muninn.ai - kn

Posts about:

Cybersecurity Strategy

NDR and EDR: Complementary Pillars of a Robust Cybersecurity Strategy

NDR vs EDR: Complementary Pillars of a Robust Cybersecurity Strategy

The increasing number of endpoints is becoming more evident within organizations, extending beyond the conventional landscape of end-user computing devices like laptops and workstations. The rise in remote work culture has significantly amplified the demand to safeguard and supervise an array of endpoints, as well as the interactions among them across our broad digital ecosystems. Given that these endpoints persist as prominent gateways for cyberthreats, establishing robust endpoint security strategies has become an indispensable business requirement. However, it prompts an important question: Is Endpoint Detection the sole reliable tool within our cybersecurity tool kit?

Read More

Are We Losing it ? - Recent Statistics on Data Breach  

Are We Losing it?  

Recent statistics on data breach    

  • 83% of organizations had more than one data breach in 2022.  
  • 82% of all breaches involved ‘the human element’ (the use of stolen credentials, phishing, misuse or human error) in 2022  
  • Approximately 47% of all cybersecurity incidents involved Personally Identifiable Information (PII), 46% of involved Authentication Credentials and 7% involved Payment Card Data.  
  • 60% of data breaches lead to increases in prices passed on to customers in 2022.  
  • The global average cost of a data breach was $4.35M USD in 2022.  
  • Approximately 814,000 phishing websites were created in 2022.  

Source: https://www.tekspace.com.au/blog/cyber-security-stats-2022/

Read More

The Cybersecurity Cat-and-Mouse Game: How to Outsmart Hackers with Threat Hunting

The Cybersecurity Cat-and-Mouse Game: How to Outsmart Hackers with Threat Hunting

A Threat Hunting Overview

Threat hunting: the art and science of tracking down hidden cyber threats lurking within your organization's network. These malicious footprints are left behind by hackers as they carry out illegal activities, whether it's on a compromised machine or via remote-controlled platforms. In some cases, it can be hard to detect them, and stealthy attackers are able to hide within networks for weeks, if not months. An astonishing 83% of organizations had more than one data breach in 2022 and approximately 47% of all cybersecurity incidents involved Personally Identifiable Information (PII) stolen by cybercriminals.

Read More