No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

DoD Regs, Neurodiverse Talent & Tel Aviv’s Light Rail

February 11, 2024
in Protection
0
DoD Regs, Neurodiverse Talent & Tel Aviv's Light Rail


Welcome to CISO Corner, Dark Reading’s weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we’ll offer articles gleaned from across our news operation, The Edge, DR Tech, DR Global, and our Commentary section. We’re committed to bringing you a diverse set of perspectives to support the job of operationalizing cybersecurity strategies, for leaders at organizations of all shapes and sizes.

In this issue:

  • How the SEC’s Rules on Cybersecurity Incident Disclosure Are Exploited

  • Managed Everything? Vendors Shift Focus to Services

  • DR Global: Q&A: Tel Aviv Railway Project Bakes in Cyber Defenses

  • World Govs, Tech Giants Sign Spyware Responsibility Pledge

  • The DoD’s CMMC Is the Starting Line, Not the Finish

  • Why Demand for Tabletop Exercises Is Growing

  • How Neurodiversity Can Help Fill the Cybersecurity Workforce Shortage

  • QR Code ‘Quishing’ Attacks on Execs Surge, Evading Email Security

How the SEC’s Rules on Cybersecurity Incident Disclosure Are Exploited

Commentary by Ken Dunham, Cyber Threat Director, Qualys Threat Research Unit

Cyber hygiene is no longer a nice-to-have but necessary for organizations that want to survive the relentless barrage of cyberattacks being unleashed daily.

The Securities and Exchange Commission (SEC) recently adopted new rules that require publicly traded companies to report cyberattacks with a material impact. Failure to do so likely will result in financial penalties and reputational damage.

While that’s a boon for company stakeholders in theory, threat actors are seeing an extortion opportunity. For instance, the ALPHV ransomware gang allegedly breached MeridianLink’s network in November, exfiltrating data without encrypting systems. When MeridianLink failed to pay a ransom to protect its data, ALPHV sent a complaint directly to the SEC outing the breach.

It’s a glimpse of how things could go moving forward in the fast-evolving world of extortion tactics, particularly given the sheer volume of opportunity for compromising companies these days. There were 26,447 vulnerabilities disclosed in 2023 according to Qualys analysts, and of those categorized as high-risk or critical, hackers pounced upon a quarter of them and published “n-day” exploits on the same day that they were disclosed.

Thankfully, there are some steps companies can take to thwart this kind of pressure.

Read on: How the SEC’s Rules on Cybersecurity Incident Disclosure Are Exploited

Related: A Cyber Insurer’s Perspective on How to Avoid Ransomware

Managed Everything? Vendors Shift Focus to Services

By Robert Lemos, Contributing Writer, Dark Reading

More companies are opting for managing complex security capabilities, such as data detection and response.

Threat management firm Rapid7 and data security firm Varonis announced new managed services this week, becoming the latest security companies to bundle complex security capabilities together in managed offerings.

In many ways, managed detection and response (MDR) covers a lot of ground and, so far, has done well for vendors and their customers. Vendors have happy clients, exceptionally rapid growth rate, and a very high margin for the service. Meanwhile, businesses can focus on the threats themselves, leading to faster detection and response. Focusing on the data could improve the response time, but that is far from certain.

Offering a managed version of an emerging security service will be an increasingly common approach, as the creation of an in-house cybersecurity capability is expensive, according to analyst firm Frost & Sullivan.

“In light of the shortage of cybersecurity professionals, organizations are looking for ways to automate the process of threat detection and response,” the report stated. “The new generation of solutions and services promises to deploy machine learning and artificial intelligence, automating decision-making to improve the overall performance of the security stack.”

Find out more about the move to managed: Managed Everything? Vendors Shift Focus to Services

Related: Tips for Monetizing SecOps Teams

Q&A: Tel Aviv Railway Project Bakes in Cyber Defenses

From DR Global

How a light railway in Israel is fortifying its cybersecurity architecture amid an increase in OT network threats.

Railway networks are suffering an increase in cyberattacks, most notably an August incident in which hackers infiltrated the radio frequency communications of Poland’s railway network and temporarily disrupted train traffic.

Looking to avoid the same fate, Tel Aviv’s Purple Line light rail transport (LRT), a line currently under construction and due to be open and running by the end of this decade, is baking cybersecurity directly into its build.

Dark Reading spoke with Eran Ner Gaon, CISO of Tel Aviv Purple Line LRT, and Shaked Kafzan, co-founder and CTO of rail cybersecurity provider Cervello, about the railway’s comprehensive OT security strategy, which includes measures such as threat intelligence, technological measures, incident response plans, and training of employees related to the regulation of the Israel National Cyber Directorate.

Read more on this case study: Q&A: Tel Aviv Railway Project Bakes in Cyber Defenses

Related: Rail Cybersecurity Is a Complex Environment

World Govs, Tech Giants Sign Spyware Responsibility Pledge

By Tara Seals, Managing Editor, Dark Reading

France, the UK, the US, and others will work on a framework for the responsible use of tools like NSO Group’s Pegasus, and Shadowserver Foundation gains £1 million investment.

Commercial spyware, such as NSO Group’s Pegasus, is usually installed on iPhones or Android devices and can eavesdrop on phone calls; intercept messaging; take pictures with the cameras; exfiltrate app data, photos, and files; and take voice and video recordings. The tools usually make use of zero-day exploits for initial access and sell for millions of dollars, meaning that their target market tends to consist of global government clients and large commercial interests.

This week, a coalition of dozens of countries including France, the UK, and the US, along with tech giants such as Google, Meta, Microsoft, and the NCC Group, have signed a joint agreement to combat the use of commercial spyware in ways that violate human rights.

UK Deputy Prime Minister Oliver Dowden announced the kickoff for the spyware initiative, dubbed the “Pall Mall Process,” which will be a “multi-stakeholder initiative … to tackle the proliferation and irresponsible use of commercially available cyber-intrusion capabilities,” he explained.

More specifically, the coalition will establish guidelines for developing, selling, facilitating, purchasing, and using these types of tools and services, including defining irresponsible behavior and creating a framework for their transparent and accountable use.

Find out how why commercial spyware pledge matters: World Govs, Tech Giants Sign Spyware Responsibility Pledge

Related: Pegasus Spyware Targets Jordanian Civil Society in Wide-Ranging Attacks

The DoD’s CMMC Is the Starting Line, Not the Finish

Commentary by Chris Petersen, Co-Founder & CEO, RADICL

Cybersecurity Maturity Model Certification (CMMC) and a harden, detect, and respond mindset are key to protecting defense and critical infrastructure companies.

As threat actors like Volt Typhoon continue to target critical infrastructure, the US Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) may soon will become a strictly enforced mandate.

Companies that achieve adherence to CMMC (which has been aligned to NIST 800-171 at the “Advanced” certification level) will become a harder target, but true cyber threat protection and resilience means going beyond “check-the-box” CMMC / NIST 800-171 compliance. That means moving to “harden-detect-respond (HDR)” operations.

  • Proactively identifying, fixing, and returning IT and operational weaknesses to a hardened state.

  • Immediately detecting and investigating possible intrusions into the IT environment, 24×7.

  • Hunting and rooting out embedded threats within the IT environment.

  • Quickly containing, mitigating, and fully responding to incidents.

CMMC/NIST 800-171 mandate most HDR capabilities. However, a company’s rigor and depth in realizing them can make the difference between remaining vulnerable to the advances of a nation-state cyber threat or remaining protected.

Here are the 7 critical HDR practices: CMMC Is the Starting Line, Not the Finish

Related: How ‘Big 4′ Nations’ Cyber Capabilities Threaten the West

Why Demand for Tabletop Exercises Is Growing

By Grant Gross, Contributing Writer, Dark Reading

Tabletop exercises can be an effective and affordable way to test an organization’s defense and response capabilities against cyberattack.

Cybersecurity drills come in many forms, but one of the least expensive and most effective is the tabletop exercise. These drills typically run for two to four hours and can cost less than $50,000 (sometimes much less), with much of the expense related to planning and facilitating the event.

The common approach to tabletop exercises is old-school and low-tech, but proponents say a well-run scenario can expose holes in organizations’ response and mitigation plans. And demand for tabletop exercises has grown exponentially in the past two years, driven by compliance issues, board directives, and cyber-insurance mandates.

In fact, the nonprofit Center for Internet Security calls tabletops “a must,” stressing that they help organizations better coordinate separate business units in response to an attack and identify the employees who will play critical roles during and after an attack.

Read more on getting the most from tabletop exercises: Why Demand for Tabletop Exercises Is Growing

Related: Top 6 Mistakes in Incident Response Tabletop Exercises

How Neurodiversity Can Help Fill the Cybersecurity Workforce Shortage

Commentary by Dr. Jodi Asbell-Clarke, Senior Research Leader, TERC

Many people with ADHD, autism, dyslexia, and other neurodiverse conditions bring new perspectives that can help organizations solve cybersecurity challenges.

The ISC2, which says the global workforce gap is 3.4 million, advocates for companies to recruit a more diverse population, which many interpret as meaning inclusion efforts around race and gender. While that’s crucial, there’s another area to expand into: Neurodiversity.

Many top STEM companies, including Microsoft, SAP, and EY, have neurodiversity workforce initiatives. While most neurodiversity hiring programs originally focused on autism, many employers are expanding to include individuals with attention-deficit/hyperactivity disorder (ADHD), dyslexia, and other (sometimes nonlabeled) differences.

Neurodiversity is a competitive advantage: Some people with autism for instance excel in detailed pattern recognition and systematic thinking — perfect for jobs involving monitoring and detecting security breaches. ADHD and dyslexia meanwhile are associated with increased idea generation and the ability to see connections between new ideas — valuable for approaching problems in new and different ways.

One problem these companies face is not finding enough neurodivergent talent. Fortunately, there are strategies to overcome difficulties in uncovering these individuals.

How to recruit neurodiverse talent: How Neurodiversity Can Help Fill the Cybersecurity Workforce Shortage

Related: Cyber Employment 2024: Sky-High Expectations Fail Businesses & Job Seekers

QR Code ‘Quishing’ Attacks on Execs Surge, Evading Email Security

By Robert Lemos, Contributing Writer, Dark Reading

The use of QR codes to deliver malicious payloads jumped in Q4 2023, especially against executives, who saw 42 times more QR code phishing than the average employee.

Cyberattackers are embracing QR codes as a way to specifically target executives: In the fourth quarter of 2023, the average top executive in the C-suite saw 42 times more phishing attacks using QR codes compared to the average employee.

Other managerial roles suffered an increase in attacks as well, although significantly smaller, with these non-C-suite executives encountering five times more QR-code-based phishing attacks, according to the company’s report.

The focus on the upper tiers of an organization could be because of the effectiveness of “quishing” in getting past endpoint defenses, which may be more stringent on higher-ups’ machines. Because attackers hide their phishing link in an image, QR code phishing bypasses user suspicions and some email security products.

More than a quarter of QR code attacks (27%) in Q4 were fake notices about turning on MFA, while about one-in-five attacks (21%) were fake notifications about a shared document.

How security teams can tackle quishing: QR Code ‘Quishing’ Attacks on Execs Surge, Evading Email Security

Related: QR Code Phishing Campaign Targets Top US Energy Company



Editorial Team

Editorial Team

Related Posts

Artists Love the XP-Pen Magic Note Pad Drawing Tablet, and It's $140 Off During Amazon's Big Spring Sale
Protection

Artists Love the XP-Pen Magic Note Pad Drawing Tablet, and It’s $140 Off During Amazon’s Big Spring Sale

March 26, 2026
The Garmin Forerunner 265 Is a Pretty Good Buy During Amazon's Big Spring Sale
Protection

The Garmin Forerunner 265 Is a Pretty Good Buy During Amazon’s Big Spring Sale

March 26, 2026
This Hydrow Rowing Machine Delivers a Full-Body Workout, and It's $300 Off for Amazon's Big Spring Sale
Protection

This Hydrow Rowing Machine Delivers a Full-Body Workout, and It's $300 Off for Amazon's Big Spring Sale

March 26, 2026
What Happens Now That Meta and YouTube Were Found Legally Negligent
Protection

What Happens Now That Meta and YouTube Were Found Legally Negligent

March 26, 2026
If I Had a Home Gym, This Is the Storage Rack I'd Buy During Amazon's Spring Sale
Protection

If I Had a Home Gym, This Is the Storage Rack I’d Buy During Amazon’s Spring Sale

March 26, 2026
This Budget Fitbit Is Only $70 During Amazon's Big Spring Sale
Protection

This Budget Fitbit Is Only $70 During Amazon’s Big Spring Sale

March 26, 2026
Load More
Next Post
Palantir Stock Is Soaring. Is It a Top AI Stock to Buy Now?

Palantir Stock Is Soaring. Is It a Top AI Stock to Buy Now?

Popular News

  • Oil prices fall on reports of a U.S. ceasefire proposal with Iran

    Oil prices fall on reports of a U.S. ceasefire proposal with Iran

    0 shares
    Share 0 Tweet 0
  • BlackRock’s Fink on why he won’t cash out private-credit investors: ‘Those are the rules, live with it.’

    0 shares
    Share 0 Tweet 0
  • How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • Majority of Fitch-rated sub lines have AA+ rating

    0 shares
    Share 0 Tweet 0
  • The Best Luxury Hotels in Kansas City, Whether You’re Visiting for Barbecue or the World Cup

    0 shares
    Share 0 Tweet 0

Latest News

Artists Love the XP-Pen Magic Note Pad Drawing Tablet, and It's $140 Off During Amazon's Big Spring Sale

Artists Love the XP-Pen Magic Note Pad Drawing Tablet, and It’s $140 Off During Amazon’s Big Spring Sale

March 26, 2026
0

We may earn a commission from links on this page. Deal pricing and availability subject to change after time of...

UK Pushes Ahead Temporary Ban Crypto Political Donations

UK Pushes Ahead Temporary Ban Crypto Political Donations

March 26, 2026
0

The UK government is advancing plans for a moratorium on political donations made through cryptocurrencies, following an independent review and...

StandardAero Q4 2025 slides: 16% revenue growth, LEAP momentum builds

StandardAero Q4 2025 slides: 16% revenue growth, LEAP momentum builds

March 26, 2026
0

StandardAero Q4 2025 slides: 16% revenue growth, LEAP momentum builds

Interactive Brokers lets clients move crypto from external wallets without liquidating

Interactive Brokers lets clients move crypto from external wallets without liquidating

March 26, 2026
0

Interactive Brokers now lets clients transfer supported crypto from external wallets into IBKR accounts without selling first, extending its low-fee,...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.