Security News > 2020 > September > Week in review: Costliest cybersecurity failures, DNS hijacking protection, AWS security automation
Which cybersecurity failures cost companies the most and which defenses have the highest ROI?Massachusetts Institute of Technology scientists have created a cryptographic platform that allows companies to securely share data on cyber attacks they suffered and the monetary cost of their cybersecurity failures without worrying about revealing sensitive information to their competitors or damaging their own reputation.
Essential features of security automation for the AWS platformA common security problem in AWS is an open S3 storage bucket where data is publicly readable on the Internet.
Security teams stretched to breaking point trying to secure new remote working regimesThe cybersecurity skills shortage means that many organizations are in urgent need of talented and experienced security professionals.
Why data is the missing link in your cybersecurity strategyWhen evaluating cyber security risks to the organization, we're typically looking at users, devices and IoT devices as possible ways into the infrastructure.
research: Why cybersecurity is a great choice for an exciting careerOrganizations from all industries and sectors are all seeking skilled security staff.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/QlL39z01LMs/
Related news
- Increasing Awareness of DNS Hijacking: A Growing Cyber Threat (source)
- AWS security essentials for managing compliance, data protection, and threat detection (source)
- A closer look at the 2023-2030 Australian Cyber Security Strategy (source)
- The ROI of Security Investments: How Cybersecurity Leaders Prove It (source)
- Australia Passes Groundbreaking Cyber Security Law to Boost Resilience (source)
- Top 5 Cyber Security Trends for 2025 (source)
- AWS unveils cloud security IR service for a mere $7K a month (source)
- Shape the future of UK cyber security (source)
- Strengthening security posture with comprehensive cybersecurity assessments (source)
- Overlooking platform security weakens long-term cybersecurity posture (source)