Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Internal risk management in cybersecurity: a complex challenge

Advanced protection strategies to counter insider threats in cybersecurity

The article highlights the importance of managing internal risk in cybersecurity. It is highlighted that cyber attacks often involve internal components, such as employees. The difference between "internal risk" and "internal threat" and the importance of adopting a multi-layered defense strategy are highlighted.
This pill is also available in Italian language

In managing internal risk in cybersecurity, there are often underestimated but crucial aspects. According to Federico Charosky, CEO of Quorum Cyber, it is essential to clearly define the concepts related to internal risk, discriminating between malicious and involuntary internal threats. This distinction, anything but a semantic subtlety, is fundamental to understanding the nature of the problem and finding adequate solutions.

The nuances of insider threats in cybersecurity

Charosky refers to a Microsoft report that highlights that approximately 85% of cyber attacks involve an internal component. This data confirms the crucial role of employees in facilitating an attack, both knowingly and unknowingly. Identity compromise is one of the key elements, whether through manipulation of the identity of insiders or through coercion or deception.

The difference between "internal risk" and "internal threat"

It is important to distinguish between "insider risk" and "insider threat", terms that are often confused. While an insider risk indicates a potential vulnerability (such as an employee with excessive access privileges), an insider threat indicates malicious actions carried out by an individual. This distinction allows us to adopt more targeted defense strategies and deal with internal threats more effectively.

The need for a multi-layered defense

Charosky emphasizes the importance of a multi-layered defense strategy. Relying solely on employee awareness and action is ineffective. An organization's IT security must involve all hierarchical levels and include adequate security measures. From aligning IAM protocols to adopting Zero Trust models, from implementing secure email gateways to ongoing employee training, a comprehensive, multi-layered approach is critical to effectively mitigate internal risks.

Follow us on Instagram for more pills like this

09/05/2023 16:35

Marco Verro

Last pills

Cloudflare repels the most powerful DDoS attack ever recordedAdvanced defense and global collaboration to tackle new challenges of DDoS attacks

Silent threats: the zero-click flaw that compromises RDP serversHidden risks in remote work: how to protect RDP servers from invisible attacks

Discovery of vulnerability in Secure Boot threatens device securityFlaw in the Secure Boot system requires urgent updates to prevent invisible intrusions

North korean cyberattacks and laptop farming: threats to smart workingAdapting to new digital threats of remote work to protect vital data and infrastructures

Don’t miss the most important news
Enable notifications to stay always updated