Market Moves: Cybersecurity - Mar 20th, 2024
 
 
Market Moves: Cybersecurity | View online
 
March 20, 2024
Leading Off

Breaches and Fraud

It is hard to believe that it’s been 10 years since the earthshaking information breach against Target. The Target Corporation's cyberattack may have compromised 70 million debit and credit cards. Of the 11 gigabytes of data leaked in the event, up to 70 million people's names, mailing addresses, phone numbers, email addresses, and credit card information were exposed. Nobody knew how it happened at the time, but it was the first of several business alerts about how susceptible their vendor networks were to insider threats and external hackers. This is our lead story in today’s newsletter from renowned cybersecurity guru Chuck Brooks, who reviews the incident and its aftermath.

Stacy Hadeka and Jasmeet K. Ahuja with the firm Hogan Lovells provide a detailed and comprehensive overview of the DOJ’s pursuit of cybersecurity fraud under the Civil Cyber-Fraud Initiative that targets cybersecurity-related fraud conducted by government contractors and federal grant recipients. The recent DOJ settlements and ongoing qui tam actions confirm that the number of enforcement actions will continue to increase. Contractors and grantees should brace for additional scrutiny and potential whistleblower claims in this area and carefully track fast-evolving cybersecurity rules and regulations, prioritizing related compliance efforts.

Read these feature stories and more

Steve Lasky, Editorial Director for the EBM Security Media Group

This uber-breach was a wakeup call on the urgency to protect supply chains
Sponsored

An integrated Traka solution can effectively extend the reach of your existing security infrastructure to the keys, devices and equipment that drive your operation. With our electronic key cabinets and smart locker solutions, you can control and monitor access to server racks, facility keys, shared devices and more, with an audit trail of all activity for total accountability.

The DOJ has continued its pursuit of civil enforcement against contractors and grantees who fail to satisfy their cybersecurity obligations
2024 may just be the year that we see API security strategies develop at a more rapid pace
Enhancing OT cybersecurity requires a full-stack approach that strengthens technological foundations while preserving value-driven OT operations
Sponsored

Inform your business strategies with these essential building blocks of marketing. Better understand manufacturing audience targets, gain sector insights, and elevate content creation to achieve results for your organization.

Rapid digital transformation creates a proliferation of SaaS providers, cloud infrastructure, and interconnected devices, often outpacing security measures.
The ubiquity of APIs means they have become one of cybercriminals’ favorite gateways for account takeover attacks.
CrowdStrike will leverage NVIDIA accelerated computing, NVIDIA Morpheus and NVIDIA NIM microservices to bring custom LLM-powered applications to the enterprise.
This "death by a million cuts" is revealed to be using mainly commodity malware, which indicates a large number of independent actors targeting the industry in pursuit of financial gain.
Sponsored
Join industry leaders to discover practical strategies for enhancing security posture, achieving cost-effective scalability, and aligning cloud security initiatives with business objectives and fiscal responsibility.
RSAC 2024 will take place in San Francisco