hachyderm.io is one of the many independent Mastodon servers you can use to participate in the fediverse.
Hachyderm is a safe space, LGBTQIA+ and BLM, primarily comprised of tech industry professionals world wide. Note that many non-user account types have restrictions - please see our About page.

Administered by:

Server stats:

9K
active users

#cyberrisk

1 post1 participant0 posts today

Is your organization truly encrypting email or just assuming it's secure?

Despite rising threats and regulatory pressure, encrypted email adoption remains low in many industries. Most sensitive messages are still exposed after delivery—leaving you open to breaches, insider threats, and compliance risks. Principal Consultant Ben Kast dives into the technical details in his new blog, as well as advice on the pros and cons of different email encryption options.

Check it out: lmgsecurity.com/securing-the-e

Encrypted email image
LMG SecuritySecuring the Email Flow: Implementing Encrypted Email in Microsoft 365, Exchange, and Onward | LMG SecurityThink TLS protects your email? Think again. Most messages are still exposed. We share the options, pros & cons, and implementation tips for encrypted email.

Cyber Security Policy is markedly different under the Trump administration, to say the least.

Expert warnings mount as key US cyber agencies face staff cuts, leadership shakeups, and even retaliatory actions against private partners - namely those made in the last 24 hours, targeting former CISA Director, Chris Krebs.

Recent White House actions suggest a troubling shift away from expert-driven cyber defense towards political expediency. From sidelined Russia operations to gutted agencies, we examine the evidence and the potential global fallout.

Read our full analysis here: opalsec.io/eroding-foundations

New On Location Coverage with Sean & Marco on ITSPmagazine

🚨 Cybersecurity in #Italy 🇮🇹 : A Niche Topic No More... 🤔

Not too long ago, if you mentioned #cybersecurity in Italy, you’d get a lot of blank stares. Today, it’s everywhere—boardrooms, government agencies, and, of course, #ITASEC, Italy’s official cybersecurity conference.

This year, #ITASEC2025 took over Bologna, bringing together researchers, policymakers, and industry leaders to discuss what’s next for digital security. AI security, regulatory shifts, #cybereducation — yes, even the Digital Operational Resilience Act (#DORA) that’s reshaping financial sector security—were all on the table.

Unfortunately I wasn’t in Italy at the time of the event, but that didn’t stop me from having a fascinating conversation with Professor Alessandro Armando, one of the key organizers and a leading voice in cybersecurity research. In this latest On Location episode. Of course, Sean Martin joined me and we spoke about:

🔹 How cybersecurity went from an afterthought to a national priority in Italy

🔹 Why companies are (finally) realizing that #security is an #investment, not just a cost

🔹 The rise of Cyber Challenge IT—Italy’s initiative to build the next generation of cybersecurity experts

🔹 And, of course, the big reveal… ITASEC 2026 is heading to Sardinia!

📺 Watch the Full Video: youtu.be/NsdkYAYZANc

🎧 Listen to the Full Podcast: eventcoveragepodcast.com/episo

🔔 Subscribe to On Location Podcast: eventcoveragepodcast.com

Cybersecurity isn’t just about stopping threats—it’s about shaping the future of how we live, work, and trust #technology.

What’s your take? Are we heading in the right direction, or are we still playing catch-up?

#InfoSec, #CyberRisk, #AIsecurity, #CyberThreats, #CyberEducation, #CyberWorkforce, #ThreatIntel, #EthicalHacking, #PenTesting, #RiskManagement, #CyberResilience, #DataProtection, #DigitalSecurity, #CyberLaw, #TechnologyNews, #OnLocationPodcast

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

Join us on March 26th for a live episode of Cyberside Chats! Ask questions as we discuss a controversial cybersecurity topic of 2025—encryption backdoors. Are they essential tools for law enforcement, or dangerous vulnerabilities that invite cybercriminals in?

We’ll break down Apple’s resistance to the UK’s proposed regulations, global reactions, historical backdoor failures, and what IT leaders need to know as encryption policy evolves.

Register now to join the discussion: lmgsecurity.com/event/cybersid

cybersidechat 2025 hot topics insights 032625
LMG SecurityCyberside Chats: Live! Encryption Backdoors: Security Savior or Cyber Risk? | LMG SecurityIn this quick, high-impact session, we’ll dive into the top three cybersecurity priorities every leader should focus on. From integrating AI into your defenses to tackling deepfake threats and tightening third-party risk management, this discussion will arm you with the insights you need to stay secure in the year ahead.

🚨 ESET warns Germany: 32 million Windows 10 devices at risk! With end-of-support looming in October 2025, cybersecurity experts urge immediate OS migration to prevent potential digital disaster. Upgrade now or face serious security vulnerabilities! 💻🛡️ #WindowsSecurity #CyberRisk #TechAlert #newz

cyberinsider.com/eset-warns-32

CyberInsider · ESET Warns 32 Million Germans They Need to Move From Windows 10With Windows 10's end-of-support date set for October 2025, experts at ESET warn that Germany could face a significant security crisis.

Major changes to the HIPAA Security Rule have been proposed to close critical gaps in healthcare cybersecurity. With healthcare breaches up 1,002% since 2018, these updates aim to protect sensitive patient data and enhance resilience. Key changes include:

▪ Regular vulnerability scans and pen testing
▪ Increased documentation, including written policies and IR plans
▪ Mandatory MFA and enhanced encryption
▪ Comprehensive asset inventories and risk analyses and more

These are great guidelines for all organizations, and healthcare organizations should start preparing now! Our expert team can assist you with all of these services, so please contact us if you need help.

Read more: darkreading.com/cyber-risk/pro

www.darkreading.comProposed HIPAA Amendments Will Close Healthcare Security GapsChanges to the healthcare privacy regulation, including technical controls for network segmentation, multifactor authentication, and encryption, would strengthen cybersecurity protections for electronic health information and address evolving threats against healthcare entities.

Aiming for 100% patching of even critical and high severity vulnerabilities can feel like chasing the wind. 🌬️🏃 So, what *should* #cybersecurity pros do? They should focus on what matters!

Patching every vulnerability isn’t just impractical; it’s unnecessary. And really, #security isn’t about perfection — it’s about prioritization. You’re better off focusing on vulnerabilities that truly matter to your organization’s risk posture.

Here's how you can get help with prioritizing all of those those #CVEs. ⤵️

graylog.org/post/why-patching- #CVE #cyberrisk

Cyber risk is not evenly distributed across users in your workforce. In fact, it's very lopsided. A large majority of risk events in your organization probably tie back to a relatively small population of users.

The attached figures provide some stats supporting that statement:

- Just 1% of users are behind 44% of all clicked phishing emails. 5% of users are responsible for 83.4% of all clicks.

- 1% of users are behind 92% of all malware events! 5% of users are responsible for ALL malware events. The remaining 95% had a clean record.

I don't think the proper response to these statistics is to grab torches and pitchforks and go round up these users to purge them from among us. Rather, these results present an opportunity to have a big impact on risk reduction by doing more focused/effective job of educating, incentivizing, and influencing the behavior we want to see among the riskiest users.

Full report "Exposing Human Risk" from Mimecast and Cyentia Institute is available here (no reg req'd): assets.mimecast.com/api/public

🚨 28% of ICS/OT systems lack an incident response plan! Are we prepared for the risks this poses to critical infrastructure? 🛡️

Securing these systems requires more than technology—it’s about strong strategies and skilled teams. 💼 Every organization needs a response plan to detect, respond to, and recover from cyber incidents.

What’s your top tip for ICS/OT security? Share below!

Read more about the importance of incident response in our latest blog post: guardiansofcyber.com/cybersecu

Guardians Of Cyber · 28% of ICS/OT Systems Lack IR Plans – Is Your Org at Risk?A deep dive into the 2024 SANS ICS/OT Cybersecurity Report reveals that 28% of ICS/OT systems lack an incident response plan. Is your organization prepared?

Only 1/3 of UK businesses have ever conducted a cyber risk assessment 😮

Plus we often hear from IT and Security Teams that struggle to know what makes a *good* risk assessment?

This is despite risk being widely regarded as the foundation for any cyber security programme. It features in government guidance, international standards, and wider good practice.

So we're starting a new series on the Cydea blog looking into just that. Plus tips and tricks on how you can up your #cyber #risk game (and maybe sneak in a bit of #CRQ too 🤑)

Check out the link below to the first part where we touch on preparation and (briefly) identifying risk - then make sure you're following Cydea for future updates!

What makes a good risk assessment? >> cydea.com/blog/what-makes-a-go

cydea.comWhat makes a good risk assessment? — CydeaA risk assessment is widely regarded as the foundation for any cyber security programme. It features in government guidance, international standards, and wider good practice.

"...burnout is a human issue which then can lead to a larger cyber risk issue." So, how can orgs help employees and prevent burnout? #Graylog's Joe Gross explains what they can do to support their security teams and reduce cyber risk.

This article shares some great tips on:
✔️ Adopting an inclusive culture
✔️ Building a comfort level among security teams
✔️ Setting cyber-risk expectations from the top

cpomagazine.com/cyber-security via CPO Magazine #cyberrisk #cybersecurity #infosec

🚨 Did you know 66% of cybersecurity professionals are facing unprecedented stress levels due to increasingly complex threats? 🚨
As cyberattacks grow more sophisticated, it's essential to stay ahead of the curve. 💡 Tip: Prioritize continuous training to combat the complexity of today's threat landscape. It could be the difference between prevention and disaster.

🔐 How does your team handle the stress of an evolving cyber threat environment?

Read more insights in our latest post: guardiansofcyber.com/cybersecu

Guardians Of Cyber · 66% of Cybersecurity Professionals Face Unprecedented Stress Levels Due to Complex Threats | Guardians Of CyberDiscover why 66% of cybersecurity professionals face unprecedented stress levels in 2024, driven by complex threats, budget constraints, and staffing shortages.

Join us at #RISK, the UK’s premier event for governance, risk, and compliance, in just over a month!

You'll find @cydea at booth 73 (next to the coffee ☕️) discussing ways to improve cyber risk conversations, and showing off our Risk Platform!

Plus, don't miss @rto on 10th October in the Risk Theatre at 12:00: "Quantifying Cyber Risk: Tools and Techniques for Better Decision Making"

You can book your free ticket here: buytickets.at/grcworldforums/1

Which industries are hit hardest by ransomware?

Well, that depends on what you mean by "hit hardest." Do you mean which industries most often suffer ransomware attacks/incidents? Or which ones are the most impacted financially?

Regardless of which dimension is top of mind for you, I have good news: this chart from the Cyentia Institute's latest edition of the Information Risk Insights Study (sponsored by CISA) offers a view of both. It plots each sector according to the share of incidents and publicly-known losses over the last five years attributed to ransomware.

If frequency and losses were perfectly correlated, sectors would lie on or near the dashed line. In general, that’s not the pattern we see here. Instead, we see industries that are disproportionately impacted by ransomware relative to event frequency (e.g., Healthcare, Hospitality), while the opposite is true for others (e.g., Financial, Professional). A myriad of factors contribute to the placement of sectors in Figure 14, but the targeting strategy of ransomware gangs is likely a major driver among them.

So, back to the original question - does this sync with your expectations on ransomware-ravaged industries?

Link to download the study (no registration required): cyentia.com/iris-ransomware/

What is "likely?" 🤔

This is what #BSides Exeter thought... ignoring the 0% trolls, "likely" means anywhere between ~30% and ~90% to the 50+ people that voted in our poll.

If you're struggling to communicate your #CyberRisk or don't feel like you're being heard, Cydea can help. Turn ambiguous statements into meaningful numbers that can underpin security programmes, investment cases, or show the benefit you're bringing to the business.

cydea.com/platform/