), in collaboration with global partners like the #NSA, #CISA, the UK's #NCSC, and agencies from Canada, New Zealand, Japan, South Korea, Singapore, and the Netherlands, has released a comprehensive report on best practices for event logging and threat detection. 🚀The report defines a baseline for event logging best practices and emphasizes the importance of robust event logging to enhance security and resilience in the face of evolving cyber threats. Why Event Logging Matters: Event logging isn't just about keeping records—it's about empowering organizations to detect, respond to, and mitigate cyber threats more effectively. The guidance provided in this report aims to bolster an organization’s resilience by enhancing network visibility and enabling timely detection of malicious activities. 🔍 Key Highlights: 🔹Enterprise-Approved Event Logging Policy: Develop and implement a consistent logging policy across all environments to enhance the detection of malicious activities and support incident response. 🔹Centralized Log Collection and Correlation: Utilize a centralized logging facility to aggregate logs, making detecting anomalies and potential security breaches easier. 🔹Secure Storage and Event Log Integrity: Implement secure mechanisms for storing and transporting event logs to prevent unauthorized access, modification, or deletion. 🔹Detection Strategy for Relevant Threats: Leverage behavioral analytics and SIEM tools to detect advanced threats, including "Living off the Land" (LOTL) techniques used by sophisticated threat actors. 📊 Use Case: Detecting "Living Off the Land" Techniques: One highlighted use case involves detecting LOTL techniques, where attackers use legitimate tools available in the environment to carry out malicious activities. The report showcases how the Volt Typhoon group leveraged LOTL techniques, such as using PowerShell and other native tools on compromised Windows systems, to evade detection and conduct espionage. Effective event logging, including process creation events and command-line auditing, was crucial in identifying these activities as abnormal compared to regular operations. Couple this report with the CISA Zero Trust Maturity Model (ZTMM): The report's best practices align with CISA's ZTMM's Visibility and Analytics capability. By following these publications, organizations can progress along their maturity path toward optimal dynamic monitoring and advanced analysis. (Full disclosure: I was co-author of CISA's ZTMM) 💪Implementing these best practices from the Australian Signals Directorate & others is critical to achieving comprehensive visibility and security, aligning with global cybersecurity frameworks. #cybersecurity #zerotrust #digitaltransformation #technology #cloudcomputing #informationsecurity
-
API Security: 16 Critical Practices You Need to Know Drawing from OWASP guidelines, industry standards, and enterprise security frameworks, here are 16 critical API security practices that every development team should implement: 1. Authentication Your first line of defense. Implement OAuth 2.0, JWT, and enforce MFA where possible. 2. Authorization RBAC and ABAC aren't buzzwords - they're essential. Implement granular access controls. 3. Rate Limiting Had an API taken down by a simple script? Rate limiting isn't optional anymore. 4. Input Validation Every parameter is a potential attack vector. Validate, sanitize, and verify - always. 5. Encryption TLS is just the beginning. Think end-to-end encryption and robust key management. 6. Error Handling Generic errors for users, detailed logs for systems. Never expose internals. 7. Logging & Monitoring You can't protect what you can't see. Implement comprehensive audit trails. 8. Security Headers CORS, CSP, HSTS - these headers are your API's immune system. 9. Token Expiry Long-lived tokens are ticking time bombs. Implement proper rotation and expiry. 10. IP Whitelisting Know who's knocking. Implement IP-based access controls where appropriate. 11. Web Application Firewall Your shield against common attack patterns. Configure and monitor actively. 12. API Versioning Security evolves. Your API versioning strategy should account for security patches. 13. Secure Dependencies Your API is only as secure as its weakest dependency. Audit regularly. 14. Intrusion Detection Real-time threat detection isn't luxury - it's necessity. 15. Security Standards Don't reinvent security. Follow established standards and frameworks. 16. Data Redaction Not all data should be visible. Implement robust redaction policies. The key lesson? These aren't independent practices - they form an interconnected security mesh. Miss one, and you might compromise the entire system. What's your experience with these practices? Which ones have you found most challenging to implement?
-
Introducing SITF: The First Threat Framework for SDLC Infrastructure by Wiz Open-source framework mapping 70+ attacks. Attack Flow Visualizer for drag-and-drop threat modeling. Shay Berkovich describes how SITF (SDLC Infrastructure Threat Framework) can help organizations harden their SDLC. ⛓️ Model recent supply chain attacks. 🛡️ See a prioritized list of security controls you should implement. 🗡️ Review attack techniques and learn from them. --- SITF maps 70+ attack techniques across five SDLC pillars: 1. Endpoint/IDE 2. VCS 3. CI/CD 4. Registry 5. Production The framework includes an Attack Flow Visualizer for drag-and-drop threat modeling that auto-generates prioritized defense matrices. So given threats or attacks you want to protect against → here are the top controls you should implement first. The post also walks through modeling Shai-Hulud 2.0 using SITF, giving a nice overview of the attack, and the controls that would have prevented each step. The framework runs entirely client-side with no data leaving your machine. 📎 Blog: https://lnkd.in/gBRdx76q 🌐 Live site: https://lnkd.in/gHKdncH4 ⭐ GitHub: https://lnkd.in/gnmexd49 #cybersecurity #supplychain
-
My favorite way to hack in my ethical hacking is phone call based hacking with impersonation. Why? Because it has the highest success rate. This is what we're seeing in the wild right now, too. Let's talk about how phone call attackers think and how to catch Scattered Spider style attacks for Insurance companies (that are heavily targeted right now, Aflac recently): 1. *Impersonating IT and Helpdesk for passwords and codes* They pretend to be IT and HelpDesk over phone calls and text message to ask for passwords and MFA codes or credential harvest via a link 2. *Remote Access Tools as Helpdesk* They convince teammates to run business remote access tools while pretending to be IT/HelpDesk 3. *MFA Fatigue* They will send many repeated MFA prompt notifications until the employee presses Accept 4. *SIM Swap* They call telco pretending to be your employee to take over their phone number and intercept codes for 2 factor authentication Let's talk about the types of websites they register and how to train your team about them and block access to them. Scattered Spider usually attempts to impersonate your HelpDesk or IT so they're going to use a believable looking website to trick folks. Often times they register domains like this: - victimcompanyname-sso[.]com - victimcompanyname-servicedesk[.]com - victimcompanyname-okta[.]com Train your team to spot those specific attacker controlled look-alike domains and block them on your network. What mitigations steps can you take to help your team spot and shut down these hacking attempts? Especially if you work in Retail or Insurance and are heavily targeted right now, focus on: Human protocols: - Start Be Politely Paranoid Protocol: start protocol with your team to verify identity using another method of communication before taking actions. For example, if they get a call from IT/HelpDesk to download remote access tool, use another method of communication like chat, email, initiating a call back to trusted number to thwart spoofing to verify authenticity before taking action. More than likely it's an attacker. - Educate on the exact types of attacks that are popular right now in the wild (this above thread covers them). Technical tool implementation: - Set up application controls to prevent installation and execution of unauthorized remote access tools. If the remote access tools don't work during the attack, it's going to make the criminal's job harder and they may move on to another target. - Set up MFA that is harder to phish such as FIDO solutions (YubiKey, etc). Educate that your IT / HelpDesk will not ask for passwords or MFA codes in the meantime. - Set up password manager and require long, random, and unique passwords for each account, generated and stored in a password manager with MFA on. - Require MFA on for all accounts work and personal accounts, move folks with admin access to FIDO MFA solution first, then move the rest of the team over to FIDO MFA. - Keep devices and browsers up to date.
-
Here I attached the Cybersecurity Technology Stack. This poster is a complete visual guide to the key cybersecurity tools and technologies across all major categories from SIEM, EDR, XDR, SOAR, TIP, PAM, CSPM to deception technologies, UEBA and more. I created this to help professionals and newcomers get a clearer picture of what solutions are available and how they fit into the larger cybersecurity ecosystem. When I first started working in cybersecurity operations, most environments focused heavily on perimeter defence and endpoint protection. But attackers have evolved. Today, a proper setup requires multiple integrated layers that work together. No single tool is enough. What matters is how these tools connect to give visibility, control and speed in detection and response. If you're building or reviewing your cybersecurity stack, these are the key areas I recommend you consider: 1. Visibility with SIEM •Start with a strong SIEM platform. This will collect logs across your infrastructure from endpoints, firewalls, cloud and identity systems and help detect patterns or anomalies. 2. Real-time Threat Detection with EDR or XDR •Next, deploy EDR to get deep visibility into endpoint activities. If your budget allows, move towards XDR to combine endpoint, network and cloud telemetry into one detection layer. 3. Response Automation with SOAR •As alerts come in, you need a fast and consistent way to respond. A SOAR platform can automate triage, enrich alerts with threat intel and reduce the time analysts spend on manual tasks. 4. Threat Intelligence Integration •No matter how good your SIEM or EDR is, you need context. Use Threat Intelligence Platforms (TIP) to enrich data with external threat indicators and insights. 5. Secure Privileged Access with PAM •If an attacker gets access to a privileged account, the damage can be severe. Implement PAM to secure, manage and audit access to critical systems and credentials. 6. Vulnerability Management •A well-monitored environment still becomes weak if patching is not managed. Use vulnerability scanners and patch management systems to identify and remediate weaknesses quickly. 7. Cloud Security Posture and Identity Management •As more workloads move to the cloud, ensure you have CSPM tools and proper IAM controls in place to prevent misconfigurations and abuse of identity-based access. 8. Advanced Detection with NDR, UEBA, and Deception •For mature setups, consider adding Network Detection & Response, User Behaviour Analytics and deception technologies. These give you deeper layers of defence and help detect stealthy attacks. Building a modern cybersecurity setup is not about chasing tools, but designing an architecture where each solution complements the other. You want detection, correlation, automation and response to happen as smoothly as possible. This is the mindset behind the stack I designed. Every component in this poster plays a role in defending against modern threats.
-
Building Global Quantum Resilience Excited to share insights featured in Springer Professional, where I discuss the transformative shift quantum technologies are driving—and the complex security challenges they introduce. You’ve heard it here multiple times: Q-Day isn't just a future worry. The threat landscape is evolving now and sensitive data is at stake already today. To protect our data and infrastructure, we must act urgently and collectively. In the article, I explain how quantum-resilient solutions, like Post-Quantum Cryptography (#PQC) and Quantum Key Distribution (#QKD), are the path forward. And these are not just technical upgrades—they are crucial for safeguarding our society's backbone, from private communications to critical infrastructure. Europe’s role in the global quantum race is also critical. As Olaf Scholz said, investment and collaboration are key. Only through cross-border partnerships and strategic funding we can secure long-term quantum sovereignty. For some in-depth insights find the full article: https://lnkd.in/d-dFzgxJ #QuantumIsNow #QuantumSecurity #QuantumEncryption #Cybersecurity #QuantumTechnology Terra Quantum AG
Explore categories
- Hospitality & Tourism
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Healthcare
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Career
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development