Quantum Readiness, Zero-Day Attacks and AI: The Week in CyberSEC
Home > Cybersecurity > Weekly Roundups

Quantum Readiness, Zero-Day Attacks and AI: The Week in CyberSEC

Photo by:   Free pik
Share it!
Diego Valverde By Diego Valverde | Journalist & Industry Analyst - Thu, 11/21/2024 - 13:14

As quantum computing gains momentum, Palo Alto Networks urges organizations to prepare for the future, emphasizing the need for quantum readiness strategies to mitigate risks and capitalize on opportunities. In the United States, cybersecurity leadership shifts with CISA Director Jen Easterly’s departure in January 2025, signaling potential changes in national cybersecurity priorities. Meanwhile, Apple’s rapid response to fix critical vulnerabilities in its Mac systems underscores the ongoing battle against zero-day threats. 

MBN experts from Splunk and Trellix discuss pioneering adaptive cybersecurity solutions to address evolving threats, with Splunk enabling data-driven security strategies and Trellix spearheading advanced detection technologies. Lastly, the rise of fake job offers exploiting vulnerable job seekers highlights the growing sophistication of cybercriminals, driving companies like CYBER 2.0 to enhance defenses with AI-powered, zero-trust models. 

This is your Cybersecurity Weekly Roundup!

News

Quantum Readiness Key in 2025 Cybersecurity: Palo Alto Networks

Palo Alto Networks anticipates that organizations will need to start implementing quantum readiness strategies to address future risks and take advantage of the opportunities brought by this emerging technology. "The increasing use of artificial intelligence in cybersecurity and other business operations requires immense computational power, which significantly increases energy consumption and carbon emissions," said Haider Pasha, Chief Security Officer, Palo Alto Networks, EMEA and LATAM.

CISA Director Jen Easterly to Depart January 2025

Jen Easterly, the current director of the US Cybersecurity and Infrastructure Security Agency (CISA), is set to leave her post when President-elect Donald Trump assumes office in January 2025. Deputy Director Nitin Natarajan will also depart, alongside other appointments made during the Biden Administration.

Apple Releases Update to Fix Security Vulnerabilities

Apple has issued a software update for affected devices and its browser after identifying and patching two "zero-day" security vulnerabilities that primarily impacted Mac systems based on Intel processors. The company recommended that users update their systems as soon as possible to mitigate exploitation risks.

MBN Expert Contributions

Agile Data Solutions Enhance Real-Time Visibility, Security

As Mexico accelerates its shift to hybrid infrastructures fueled by cloud adoption and AI, real-time visibility and robust security are becoming paramount. Omar Pérez, Splunk’s Regional Sales Director, highlights the company's pivotal role in transforming sectors like finance, retail, and industry with data-driven solutions. Through leveraging AI and machine learning, Splunk is empowering businesses to unlock operational efficiency and enhance cybersecurity, positioning itself as a key player in navigating Mexico's digital evolution.

Modern Business Threats Require Adaptive Solutions

Trellix is reshaping Mexico's cybersecurity landscape by addressing evolving threats with tailored solutions and robust technologies like Extended Detection and Response (XDR), says Erika Urbina, Trellix Country Manager in Mexico. With a 47.7% increase in cybersecurity incidents in 2024, Trellix is driving innovation through automation, machine learning, and partnerships, while also tackling challenges like internal threats and talent shortages. By combining advanced detection, network segmentation, and targeted training, the company is equipping businesses to adapt to an increasingly complex digital environment.

Beware: Fake Job Offers Spreading Malware

Cybercriminals are exploiting job seekers with fake job offers and interview requests designed to spread malware. Disguised as legitimate recruitment files or video-conferencing tools, these scams can lead to data theft, financial loss, and compromised systems. Tactics include malicious downloads, cloned websites, and zero-day vulnerabilities. Companies like CYBER 2.0 are stepping up with AI-driven, zero-trust cybersecurity solutions to detect and block these evolving threats, protecting users and networks from devastating attacks.

Photo by:   Free pik

You May Like

Most popular

Newsletter