5 underappreciated benefits of AI in cyber security – CyberTalk

5 underappreciated benefits of AI in cyber security – CyberTalk

EXECUTIVE SUMMARY:

The benefits of AI in cyber security are phenomenal, yet not sufficiently well-known. In this article, get insights that cut through the noise; that show you how to put AI to work in ways that will yield worthwhile results.

AI-powered cyber security solutions drive proactive threat prevention, accelerated response times, reduced false positives, optimization of resources and cost efficiency – all of which are strategic advantages that conspire to help create a more agile and robust organizational security posture.

Although 91% of organizations allow that AI adoption is a priority, the large majority are still in the planning or development stages of their AI-in-security journeys. Whether you’re assessing AI-based tooling adoption or wish to get more out of existing AI implementations, this article offers valuable insights that can propel your cyber security strategy forward.

Benefits of AI in cyber security

These are the kinds of returns that you can expect to receive on your AI-powered cyber security investment:

1. Proactive threat prevention and detection. One of the most significant benefits of AI in cyber security is that it transitions organizations from a reactive threat management approach to a proactive one. Here’s what we mean…

Historically, security tools have relied on known signatures or rules. Yet, this has left organizations vulnerable to unknown threats.

To circumnavigate the problem, AI can look back at trends, patterns and anomalies, using volumes of existing data to identify emerging, never-before seen attack types. AI’s capabilities here enable security teams to mitigate issues before they spiral into damaging security incidents.

2. Accelerated response times. When a security incident occurs, time is of the essence. AI-powered cyber security solutions can automate the initial stages of incident response; threat identification, impact assessment and containment.

In some instances, AI may be able to auto-isolate compromised devices from the network. In turn, this prevents the spread of malware (ex. ransomware). Efficient and automatic device isolation can minimize a cyber attack’s financial impact on a business.

3. False positive reduction. False positives – benign activities that are improperly recognized and categorized as malicious – have long been a security team frustration. They consume time and resources while potentially obscuring genuine threats. But AI has much to offer here…

For various technical reasons, AI-powered cyber security tools allow for a markedly more accurate differentiation between suspicious behavior and normal behavior, as compared to traditional cyber security tools. Subsequently, false positive rates decline. When there are fewer false positives, security teams can spend more time engaging with real threats, contributing to a stronger organizational cyber security posture overall.

4. Resource optimization. Given the cyber skills shortage, organizations are under pressure to optimize human resources. Nearly 50% of Check Point survey respondents recognize AI’s potential when it comes to automating repetitive tasks and optimizing resource allocation.

AI can competently tackle log analysis and correlation, vulnerability scanning and assessment, patch management and routine threat hunting. Thus, humans can focus on more complex and strategic initiatives. Ultimately, this approach – apportioning the work between AI and humans – ensures that resources are allocated in a way that maximizes impact and optimizes outcomes.

5. Cost efficiency. AI-powered tools can reduce the need for point solutions. This is because many AI-powered cyber security platforms offer extensive, integrated capabilities. Such consolidation can lead to significant cost savings in terms of software licenses, maintenance and interoperability efforts.

AI also contributes to cyber security cost efficiency due to the fact that it can limit the likelihood and impact of security incidents. Because AI-powered systems can identify threats rapidly and respond quickly, the potential for damage drops and expected breach costs decline.

More information

For more insights into the benefits of AI in cyber security, please see CyberTalk.org’s past coverage. Curious about how ChatGPT-5 could influence your security strategy? Click here.

Discover at transformative, industry-leading AI-powered, cloud-delivered cyber security solution here. Lastly, to receive cyber security thought leadership articles, groundbreaking research and emerging threat analyses each week, subscribe to the CyberTalk.org newsletter.

How will ChatGPT-5 change your cyber security strategy? – CyberTalk

How will ChatGPT-5 change your cyber security strategy? – CyberTalk

EXECUTIVE SUMMARY:

Yesterday, OpenAI’s Chief Technology Officer, Mira Murati, described the level of intelligence that will be packed into the forthcoming ChatGPT model. ChatGPT-5 is expected to have ‘Ph.D-level’ smarts.

“If you look at the trajectory of improvement, systems like GPT-3 were maybe toddler-level intelligence,” said Murati. “And then systems like GPT-4 are more like smart high-schooler intelligence…in the next couple of years, we’re looking at Ph.D. intelligence for specific tasks,” Murati continued.

In regards to cyber security and cyber security professionals, the implications are still unfurling. Nonetheless, the handful of possibilities outlined below are worth preparing for now – before hackers attempt to weaponize this technology (and disrupt your organization).

ChatGPT-5 potential threats

According to Murati, GPT-5 is due to be released near the close of 2025 or in early 2026. While technology aficionados may wish that the next GPT leap were nearer, the timeline presents cyber security pros with the opportunity to prepare for unprecedented possibilities, like these:

  • ChatGPT-5 may be able to analyze software code. In so doing, it may be able to immediately identify software weaknesses and generate custom exploits for any found vulnerabilities. In other words, ChatGPT-5 could effectively serve vulnerabilities to cyber criminals on a silver platter.
  • ChatGPT-5 could also result in social engineering gone-wild; think hyper-personalized phishing emails and smishing messages. Such messages may be so elegantly and seamlessly crafted that humans, if not machines, will almost certainly struggle to recognize them as phony and duplicitous.
  • Concern around generative AI’s abilities to sow misinformation and disinformation isn’t new. But ChatGPT-5 could potentially generate journalistic, realistic-looking fake news articles and social media posts. In turn, this could manipulate (and confuse) the general public. Effects could range from brand damage to social discord, depending on how the AI is employed.

Strategic CISO recommendations

1. Develop an AI-aware vulnerability management program. Given ChatGPT-5’s potential to analyze code and identify software weaknesses with a high level of accuracy, CISOs should create a vulnerability management program that uses AI-powered tooling.

This program should be able to quickly identify, prioritize and address vulnerabilities; before adversaries can exploit them using similar AI capabilities.

2. Enhance social engineering defenses. Hyper-personalized phishing is already a problem (whaling). To get ahead of this issue, consider advanced user education programs, along with AI-powered email and message filtering systems. Email filtering systems should be able to detect and neutralize highly evolved social engineering tactics.

3. Implement AI-powered misinformation detection. As noted earlier, ChatGPT-5 may be able to create convincing fake news and fake social media posts. To prepare for this seeming eventuality, implement AI-powered content verification tools. These kinds of tools help to actively protect your brand and can set your business apart as thoughtful, competitive and cyber security-forward.

4. Although this sounds like it’s straight out of a sci-fi movie, consider preparing for AI vs. AI cyber security scenarios. This includes investing in AI model security, implementing adversarial testing for AI systems and coming up with home-grown, business-specific strategies for identifying and counteracting AI-powered attacks.

Further thoughts

As generative artificial intelligence evolves, cyber security will have to adapt. Reactive responses can leave businesses scrambling uphill after it’s too late – get ahead of technological trends and adapt your cyber security, starting today.

For detailed insights into AI-powered, cloud-delivered cyber security technology that protects your business from the most sophisticated of cyber threats, click here. For insights into using AI prompt engineering to your advantage as a security professional, click here.

Lastly, to receive cyber security thought leadership articles, groundbreaking research and emerging threat analyses each week, subscribe to the CyberTalk.org newsletter.

CISO security & business continuity insights: lessons from an undersea cable blackout – CyberTalk

CISO security & business continuity insights: lessons from an undersea cable blackout – CyberTalk

Issam El Haddioui: Head of Security Engineering, EMEA – Africa | Security Evangelist with the Office of the CTO. Issam El Haddioui has held multiple technical leadership and management roles with major cyber security vendors in different countries. He has 20+ years’ experience in worldwide consulting, designing, and implementing security architectures across verticals. He holds two master’s degrees and various technical certifications.

In this dynamic and insightful interview, Check Point expert Issam El Haddioui highlights how an undersea cable disruption impacted multi-national, regional and local businesses across Africa. He then describes how to prepare for internet blackouts and brownouts within your organization, walking through best practices and forms of resilient cyber security architecture.

1. Would you like to provide an overview of the subsea cable issue that recently affected West and Central Africa?

Internet access and connectivity for a large portion of our continent, more than a dozen of countries, was impacted earlier this year due to submarine undersea cables being damaged. Businesses in Ghana, Ivory Coast, Nigeria, Uganda and more were forced to rely on phone conversations to exchange data in a timely manner. Others in East Africa had to use satellite network connections to continue operating.

2. Why is the issue significant? Who was affected and to what extent?

With almost 90% of Africa’s internet traffic relying on undersea cables, all aspects of the continent’s digital economy were subject to disruption; from quality of service to having no-connectivity at all. Stock exchanges, banks, e-commerce and logistics platforms were out of order for a significant part of the day, impacting revenue and business continuity. It caused delays to critical services for the continent and its citizens.

3. When interruptions – like what happened with the undersea cables – occur, what are the risks or vulnerabilities that businesses face?

In these circumstances, businesses are facing not only lower productivity, which impacts their competitiveness, but also security related risks, such as lack of visibility over their presence and global assets, and lack of visibility into non-local cloud platforms. They also lack real-time prevention in case of any local threats or insider actor.

4. For businesses based in West or Central Africa or with offices in the region, given the sub-sea cable cut, what kinds of general business resilience measures would you recommend?

In addition to the redundancy and resilience mechanisms applied by operators responsible for the cables, business can also opt for, when possible, a redundant/backup network connectivity via satellite communication. Also, we recommend having a local copy of critical data either on premises or leveraging the development of local and sovereign cloud providers. Sometimes, undersea cable disruption can also lead to a cyber attack due tapping or eavesdropping by threat actors who are meddling with the cable. Hence, encryption is also a highly recommended when trying to exchange data.

5. How can a SASE architecture help enterprises maintain secure and reliable connectivity to business critical applications and data?

SASE architecture that’s supported by a highly resilient meshed backbone can help maintain secure and reliable local communications for remote workers in countries using local PoP during any disruption; providing access to business data and applications.

6. What kinds of visibility and control does SASE offer and how is that beneficial?

With SASE architecture, business will have control over any connection to their data or applications, regardless of where it originates from. It allows them to check the security posture of the device where the user is initiating the connection, authentication and access control policy. It also gives them the ability to use the best route with low latency for critical traffic. It provides a full, central, in real-time and granular view of the security status of the environment; an important visibility mechanism enabling security analysts to prevent any potential threats or malicious activity.

7. How can SASE’s cloud-delivery model and optimization capabilities help reduce the impact of internet brownouts or blackouts?

SASE cloud-delivery with local PoP will help maintain local connectivity and access to data and applications during a period of internet blackout. In fact, SASE providers, such as Check Point, will have a local replica on all its PoP globally, with the same security policy. These local PoPs or some local providers have built resilience into their infrastructure that SASE can benefit from, such as dual connectivity via satellite or radio-based communication.

8. What related advice do you have for corporate leaders?

Digital transformation and the new hybrid mode of working have given businesses and governments a myriad of benefits and opportunities. These include reducing their real estate costs by enabling the remote workforce, rapid go-to-market with online and e-commerce platforms, accelerating the launch of citizen programs…etc.

This new reality cannot be supported by traditional connectivity and security architectures, but requires new agile, scalable, and holistic ways to deal with an extended attack surface and heterogenous mode of connection. SASE is one direction to help address some of these new challenges, offering secure and controlled access to data and applications from anywhere to anywhere, cloud-delivered and as-a-service.

9. At this point, the cables have been restored. Do you expect to see another incident like this within the next 12-18 months?

Even with all the resilience mechanisms that the cables operators are implementing, we are never totally immune from such incidents for various reasons. Incidents like what we saw in Africa this year are not very frequent, but according to the Center for Strategic and International Studies (CSIS), undersea cable disruptions occur at a rate of 200 incidents per year due to different accidental damages.

10. Is there anything else that you would like to share?

It is very important, during periods of internet blackout or disruption, not lose sight of insider threats, such as internal employees or third-parties, and potential local intrusion that can cost your business millions due to a data leak, reputational damage or legal liabilities. Hence, a unified and integrated security platform with visibility into the internal and external attack surface is key to your security monitoring in real-time.

For more insights from Issam El Haddioui, please see CyberTalk.org’s past interview. Lastly, to receive cyber security thought leadership articles, groundbreaking research and emerging threat analyses each week, subscribe to the CyberTalk.org newsletter.

10 web application firewall benefits to keep top of mind – CyberTalk

10 web application firewall benefits to keep top of mind – CyberTalk

EXECUTIVE SUMMARY:

These days, web-based applications handle everything from customer data to financial transactions. As a result, for cyber criminals, they represent attractive targets.

This is where Web Application Firewalls (or WAFs) come into play. A WAF functions as a private security guard for a web-based application or site; always on-guard, in search of suspicious activity, and capable of blocking potential attacks. But the scope of WAF protection tends to span beyond what most leaders are aware of.

In this article, discover 10 benefits of WAFs that cyber security decision-makers should keep top-of-mind, as to align WAF functions with the overarching cyber security strategy.

1. Protection against OWASP Top 10 threats. A WAF can stop application layer attacks, including the OWASP Top 10 (with minimal tuning and no false positives). WAFs continuously update rule sets to align with the latest OWASP guidelines, reducing the probability of successful attacks.

2. API protection. WAFs offer specialized protection against API-specific threats, ensuring the integrity of data exchanges. WAFs can block threats like parameter tampering and can find abnormal behavioral patterns that could be indicative of API abuse.

Advanced WAFs can understand and validate complex API calls, ensuring that only legitimate requests are processed. They can also enforce rate limiting and access controls specific to different API endpoints.

3. Bot & DDoS protection. WAFs can distinguish between malicious and legitimate bot traffic, preventing DDoS threats, credential stuffing, content scraping and more. This area of WAF capability is taking on increasing importance, as bots are blazing across the web like never before, negatively impacting the bottom line and customer experiences.

4. Real-time intelligence. Modern WAFs leverage machine learning to analyze traffic patterns and to provide up-to-the-minute protection against emerging threats, enabling businesses to mitigate malicious instances before exploitation-at-scale can occur.

5. Compliance adherence. WAFs enable organizations to meet regulatory requirements, as they implement much-needed security controls and can provide detailed audit logs.

The granular logging and reporting capabilities available via WAF allow organizations to demonstrate due diligence in protecting sensitive data.

Many WAFs come with pre-configured rule sets designed to address specific compliance requirements, rendering it easier to maintain a compliant posture as regulations continue to evolve.

6. Reduced burden on development teams. Stopping vulnerabilities at the application layer enables development or IT team to focus on core functionalities, rather than the constant patching of security issues.

This “shift-left” approach to security can significantly accelerate development cycles and improve overall application quality. Additionally, the insights offered by WAFs can help developers understand common attack patterns, informing better security practices as everyone moves forward.

7. Customizable rule sets. Advanced WAFs offer the flexibility to create and fine-tune rules that are specific to an organization’s needs. This customization allows for the adaptation to unique application architecture and traffic patterns, minimizing false positives, while maintaining robust protection.

Organizations can create rules to address specific threats to their business, such as protecting against business logic attacks unique to their application.

And the ability to gradually implement and test new rules in monitoring mode before enforcing them ensures that security measures will not inadvertently disrupt legitimate business operations.

8. Performance optimization. Many WAFs include content delivery network (CDN) capabilities, improving application performance and UX while maintaining security.

Caching content and distributing it globally can significantly reduce latency and improve load times for users worldwide. This dual functionality of security and performance optimization offers a compelling value proposition. Organizations can upgrade both their security posture and user satisfaction via a single cyber security solution.

9. Operational insights. WAFs present actionable operational insights pertaining to traffic patterns, attack trends and application behavior. These insights can drive continuous security posture improvement, inform risk assessments and help cyber security staff better allocate security resources.

10. Cloud-native security. As organizations migrate to the cloud, WAFs intended for cloud environments ensure consistent protection across both hybrid and multi-cloud infrastructure. Cloud-native WAFs can scale automatically with applications, offering uncompromising protection amidst traffic spikes or rapid cloud expansions.

Cloud-native WAFs also offer centralized management. This simplifies administration and ensures consistent policy enforcement. By virtue of the features available, these WAFs can provide enhanced protection against evolving threats.

Further thoughts

WAFs afford organizations comprehensive protection. When viewed not only as a security solution, but also as a business enablement tool, it becomes clear that WAFs are an integral component of an advanced cyber security strategy. To explore WAF products, click here.

For more cloud security insights, click here. Lastly, to receive cyber security thought leadership articles, groundbreaking research and emerging threat analyses each week, subscribe to the CyberTalk.org newsletter.

The societal implications of digital WMDs – CyberTalk

Bryan Neilson is an experienced Cyberspace & Intelligence Operations professional who built his career supporting Cyberspace Operations, Intelligence Collection, and Counterintelligence for the U.S. Intelligence Community. Bryan’s work, which has spanned the globe, can be directly tied to saving the lives of countless officers and assets, enabling of kinetic military objectives, and helping to build and maintain the strategic advantage of the United States throughout Cyberspace and beyond. Fusing his proficiencies in Cyberspace Operations and Human Intelligence, Bryan has become a trailblazer in his industry and has brought his unique expertise to Check Point Software Technologies – where he serves as Regional Architect, Evangelist, and global Subject Matter Expert in Sophisticated Cyberspace and Intelligence Tradecraft.

In the last several days, the cyber security industry has been rocked by a rare acknowledgement from U.S. Government Officials regarding the likelihood of extensive compromise of U.S. Critical Infrastructure by specific state-sponsored hacking groups. In a rare public pronouncement, the United States’ National Security Agency (NSA) revealed the extent to which it (and other federal agencies) believes that specific Nation-State sponsored actors have been actively and successfully engaging in broad campaigns to compromise various systems controlling critical infrastructure components within the U.S.

It has been a long-held belief among many cyberspace professionals that sophisticated state-enabled offensive actors have been actively and covertly compromising various critical infrastructure systems and networks across the United States and its allies – activity that has been on-going for several years.  Nevertheless, these public statements from the NSA – an organization known for keeping such issues and ‘troubles’ concealed from the general public – suggest mounting concerns among U.S. intelligence, military, diplomacy, and congressional officials.

Furthermore, U.S. officials have noted how this observed ‘buildup’ is predominantly targeting critical infrastructure systems of little to no intelligence value; thus, raising alarm that the motivation behind this activity is for the sole purpose of gaining a strategic advantage (the ability to disrupt U.S. and allied critical infrastructure) in the event conflicts arise.

Since early 2023, when the NSA and Microsoft collaboratively identified and publicly-revealed the existence of China’s Volt Typhoon program and alluded to the extent to which this mission had gained strategic access among critical infrastructure, worry throughout Washington has been mounting. The primary concerns are three-fold: A) strategic pre-positioning and control over U.S. critical infrastructure represents a substantive threat to the United States government, economy, and society; B) such wide-ranging pre-positioning has the potential to fundamentally shift the balance of power and displace the United States’ strategic advantage and dominance within the Cyberspace Domain; and C) such pre-positioning activity positions adversarial nation states with a “first-strike” capacity against the United States. These concerns have been echoed by Air Force General Timothy Haugh (Commander of U.S. Cyber Command and the top military official in the United States for cyberspace), in a telling statement made to the Washington Times, “We see attempts to be latent in a network that is critical infrastructure, that has no intelligence value, which is why it is so concerning.

Recent public statements from the NSA and the subsequent comments from the Commander of the U.S. Cyber Command paint a rather bleak picture for the continuing security of United States critical infrastructure – and in turn, the future stability and resiliency of the U.S. government, economy, and society. Nevertheless, it is imperative to remember that this pre-positioning activity some U.S. adversaries are being accused of is neither new, unprecedented, nor, legally speaking, an act of outright hostility. Many countries with cyberspace operations capacities that are at least moderately sophisticated are actively engaged in the premeditated, organized, nation-sanctioned, and clandestine compromise of systems and networks for the sole purpose of gaining a strategic advantage over their adversaries – the United States being no exception. Lacking the critical element of direct and overt hostility, such activity is predominantly viewed and handled in the same manner as espionage, rather than actions indicative of war.

Chartered, in part, with maintaining and increasing the strategic advantage and dominance the United States has long held throughout the cyberspace domain, U.S. Cyber Command actively engages in this same strategic pre-positioning targeting U.S. adversaries. Such maneuvers intend and ultimately result in the compromise of and surreptitious control over thousands of systems and networks deemed advantageous to the interest and strategic advantage of the United States (systems and networks critical to the governmental, military, economic, and societal functions of other nations). This type of activity neither intends nor results in any immediate denial effect and therefore, does not meet the legal standard of Cyberspace Attack – a hostile act.  Rather, this type of activity is more aligned with acts of Cyberspace Exploitation.

Understanding this subtle yet crucial nuance between cyberspace attack and cyberspace exploitation is paramount to properly framing the situation that the world now faces. Cyberspace attack and cyberspace exploitation are two sides of the same coin. While both seek the compromise of systems, networks, data, and other assets, they fundamentally differ in both execution and motivation.

Cyberspace Attack, being of more substantial concern, consists of acts The societal implications of digital WMDs – CyberTalkcarried out within or through the cyberspace domain that have either the intent or result of causing immediate denial effects (defined as any form of degradation, disruption, or destruction). Actions carried out in this manner are still classified as Cyberspace Attack, even if this denial effect impacts resources outside the cyberspace domain. Cyberspace Exploitation, on the other hand, does not arise from the motivation of causing an immediate denial effect. Rather, Cyberspace Exploitation consists of acts of espionage or enablement carried out within or through the cyberspace domain. Lacking any motivation or outcome of an immediate denial effect, acts of Cyberspace Exploitation are not considered directly hostile and, from a legal, military, and diplomatic perspective handled much differently – through espionage, military maneuvers, counterintelligence, international pressure, and diplomacy. Notable however, is the standard setting forth “Enablement Activity” as an act of cyberspace exploitation. Such enablement activity consists of actions carried out for the purpose of enabling future activity or operations within or outside the cyberspace domain – regardless of the intent, motivation, or ultimate outcome inherent to such future activity.

Cyberspace Operations (which includes the aforementioned Cyberspace Attack and Cyberspace Exploitation, along with Cyberspace Security and Cyberspace Defense) establishes the current legal, military, and diplomatic doctrine and framework adopted by a majority of countries. The pre-positioning activity that is now raising alarm within the United States, while concerning and notable, represents non-hostile enablement activity within the discipline of Cyberspace Exploitation. The inclusion of “enablement activity” under the umbrella of Cyberspace Exploitation is a direct causal factor in the increased targeting and successful compromise of critical infrastructure systems around the world.

The rapid expansion in actors capable and willing to engage in cyberspace exploitation combined with the relative ease by which many critical infrastructure components can be compromised has led to a new “Mutually Assured Destruction” (MAD) style buildup of offensive capabilities and strategically pre-compromised and controlled critical assets. Though not directly hostile, this enablement activity does tactically position an actor to have control over the critical infrastructure of another country – thus providing the actor the ability to cause substantial damage to the country’s government, military, economy, and society.

Today, the world finds itself again in the grips of a transformed Cold War – watching the proliferation, buildup, and strategic placement of weapons of mass destruction. Reminiscent of global issues faced in decades past, this race towards mutually assured destruction is now driven by computer code rather than fissile material – a new age of weapons known as Digital Weapons of Mass Destruction.

"Let us hope the will of good men is enough to counter the terrible strength of this thing that was put in motion" - Donaldson, R. (Director) - Thirteen Days, New Line CinemaThe implications go beyond the direct impacts these digital WMDs would have on the physical world to the social and psychological impacts that they could have on people. In his 1955 book titled, “The Sane Society” social psychologist Erich Fromm describes the “Socially Patterned Defect”: a systemic illness underlying and inherent to modern societies, that absent the distractions of modern technology, would present in clinical signs of neurosis, psychosis, and socially-deviant behaviors among the population. Though more than half a century has passed since originally theorized, the hypothesis of a Socially Patterned Defect has been tested and upheld throughout the decades – even in today’s modern world. The aggressive adoption by modern societies of technologies providing on-demand access to real-time communications and information represents a new social and public health threat posed by such Digital WMDs. Unfortunate, but true, is the fact that most societies and individuals within the modern world are ill-prepared and would be effectively unable to function in a world without the modern technologies they have come to rely on.

Consider, as one example, the very real possibility of disruption to a nation’s power and communications infrastructure. While undoubtedly damaging to the nation’s government, military, and economy, the impact such an event would have on the society could be far more substantial. The co-dependency and reliance most modern societies have on current technology creates an ideal comorbidity condition where, any unexpected, immediate, and long-term absence of such technology could have the potential of causing this Socially Patterned Defect to emerge – resulting in mass disorder, public health and law enforcement crises, and ultimately societal and government collapse within the impacted population(s). Such effects resulting from a population’s loss of modern technology are not simply theoretical but have been observed on numerous occasions (and in relatively small scale) in the aftermath of recent natural disasters. This scenario represents a simple and limited-in-scope example of what is possible and of interests to sophisticated actors today. Considering the enablement activity being observed intends to acquire control over the whole of a nation’s critical infrastructure (communications, energy, emergency services, healthcare, transportation, and water systems – to name a few), the outcomes could be even more grave.

While the totality of impact such Digital WMDs would have on society seems dire, there is hope on the horizon. In May 2024, the United States Department of State published the “International Cyberspace and Digital Policy Strategy”. Laying the foundation for a brighter, more secure, and more sustainable future, this policy seeks to set the cornerstone of a more diplomatic approach to cyberspace. Though seen as a watershed moment in the history of cyberspace, it is important to remember that these efforts are still very much in their infancy and will take years to fully formalize and canonize; and could be easily disrupted should tensions between key nations reach a point where conflict involving hostile actions within or through cyberspace seem warranted. Until such time, this new strategy is only complementary to and in no way contradicting or superseding the current military-minded doctrine of cyberspace operations.

With the stakes so high and any global realignment of doctrine so far off, it now rests on the shoulders of the global collective of cyberspace operations and cyber security professionals to help drive the world to this more secure reality – one where Digital WMDs are less prolific and the thought of triggering such weapons is considered a taboo in the same vein as the use of nuclear weapons. As an industry, the most powerful countermeasures are not the cyber security technologies – they have time and again proven inadequate and unable to stand up against sophisticated offensivecapabilities – but rather the knowledge, expertise, good nature, and voices of these unique professionals. In the interest of prevention, advocating for non-proliferation, disarmament, and international oversight and control of Digital WMDs is essential. Through this, governments can be pressured to ensure such weapons are rarely used; and if so, are employed in a restrained manner accounting for all reasonable measures to ensure societal stability.  While seeking prevention would be ideal, mutually agreed global disarmament and restraint among nations who possess (or who could easily develop) Digital WMDs is doubtful. Therefore, a measure of focus must be shifted to preparation and response rather than prevention.

With this new Cold War being fought out within a realm that is largely intangible and through actions rarely perceptible or considered, the seriousness and criticality of the situation the world now faces is often overlooked or not entirely comprehended. Just as populations around the world took measures in preparation for nuclear war throughout the mid-20th century, the world once again must proactively prepare for the possibility of conflict involving actions taken through cyberspace intended to result in disruptions to critical infrastructure. Everyone, from individuals to the largest organizations and educational institutions, to governments must preemptively address these threats and plan for a reality where critical services are made unavailable for an extended period of time.

Organizations can take strategic and common-sense measures to help ensure they are better prepared for such possibilities. Building comprehensive Continuity of Operations Plans that include contingencies for loss of critical infrastructure is fundamental. Through this, organizations should identify resources and services that are deemed critical (those a company would be unable to function without) and identify alternative means of operations should these resources and services be made unavailable. Organizations should also seek to establish substitute communications strategies, alternate work site locations, and disaster-scenario personnel reporting requirements. Additionally, any continuity of operations program should account for identification and loss of human resources that provide or hold critical knowledge for the organization.

To be more proactive, organizations should build teams (or partner with services) to provide real-time monitoring, investigations, digital forensics, incident handling, cyber threat intelligence, and proactive threat hunting capabilities. Governments must also come to the table and lower the bar for entry to build strategic public-private partnerships for the purposes of sharing critical information and intelligence. While sophisticated offensive activity can very likely go unseen even with the latest incident response strategies, technologies, and intelligence, this remains the best method of identifying and curtailing the compromise of critical systems for the purpose of pre-positioning.  Furthermore, where employed, organizations should exercise restraint in the use and deployment of counteroffensive capabilities, actions, and services to avoid causing further escalation.

"Knowledge is of no practical value unless it is put into practice." - Anton ChekhovLastly, while an uncomfortable conversations, all organizations and individuals must come to grips with the limitations and fallibility of many modern security technologies. Where most of these technologies are employed, a sobering fact must be acknowledged: no matter how robust a system is believed to be, the likelihood of previous, current, and ongoing compromise by a sophisticated actor is unquestionable – even more so for any system controlling or maintaining critical infrastructure. Nevertheless, there do exist some truly capable frameworks employing a consolidated and comprehensive approach coupled with AI-powered and cloud-delivered next-generation capabilities. Leveraging these advanced all-encompassing solutions (such as the Check Point Infinity Platform) remains the only method proven successful in preventing sophisticated offensive activity.

Business readiness for the impending deepfake superstorm – CyberTalk

Business readiness for the impending deepfake superstorm – CyberTalk

EXECUTIVE SUMMARY:

Deepfake technologies, as powered by artificial intelligence (AI), are rapidly proliferating, affecting businesses both large and small, worldwide. Between last year and this year, AI-driven deepfake attacks have increased by an astonishing 3,000%. Although deepfake technologies do have legitimate applications, the risk that they pose to businesses is non-trivial. The following serves as a brief overview of what to keep track of:

Business risk

1. Deepfakes impersonating executives. At this point, deepfakes can mimic the voices and appearances of high-ranking individuals so effectively that cyber criminals are manipulating financial transactions, ensuring authorization of payments, and weaponizing videos to gain access to information.

The financial losses caused by deepfakes can prove substantial. Think $25 million or more, as exemplified in this incident. Millions of dollars lost can affect the company’s gross revenue, jeopardizing a company’s future.

What’s more is that impersonation of an executive, even if it only occurs once, can send stakeholders into a tailspin as they wonder who to trust, when to trust them and whether or not to only trust people in-person. This can disrupt the fluidity of day-to-day operations, causing internal instability and turmoil.

2. Reputational damage. If deepfakes are used publicly against an organization – for example, if a CEO is shown to be on stage, sharing a falsehood – the business’s image may rapidly deteriorate.

The situation could unravel further in the event that a high-level individual is depicted as participating in unethical or illegal behavior. Rebuilding trust and credibility after such incidents can be challenging and time-consuming (or all-out impossible).

3. Erosion of public trust. Deepfakes can potentially deceive customers, clients and partners.

For example, a cyber criminal could deepfake a customer service representative, and could pretend to assist a client, stealing personal details in the process. Or, a partner organization could be misled by deepfake impersonators on a video call.

These types of events can erode trust, lead to lost business and result in public reputational harm. When clients or partners report deepfake issues, news headlines emerge quickly, and prospective clients or partners are liable to back out of otherwise value-add deals.

Credit risk warning

Cyber security experts aren’t the only people who are concerned about the impending “deepfake superstorm” that threatens to imperil businesses. In May, credit ratings firm Moody’s warned that deepfakes could pose credit risks. The corresponding report points to a series of deepfake scams that have impacted the financial sector.

These scams have frequently involved fake video calls. Preventing deepfake scams – as through stronger cyber security and related measures – can potentially present businesses with greater opportunities to ensure good credit, acquire new capital and obtain lower insurance rates, among other things.

Cyber security solutions

Deepfake detection tools can help. Such tools typically use a variety of deepfake identification techniques to prevent and mitigate the threats. These include deep learning algorithms, machine learning models and more.

Check Point Research (CPR) actively investigates emerging threats, including deepfakes, and the research informs Check Point’s robust security solutions, which are designed to combat deepfake-related risks.

To see how a Check Point expert views and prevents deepfakes, please see CyberTalk.org’s past coverage. Lastly, to receive cyber security thought leadership articles, groundbreaking research and emerging threat analyses each week, subscribe to the CyberTalk.org newsletter.

25 years of cybersecurity evolution: Insights from an industry veteran – CyberTalk

25 years of cybersecurity evolution: Insights from an industry veteran – CyberTalk

Eric has been working in technology for over 40 years with a focus on cybersecurity since the 90’s. Now serving primarily as Chief Cybersecurity Evangelist and part of the Executive Leadership Team, Eric has been with Atlantic Data Security starting from its inception, filling various roles across the company. He leverages this broad perspective along with his passion, collective experience, creative thinking, and empathetic understanding of client issues to solve and advocate for effective cybersecurity.

In this highly informative interview, Atlantic Data Security Evangelist Eric Anderson reflects on the past 25 years in cybersecurity, discusses important observations, and provides valuable recommendations for businesses worldwide.

In looking back across the past 25 years, what has “wowed” you the most in the field of cybersecurity? Why?

Eric: It’s often taken for granted now, but I used to be absolutely amazed at the pace of things. Not that it’s not still impressive, but I think we’ve all gotten a bit used to the speed at which technology evolves. It’s even more pronounced in our specific field. Cybersecurity may have a somewhat unique driver of innovation, since it’s largely pushed by illicit actors that are constantly searching for new threat vectors. Defenders are forced to invest in developing responses to keep up.

While all areas of tech evolve with amazing speed, most are driven by the constant gradual pressure of consumer desire. Meanwhile cybersecurity has a daily requirement for advancement due to the actions of external forces. We often have to take big leaps into entirely new product categories to respond to new risks.

Can you share insights into the early days of cybersecurity and how Atlantic Data Security was involved with the first firewall installations?

Eric:  My personal journey with Check Point started in the mid 90’s with one of Check Point’s early reseller partners. By 1998 or 1999, our business transitioned from being a network integrator/VAR to a dedicated security shop — primarily selling, installing, and supporting Check Point firewall and VPN solutions. Shortly after that, I became our second certified Check Point instructor to help handle the massive demand for training. I have continued to get more involved with all aspects of Check Point ever since (from the partner side), including taking the helm of the Check Point User Group back in 2014.

One of my favorite aspects of our current company is how many of us have known each other for decades; either working at the same company, as partners, or competitors, and how much of that history shares Check Point as a common thread.

My favorite example is with Kevin Haley, one of the owners of ADS. When I first met him in 2001, he had long since been running the security reseller division of a company called Netegrity. He had been focused primarily on selling and supporting Check Point products from back when their name was Internet Security Corporation — which had the distinction of being Check Point’s first partner in the U.S.

What are some of the key lessons learned via efforts around the first firewall installations and how do they inform cybersecurity strategies today?

Eric:  Back then, we were all learning a lot about security. Many of us had some comprehensive networking experience, but the extent of our “security” exposure was often just a handful of passwords. Our footprint was typically contained within a few buildings and maybe a small group of remote users.

It was amazing to see how rapidly the internet changed our security exposure from local to global. Almost overnight we had to start contending with an entirely new class threats. Forward-thinking companies like Check Point were there to give us the tools we needed, but we had to quickly grow from network engineers to cybersecurity experts. This rapid reshaping of the landscape has never really stopped. Every time things seem to settle down a bit, a new trend or technology, like cloud adoption or the shift to remote work, comes along to shake it up.

Ultimately, we need to remain agile and flexible. We can’t reliably predict the next big change we so need to have buffers in our planning. I think it goes beyond incident planning and is more something like “paradigm shift planning.” What resources do we have available for the next big thing? Having a good handle on current projects and priorities can allow for better optimization of resources.

We saw this with the adoption of VPN almost 30 years ago. Organizations were either using either modems and phone lines or slow, expensive direct connections, like frame relay and T1’s.  While VPN wasn’t a required shift, its was vastly better, reducing costs, improving speed, and enhancing security. Clients who were flexible enough to adopt VPN early reaped significant advantages. Others took much longer to adapt, having to deal with higher costs and more cumbersome operations throughout. While this wasn’t an essential shift to deal with an imminent threat, it clearly illustrated the advantages that organizations can gain by being flexible and the role of cybersecurity in enabling the business to function more broadly.

The CISO role is known for its evolution. Given all of the demands placed on modern CISOs (technology, people management, board-level commitments), does it still make sense to have a single CISO role? How do you foresee the role continuing to evolve? How would you like to see it evolve?

Eric: I recently spoke to a room full of CISOs and others serving similar roles. I asked them two questions: “Who among you will not be held responsible in the event of a breach?” No one raised their hand. “Who among you has all of the necessary power and resources to keep it from happening?” A few hands did go up; all from people working at smaller organizations with relatively flat hierarchies, allowing them more latitude and purview than we see in most mid-sized organizations or larger. But they all agreed that while CISOs bear the massive burden of cyber defense, they aren’t given the budget, staff, authority, or support to keep from buckling under it.

While I’d love to see the role of the CISO change, I fear that the broad interpretation of the title/term is unlikely to shift significantly.

What I really want to see is for security to become part of every department’s structure and culture. It would be great to have security officers within each department; from infrastructure, to desktops, to finance, especially in DevOps, and everywhere else. Those officers could be more in tune with their group’s specific drivers and needs, working closely with them to reach goals, with security as an overarching priority and mandate. A CISO’s role in that environment would be to globalize and unify security efforts across an organization.

I have seen things like this being done in some forward-thinking organizations. Making security a part of all aspects of an organization will only make it stronger.

Given the current pace of technological advancement, how do you anticipate that cybersecurity technology will evolve across the next decade? What are your thoughts about the role of artificial intelligence?

Eric:  That’s a loaded one! There are some clear areas that are already starting to show improvement. Tool consolidation and orchestration solutions have helped manage complexity more effectively than ever. As a field, we’re getting better at cultivating security-conscious cultures in our organization.

One major trend that I hope will continue is progress towards greater accountability. While GRC can feel overreaching and burdensome, when implemented properly, it grants us the freedom to share and use data. Our industry developed so quickly that it was impossible to put guardrails on it. If we look at a more mature industry like transportation or finance, they have rules and regulations that have evolved over a much longer time. While speed limits and safety inspections can seem restrictive, we largely accept them. It’s similar to how rules and regulations allow drivers to share roads with some degree of confidence that their safety isn’t in immediate jeopardy. Companies have repeatedly demonstrated that responsibility and accountability won’t be adopted voluntarily. Painful as they may seem, regulations and standards like PCI, HIPAA, and GDPR have shown some positive movement in this direction.

AI is proving to be an area where this type of governance is essential and welcomed by most. Not to be too flippant, but if science-fiction is any indicator of our potential non-fiction future, as it often is, unchecked, unregulated, unleashed AI could eventually be our downfall.

While it’s a very hot topic right now, and it will continue to reshape the world around us, I don’t subscribe to the idea that it will be a tool used primarily for either good or evil. Experience has shown me that every technological advancement has ultimately provided benefits to both the well-meaning and ill-intended. I may be overly optimistic, but I feel like both sides eventually find ways to leverage the same tools to effectively cancel each other out. One concern is the gap created as each side leverages new tech at a different rate. The time it takes to develop a response is nail-biting.

Another interesting yet frightening advancement may show up in the area of computational power; either true quantum computing or something close to it. As has always been the case, as stronger computing becomes available, it can be used both for data protection and compromise. While both keep pace with each other, a significant leap in computational power may lead to a downside that’s hard to counter: Data captured today, no matter how securely encrypted by today’s standards, would be trivial to crack tomorrow. It’s a major concern, and if I had the answer, I’d be off working up a business plan.

Are there specific threat vectors, such as supply chain vulnerabilities, that you expect to become more prevalent in the near future?

Eric:  I think the most prevalent vector will usually be closely tied to whatever our biggest weakness is. In an odd way, I hope that it continues to change — because that moving target means we’re successfully dealing with our biggest weaknesses, forcing threat actors to change tactics.

Specifically, I think DevOps is an area that needs major improvement — or at least more focus on security. This was recently underscored by a joint CISA/FBI alert urging executives at all levels to work harder to eliminate SQL injection related vulnerabilities.

Identity management and authentication is another area that needs more scrutiny. Weak credentials and unnecessarily elevated access continue to be a leading factors in security breaches. While MFA and stronger rights management can be inconvenient and challenging, they need to be embraced and adopted comprehensively. It’s that one, old, forgotten “test” account that will be exploited.

Back to my hopeful redefining of the CISO role, parts of an organization that don’t recognize security as an essential, integral priority, will continue to expose us. Security as an afterthought, applied with duct tape and followed by prayers, isn’t working.

If you were to select 1-2 meaningful highlights of your career, what would they be and what corresponding lessons can be shared with other cybersecurity professionals?

Eric:  It’s a tough question because I’ve been fortunate enough to have quite a few. I think the seminal moment, however, came as a teenager, before I was able to drive. While my summer job was not technical in nature, I spent a lot of time with our hardware technician. He happened to be out sick one day and I was asked if I could help a customer in need. Thus began a career in IT — once someone agreed to drive me to the customer’s office.

One broad highlight for me has been meeting new people. I’ve had the good fortune to get to know some amazing folks from all over the world, whether I was the one traveling or they were. Interactions with each and every one of them have shaped me into who I am, for better or worse. My advice in that area is not to pass up an opportunity to engage, and when given that chance, to check your ego at the door. My younger self always wanted to be the smartest person in the room. I’ve learned that, while maybe once or twice I was (or was allowed to believe I was), that gets boring and stressful. While I’m still often called on to share my knowledge, experience, opinions, and creative/wacky ideas, I revel in being able to listen and learn from others. I’m happy to be proven wrong as well, because once I have been, I’m more knowledgeable than I was before.

Do you have recommendations for CISOs regarding how to prioritize cybersecurity investments in their organizations? New factors to consider?

Eric:  I find myself repeatedly advising CISOs, not to get sucked into a knee-jerk replacement of technology. It’s easy to point fingers at products or solutions that aren’t “working.” Often, however, the failure is in the planning, execution, administration, or even buy-in. I cry a little on the inside when I learn about aggressive rip-and-replace initiatives that could have been salvaged or fixed for far less money and with much less grief. If the core problems aren’t addressed, the replacement could ultimately suffer the same fate.

I’ve also seen successfully aggressive marketing campaigns lead to impulse purchases of products that are either unnecessary or redundant because an existing solution had that unrealized, untapped capability.

The bottom line is to take comprehensive stock of what you have and to investigate alternatives to all-out replacement. Don’t level the house in favor of a complete re-build just because of a leaky pipe. Of course, if the foundation is collapsing…

Would you like to share a bit about your partnership with Check Point? What does that mean to your organization?

Eric:  Check Point is how I personally cut my teeth in cybersecurity, and therefore will always have a special place in my heart. But at Atlantic Data Security, I’m far from the only one with that long standing connection. It’s almost like Check Point is in our DNA.

Starting with the invention of the modern firewall, continuing for over 30 years of constant innovation, Check Point has been the most consistent vendor in the industry. Many players have come and gone, but Check Point has never wavered from their mission to provide the best security products. I’ve learned to trust their vision and foresight.

As a similarly laser-focused advisor and provider of security solutions and services to our clients, we have complete confidence that properly deployed and maintained Check Point solutions won’t let us or the client, down.

We work with a variety of vendors, providing us with the flexibility to solve client challenges in the most effective and efficient way possible. We always evaluate each need and recommend the optimal solution — based on many factors. Far more often than not, Check Point’s offerings, backed by their focus, research, and vision, prove to be the best choice.

Our commitment to and confidence in this has allowed us to amass an outstanding, experienced, technical team. Our unmatched ability to scope, plan, deploy, support, maintain, and train our clients on Check Point’s portfolio is leveraged by organizations of all types and sizes.

I’m confident that between ADS and Check Point, we’re making the cyber world a safer place.

Is there anything else that you would like to share with Check Point’s executive-level audience?

Cybersecurity is not one department’s responsibility. For every employee, every manager, every executive, and yes, even the entire C-cuite, cybersecurity is everyone’s responsibility.

Strategic patch management & proof of concept insights for CISOs – CyberTalk

Strategic patch management & proof of concept insights for CISOs – CyberTalk

Augusto Morales is a Technology Lead (Threat Solutions) at Check Point Software Technologies. He is based in Dallas, Texas, and has been working in cyber security since 2006. He got his PhD/Msc in Telematics System Engineering from the Technical University of Madrid, Spain and he is also a Senior Member of the IEEE. Further, he is the author of more than 15 research papers focused on mobile services. He holds professional certifications such as CISSP and CCSP, among others.

One of the burdens of CISO leadership is ensuring compliance with endpoint security measures that ultimately minimize risk to an acceptable business level. This task is complex due to the unique nature of each organization’s IT infrastructure. In regulated environments, there is added pressure to implement diligent patching practices to meet compliance standards.

As with any IT process, patch management requires planning, verification, and testing among other actions. The IT staff must methodically define how to find the right solution, based on system’s internal telemetry, processes and external requirements. A Proof of Concept (PoC) is a key element in achieving this goal. It demonstrates and verifies the feasibility and effectiveness of a particular solution.

In other words, it involves creating a prototype to show how the proposed measure addresses the specific needs. In the context of patch management, this “prototype” must provide evidence that the whole patching strategy works as expected — before it is fully implemented across the organization. The strategy must also ensure that computer resources are optimized, and software vulnerabilities are mitigated effectively.

Several cyber security vendors provide patch management, but there is no single one-size-fits-all approach, in the same way that there is for other security capabilities. This makes PoCs essential in determining the effectiveness of a patching strategy. The PoC helps in defining the effectiveness of patching strategy by 1) discovering and patching software assets 2) identifying vulnerabilities and evaluating their impact 3) generating reports for compliance and auditing.

This article aims to provide insights into developing a strategic patch management methodology by outlining criteria for PoCs.

But first, a brief overview of why I am talking about patch management…

Why patch management

Patch management is a critical process for maintaining the security of computer systems. It involves the application of functional updates and security fixes provided by software manufacturers to remedy identified vulnerabilities in their products. These vulnerabilities can be exploited by cyber criminals to infiltrate systems, steal data, or take systems hostage.

Therefore, patch management is essential to prevent attacks and protect the integrity and confidentiality of all users’ information. The data speaks for itself:

  • There are an average of 1900 new CVEs (Common Vulnerabilities and Exposures) each month.
  • 4 out of 5 cyber attacks are caused by software quality issues.
  • 50% of vulnerabilities are exploited within 3 weeks after the corresponding patch has been released.
  • On average, it takes an organization 120 days to remediate a vulnerability.

Outdated systems are easy targets for cyber attacks, as criminals can easily exploit known vulnerabilities due to extensive technical literature and even Proof-of-Concept exploits. Furthermore, successful attacks can have repercussions beyond the compromised system, affecting entire networks and even spreading to other business units, users and third parties.

Practical challenges with PoC patch management

When implementing patch management, organizations face challenges such as lack of visibility into devices, operating systems, and versions, along with difficulty in correctly identifying the level of risk associated with a given vulnerability in the specific context of the organization.
I’ll address some relevant challenges in terms of PoCs below:

1) Active monitoring: PoCs must establish criteria for quickly identifying vulnerabilities based on standardized CVEs and report those prone to easy exploitation based on up-to-date cyber intelligence.

2) Prioritization: Depending on the scope of the IT system (e.g. remote workers’ laptops or stationary PCs), the attack surface created by the vulnerability may be hard to recognize due to the complexity of internal software deployed on servers, end-user computers, and systems exposed to the internet.  Also, sometimes it is not practical to patch a wide range of applications with an equivalent sense of urgency, since it will cause bandwidth consumption spikes. And in case of errors, it will trigger alert fatigue for cyber security personnel. Therefore, other criteria is needed to identify and to quickly and correctly patch key business applications. This key detail has been overlooked by some companies in the past, with catastrophic consequences.

3) Time: To effectively apply a patch, it must be identified, verified, and checked for quality. This is why the average patch time of 120 days often extends, as organizations must balance business continuity against the risk of a cyber attack. The PoC process must have ways to collect consistent and accurate telemetry, and to apply compensation security mechanisms in case the patch process fails or cannot be completely rolled out because of software/OS incompatibility, drop in performance and conflict with existing endpoint controls (e.g. EDR/Antimalware). Examples of these compensation controls include: full or partial system isolation, process/socket termination and applying or suggesting security exclusions.

4) Vendor coordination: PoCs must ensure that software updates will not introduce new vulnerabilities. This situation has happened in the past. As an example, CVE-2021-30551 occurred in the Chrome Browser, where the fix inadvertently opened up another zero-day vulnerability (CVE-2021-30554) that was exploited in the wild.

Another similar example is Apple IOS devices with CVE-2021-1835, where this vulnerability re-introduced previously fixed vulnerabilities by allowing unauthorized user access to sensitive data, without the need for any sophisticated software interaction. In this context, a PoC process must verify the ability to enforce a defense in depth approach by, for example, applying automatic anti-exploitation controls.

Improving ROI via consolidation – The proof is in the pudding?

In the process of consolidating security solutions, security posture and patch management are under continuous analysis by internal experts. Consolidation aims to increase the return on investment (ROI).

That said, there are technical and organizational challenges that limit the implementation of a patch and vulnerability management strategy under this framework, especially for remote workers. This is because implementing different solutions on laptops, such as antimalware, EDR, and vulnerability scanners, requires additional memory and CPU resources that are not always available. The same premise applies to servers, where workloads can vary, and any unexpected increase or latency in service can cause an impact on business operations. The final challenge is software incompatibility that, together with legacy system usage, can firmly limit any consolidation efforts.

Based on the arguments above, consolidation is feasible and true after demonstrating it by the means of a comprehensive PoC. The PoC process should validate consolidation via a single software component a.k.a. endpoint agent and a single management platform. It should help cyber security practitioners to quickly answer common questions, as described below:

  • How many critical vulnerabilities exist in the environment? What’s the breakdown?
  • Which CVEs are the most common and what are their details?
  • What is the status of a specific critical CVE?
  • What’s the system performance? What/how it can be improved?
  • How does threat prevention works in tandem with other security controls? Is containment possible?
  • What happens if patching fails?

Failure in patch management can be catastrophic, even if just a small percentage fail. The PoC process must demonstrate emergency mitigation strategies in case a patch cannot be rolled out or assets are already compromised.

Managing this “mitigation” could limit the ROI, since extra incident response resources could be needed, which may involve more time, personnel and downtime. So, the PoC should demonstrate that the whole patch management will maintain a cyber-tolerance level that could be acceptable in conjunction with the internal business processes, the corresponding applicable regulations, and economic variables that keep the organization afloat.

Check Point Software Technologies offers Harmony Endpoint, a single agent that strengths patch management capabilities and hence, minimizes risks to acceptable levels. It also provides endpoint protection with advanced EPP, DLP, and XDR capabilities in a single software component, ensuring that organizations are comprehensively protected from cyber attacks while simplifying security operations and reducing both costs and effort.

CISA employees impersonated by phone scammers – CyberTalk

CISA employees impersonated by phone scammers – CyberTalk

EXECUTIVE SUMMARY:

Earlier today, the Cybersecurity and Infrastructure Security Agency (CISA) reported that cyber criminals are impersonating its employees. In CISA’s own words, the agency is aware of “recent impersonation scammers claiming to represent the agency.”

What happened

Scammers placed phone calls to unsuspecting professionals, claiming to represent CISA and to be relaying an urgent message pertaining to a security vulnerability. The scammers ultimately intended for victims to transfer financial resources to external accounts.

This cyber sliminess reflects a broader trend. Cyber criminals are now trying to cover for their scams by weaponizing government employees’ names and titles.

CISA’s response

For its part, CISA notes that staff will never contact anyone in order to request money – whether that’s wired, cash, cryptocurrency or use of gift cards. It will also never instruct people to keep phone-based discussions secret.

Impersonation scams

In 2023, Americans reported more than $1.4 billion in financial losses due to impersonation scams, according to the Federal Trade Commission. That’s a 3X increase over the reported estimate from 2020.

Some scammers are now impersonating more than one organization in a single scam. In theory, a scammer might impersonate CISA, and then offer to transfer you to a fake FBI or Federal Trade Commission employee, for fake assistance.

Best practices

Even the pros can fall victim to scams, especially those that involve impersonation of CISA contacts. In the event that you find yourself on the receiving end of a CISA scam call, write down the phone number though which the call came in and follow standard procedure – immediately hang up.

Afterwards, call CISA to have the agency validate the phone number (844-729-2472) or report the scam attempt to law enforcement.

Protect your organization

  • To safeguard your organization from cyber scams, provide employees with training around phishing attempts, which can occur via phone, text or email.
  • Also, since scammers are commonly after valuable assets or the money itself, establish clear protocols for verifying any requests for sensitive information or financial transfers.
  • Beyond that, ensure that your organization leverages the latest email security solutions and advanced threat prevention technologies. Learn more here.

Scam insights

For more insights into the latest cyber scams, see CyberTalk.org’s past coverage:

  • Discover how hackers tried to scam this Check Point cyber security professional – click here
  • Get details about the latest 401(k) scams – click here
  • Read about how hundreds of people were rescued from cyber scam factories – click here

Lastly, to receive cyber security thought leadership articles, groundbreaking research and emerging threat analyses each week, subscribe to the CyberTalk.org newsletter.

Elevate your cyber security with Check Point Infinity – CyberTalk

Elevate your cyber security with Check Point Infinity – CyberTalk

EXECUTIVE SUMMARY:

In the absence of the right precautions, cyber attacks can prove devastating. Like an unexpected and intense tropical hurricane, a cyber attack can upend the foundations of everything that an organization has built, displacing the valuable, requisite components that served as the lifeblood of organizational endeavors.

As with natural disaster preparedness, cyber disaster preparedness can keep what matters secure (and operational), despite severe threats. In this article, discover how Check Point Infinity can reduce risk exposure and elevate an organization’s cyber security posture.

To learn more, keep reading…

Centralized visibility across environments

Traditional security solutions commonly provide partial views of what’s happening across an environment, forcing security admins to shuffle between screens and to cross-check information.

Advanced security solutions, like Check Point Infinity, present a centralized, consolidated view of all environment components — networks, endpoints and clouds.

Easy-to-understand, single-pane-of-glass visibility enables cyber security teams to get to the heart of an issue quickly. As a result, teams can tackle the issue in a timely manner, and potentially prevent the issue from escalating.

AI-driven threat detection & automated response

The Check Point Infinity platform is powered by advanced analytics, machine learning and artificial intelligence. To that effect, the solution can identify and respond to threats in real-time. This not only reduces the impact of attacks on an organization, but also lowers the corresponding costs.

Streamlined security policy management & integration

Check Point Infinity’s automated policy management ensures that organizations maintain consistent, up-to-date security policies across environments. This eliminates potential errors associated with manual configurations, optimizing operational efficiency while improving cyber security.

Further, Check Point Infinity’s seamless integration with third-party solutions allows teams to continue to make use of existing security investments while simultaneously deploying (and benefiting from) advanced capabilities.

Robust compliance & reporting

Organizations across industries need to keep up with compliance mandates. The Check Point Infinity solution offers extensive reporting and compliance-friendly features. In turn, organizations can easily demonstrate compliance to relevant authorities.

Ahead of evolving threats

Because of Check Point’s commitment to providing cutting-edge technologies, organizations that use Check Point Infinity will consistently find themselves at the forefront of cyber security innovation.

Dedicated support & training resources

Check Point recognizes that successful cyber security goes beyond just deploying advanced technology solutions — that’s why Check Point Infinity is supported by a team of highly skilled professionals who can provide comprehensive assistance and training materials.

From initial deployment and configuration to ongoing maintenance and optimization, Check Point’s experts are available to ensure that organizations can fully leverage the capabilities of Check Point Infinity, maximizing the return on the investment.

Further information

When it comes to preventing advanced cyber threats, take a more proactive stance. Prepare for what’s next with the power of artificial intelligence and machine learning. Get detailed information about Check Point Infinity here.

Plus, read this informative expert interview about “Platformization”. Lastly, to receive cyber security thought leadership articles, groundbreaking research and emerging threat analyses each week, subscribe to the CyberTalk.org newsletter.