<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/">
	<channel>
		<title>QA &amp; Cybersecurity Team Director</title>
		<atom:link href="https://infinum.com/blog/author/neven-matas/feed/" rel="self" type="application/rss+xml" />
		<link></link>
		<description>Building digital products</description>
		<lastBuildDate>Fri, 24 Apr 2026 14:02:14 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>

					<item>
				<image>
					<url>19274676https://infinum.com/uploads/2026/01/img-CRA-hero-min.webp</url>
				</image>
				<title>Cyber Resilience Act: How to Prepare Your Digital Products for EU Compliance</title>
				<link>https://infinum.com/blog/cyber-resilience-act/</link>
				<pubDate>Wed, 28 Jan 2026 13:11:44 +0000</pubDate>
				<dc:creator>Neven Matas</dc:creator>
				<guid isPermaLink="false">https://infinum.com/?p=19274676</guid>
				<description>
					<![CDATA[<p>The clock’s ticking: the Cyber Resilience Act brings strict security rules across your product’s lifecycle.</p>
<p>The post <a href="https://infinum.com/blog/cyber-resilience-act/">Cyber Resilience Act: How to Prepare Your Digital Products for EU Compliance</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</description>
				<content:encoded>
					<![CDATA[<div
	class="wrapper"
	data-id="es-238"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-92">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-95"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-93">
	<p	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-94'
	>
	<strong><strong><strong>If your company builds or sells software and connected devices in the EU, the new Cyber Resilience Act is something you need to pay close attention to. CRA introduces enforceable secure-by-design requirements across the entire product lifecycle. Here’s what product leaders and engineering teams should know to get ahead of compliance</strong></strong></strong>.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-98"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-96">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-97'
	>
	Remember the <a href="https://thehackernews.com/2024/09/new-raptor-train-iot-botnet-compromises.html" target="_blank" rel="noreferrer noopener">Raptor Train</a>? </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-101"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-99">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-100'
	>
	A botnet of more than 200,000 compromised connected devices hijacked through unpatched vulnerabilities and insecure defaults, not because those companies lacked internal security policies, but because the products themselves were never designed or maintained with long-term security in mind. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-104"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-102">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-103'
	>
	This kind of <a href="https://infinum.com/enterprise-cyber-risk-management/" id="https://infinum.com/enterprise-cyber-risk-management/">large-scale product risk</a> is exactly what the EU’s <a href="https://digital-strategy.ec.europa.eu/en/policies/cyber-resilience-act" target="_blank" rel="noreferrer noopener">Cyber Resilience Act</a> (CRA) is meant to address, especially given the fact some estimates claim there are <a href="https://iot-analytics.com/number-connected-iot-devices/" target="_blank" rel="noreferrer noopener">nearly 21 billion connected</a><a href="https://iot-analytics.com/number-connected-iot-devices/"> devices in the world today.</a></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-107"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-105">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-106'
	>
	So, let&#8217;s dig into how the CRA addresses the <a href="https://infinum.com/blog/secure-iot-connectivity/" target="_blank" rel="noreferrer noopener">security of the connected devices</a>. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-110"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-108">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-109'
	>
	<strong>What is Cyber Resilience Act?&nbsp;</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-113"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-111">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-112'
	>
	CRA is one of the most significant shifts in digital product regulation in years that sets mandatory cybersecurity requirements for digital products sold in the European market.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-116"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-114">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-115'
	>
	While <a href="https://infinum.com/blog/eu-cybersecurity-legislation-nis2-dora/" target="_blank" rel="noreferrer noopener">NIS2 and DORA</a> regulate how organizations operate, CRA regulates what certain organizations build. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-119"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-117">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-118'
	>
	It applies to nearly any “product with digital elements” (PDE) &#8211; <em>a software or hardware product and its remote data processing solutions, including software or hardware components being placed on the market separately.</em></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-122"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-120">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-121'
	>
	For product leaders, engineering teams, and security owners shipping digital products to the EU market, CRA will change how <a href="https://infinum.com/blog/ssdlc-application-security/" target="_blank" rel="noreferrer noopener">products are planned, developed, released, and maintained</a>.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-124"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-123'
	>
	<strong>CRA is part of a broader EU push to raise digital resilience, reaching deep into how products are built. It requires teams to think long-term, architect for security, and maintain products responsibly.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-127"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-125">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-126'
	>
	In other words, cybersecurity is no longer a “launch and forget” problem. It’s a product discipline.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-130"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-128">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-129'
	>
	<strong>What CRA actually requires</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-133"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-131">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-132'
	>
	At its core, CRA turns <a href="https://infinum.com/cybersecurity/" id="https://infinum.com/cybersecurity/">cybersecurity</a> into a product safety requirement. To sell in the EU, a product must meet baseline security expectations throughout its lifecycle. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-136"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-134">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-135'
	>
	That includes:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-139"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-137">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-138'
	>
	<strong>Secure-by-design and secure-by-default</strong></h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-142"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-140">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-141'
	>
	You must perform <a href="https://infinum.com/enterprise-cyber-risk-management/" id="https://infinum.com/enterprise-cyber-risk-management/">risk assessments</a> early, design with security controls, strong configuration, authentication, and encryption in mind, <a href="https://infinum.com/cybersecurity/red-teaming/" id="https://infinum.com/cybersecurity/penetration-testing/">test for vulnerabilities</a>, and avoid shipping known exploitable vulnerabilities.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-145"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-143">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-144'
	>
	<strong><strong><strong>Transparent components</strong></strong></strong></h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-148"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-146">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-147'
	>
	The <a href="https://infinum.com/blog/software-supply-chain-security/" target="_blank" rel="noreferrer noopener">supply chain</a> is widely recognized as a significant cybersecurity risk today. Any included libraries, open-source packages, third-party modules, or firmware components must be documented and traceable through a Software Bill of Materials (SBOM). Managing these third-party components systematically, beyond just documentation, is what a <a href="https://infinum.com/third-party-cyber-risk-management/" id="https://infinum.com/third-party-cyber-risk-management/">third-party cyber risk management</a> framework is built for.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-151"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-149">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-150'
	>
	<strong><strong><strong><strong><strong>Vulnerability management and long-term updates</strong>secure-by-default</strong></strong></strong></strong></h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-154"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-152">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-153'
	>
	Manufacturers must document and patch newly discovered vulnerabilities and maintain security updates &#8211; typically for five years or for the expected lifespan of the product, all the while keeping up transparent communication towards their customers.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-157"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-155">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-156'
	>
	<strong><strong><strong><strong><strong><strong><strong><strong><strong>Clear reporting obligations</strong></strong></strong></strong></strong></strong></strong></strong></strong></h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-160"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-158">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-159'
	>
	Actively exploited vulnerabilities and severe incidents must be reported quickly (24h early warning, 72h detailed report).</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-163"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-161">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-162'
	>
	<strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong>Conformity assessment and CE marking</strong></strong></strong></strong></strong></strong></strong></strong></strong></strong></strong></h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-166"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-164">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-165'
	>
	Before you place a product on the EU market, you’ll need an internal or third-party assessment and to affix CE marking demonstrating compliance. Non-compliance can lead to fines up to €15M or 2.5% of global turnover and prohibiting the sales of products that do not meet mandatory requirements.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-173"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-167"
	 href='https://infinum.com/cybersecurity/#ssdlc'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<p	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-168'
	>
	<strong>Want to strengthen the security of systems already in production?</strong></p>		</div>

		<p	class='typography typography--size-16-text-roman js-typography card-simple__paragraph'
	data-id='es-169'
	 id='es-167-paragraph'>
	Our team combines decades of deep development and security expertise to integrate security across every stage of your software lifecycle.</p><button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-170"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-171'
	>
	<strong>Make security your default</strong></div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-172'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-176"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-174">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-175'
	>
	<strong>Who is impacted?</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-179"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-177">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-178'
	>
	CRA applies to the entire digital-product ecosystem:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-182"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-180">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-181'
	>
	<li>IoT and hardware device makers</li><li>Software vendors</li><li>Distributors and importers</li><li>Any company bundling or integrating products with digital elements into larger systems</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-184"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-183'
	>
	<strong>This makes CRA relevant for startups, scale-ups, enterprise vendors, and sometimes even agencies that build software on behalf of clients. However, not all products face the same burden. </strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-187"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-185">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-186'
	>
	CRA classifies products by risk level, so higher-risk products (e.g., identity systems, password managers, browsers, network equipment, industrial devices) require independent conformity assessments, while lower-risk products can rely on self-assessment.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-190"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-188">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-189'
	>
	Additionally, not every digital product falls under the scope of the CRA, it mostly focuses on consumer products.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-193"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-191">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-192'
	>
	Standalone websites and cloud services are exempt when they are not used to enable or operate a product with digital elements, as is non-commercial open-source software. Products that are already regulated under dedicated EU sector frameworks are also excluded. Organisations in the UK defence sector face parallel obligations under <a href="https://infinum.com/blog/cyber-security-model-v4/">Cyber Security Model v4</a>, which mandates cybersecurity controls for all MOD suppliers independently of CRA.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-196"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-194">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-195'
	>
	For more details on the above, the recently released <a href="https://eur-lex.europa.eu/eli/reg_impl/2025/2392/oj/eng" target="_blank" rel="noreferrer noopener">CRA implementing act</a> contains technical descriptions related to important and critical products.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-199"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-197">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-198'
	>
	<strong>Key dates</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-202"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-200">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-201'
	>
	<li><strong>June 2026:</strong> Member states designate Conformity Assessment Bodies.</li><li><strong>September 2026:</strong> Vulnerability reporting obligations become mandatory.</li><li><strong>December 2027: </strong>Full CRA compliance required for all products.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-205"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-203">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-204'
	>
	<strong><strong>The biggest CRA challenges ahead</strong></strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-208"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-206">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-207'
	>
	Based on <a href="https://infinum.com/blog/cybersecurity-trends-2026/" target="_blank" rel="noreferrer noopener">the current cybersecurity trends</a> and how most companies ship software today, CRA will expose several weaknesses:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-212"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--black block-bullet__bullet" data-id="es-209">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-24-text js-typography bullet__heading'
	data-id='es-210'
	>
	<strong>Lack of structured security in the software development lifecycle (SDLC</strong>)</p><p	class='typography typography--size-16-text-roman js-typography bullet__paragraph'
	data-id='es-211'
	>
	Many organizations don’t perform threat modeling or security architecture reviews, and now they must.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-216"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--black block-bullet__bullet" data-id="es-213">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-24-text js-typography bullet__heading'
	data-id='es-214'
	>
	<strong><strong>Poor dependency visibility</strong></strong></p><p	class='typography typography--size-16-text-roman js-typography bullet__paragraph'
	data-id='es-215'
	>
	Most teams don’t track all libraries, components, and vulnerabilities. Without an SBOM, CRA compliance becomes nearly impossible.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-220"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--black block-bullet__bullet" data-id="es-217">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-24-text js-typography bullet__heading'
	data-id='es-218'
	>
	<strong><strong><strong>Unclear maintenance and update plans</strong></strong></strong></p><p	class='typography typography--size-16-text-roman js-typography bullet__paragraph'
	data-id='es-219'
	>
	If you ship a connected device without a realistic long-term patching strategy and SLA, CRA will flag it as unsafe.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-224"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--black block-bullet__bullet" data-id="es-221">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-24-text js-typography bullet__heading'
	data-id='es-222'
	>
	<strong><strong><strong><strong>Missing incident-response playbooks</strong></strong></strong></strong></p><p	class='typography typography--size-16-text-roman js-typography bullet__paragraph'
	data-id='es-223'
	>
	The tight 24/72-hour reporting timelines require <a href="https://infinum.com/governance-risk-compliance-services/" id="https://infinum.com/governance-risk-compliance-services/">formal workflows, roles, documentation</a>, and monitoring.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-227"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-225">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-226'
	>
	<strong>How we help companies become CRA-ready</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-230"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-228">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-229'
	>
	At Infinum, we work with organizations to build digital products that are secure by design &#8211; and now, compliant by design. Our cybersecurity offering supports CRA readiness across the product lifecycle, from threat modeling and secure architecture all the way to continuous monitoring and long-term maintenance planning.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-233"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-231">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-232'
	>
	CRA compliance isn’t just about meeting legal obligations; it’s about earning and maintaining customer trust in an increasingly competitive market by building safer, more reliable products.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-236"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-234">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-235'
	>
	<span class='screen-reader-text'>Most teams don’t know where they stand today, so reach out for a CRA gap analysis or product security review to close the gaps before regulation becomes a blocker.</span><span aria-hidden='true'><em>Most teams don’t know where they stand today, so </em><a href="https://infinum.com/cybersecurity/#form"><em>reach out for a CRA gap analysis or product security review</em></a><em> to close the gaps before regulation becomes a blocker.</em></span></p></div>	</div>
</div>
</div>		</div>
	</div><p>The post <a href="https://infinum.com/blog/cyber-resilience-act/">Cyber Resilience Act: How to Prepare Your Digital Products for EU Compliance</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</content:encoded>
			</item>
					<item>
				<image>
					<url>19273701https://infinum.com/uploads/2025/12/img-CS-trends-2026-min-1.webp</url>
				</image>
				<title>Cybersecurity Trends 2026 Explained: AI Threats, Compliance, and Operational Resilience</title>
				<link>https://infinum.com/blog/cybersecurity-trends-2026/</link>
				<pubDate>Thu, 18 Dec 2025 11:20:15 +0000</pubDate>
				<dc:creator>Neven Matas</dc:creator>
				<guid isPermaLink="false">https://infinum.com/?p=19273701</guid>
				<description>
					<![CDATA[<p>Cybersecurity in 2026 is all about AI-driven attacks, stricter global regulations, and supply chain exposure – here's how to stay ahead.</p>
<p>The post <a href="https://infinum.com/blog/cybersecurity-trends-2026/">Cybersecurity Trends 2026 Explained: AI Threats, Compliance, and Operational Resilience</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</description>
				<content:encoded>
					<![CDATA[<div
	class="wrapper"
	data-id="es-474"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-239">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-242"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-240">
	<p	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-241'
	>
	<strong><strong>Cybersecurity in 2026 is no longer about what’s coming next, but about managing what’s already here. AI-driven attacks, stricter global regulations, supply chain exposure – here&#8217;s how to stay ahead when compromise is no longer hypothetical.</strong></strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-245"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-243">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-244'
	>
	<em>It’s 8 a.m. Your company’s email system goes down. </em></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-248"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-246">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-247'
	>
	<em>Minutes later, a poisoned update floods your development pipeline, silently embedding malware into every product your team touches. </em></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-251"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-249">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-250'
	>
	<em>AI-generated phishing emails land in employees’ inboxes, flawlessly mimicking the voices of their managers.</em></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-254"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-252">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-253'
	>
	<em>Customer data, vendor credentials, and financial records are exposed before anyone even realizes an attack has begun.</em></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-257"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-255">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-256'
	>
	This is no longer science fiction.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-260"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-258">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-259'
	>
	Many of the <a href="https://infinum.com/blog/cybersecurity-trends-2025/">trends we predicted in 2025</a> &#8211; large breaches, ransomware waves, rising supply-chain compromises, and AI-enabled cyber attacks have fully materialized.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-263"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-261">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-262'
	>
	What was once the future of cybercrime is now simply the present. Here’s what that means as we step into 2026.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-266"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-264">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-265'
	>
	<strong>Regulations are still driving change</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-269"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-267">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-268'
	>
	In 2026, <a href="https://infinum.com/cybersecurity/nis2-compliance-services/" id="https://infinum.com/cybersecurity/nis2-compliance-services/">cybersecurity regulations</a> are moving toward greater global convergence and stricter enforcement. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-272"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-270">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-271'
	>
	Key developments include the EU’s<strong> </strong><a href="https://infinum.com/blog/eu-cybersecurity-legislation-nis2-dora/" target="_blank" rel="noreferrer noopener"><strong>NIS2 Directive</strong></a> for critical entities and the EU <strong><a href="https://infinum.com/blog/cyber-resilience-act/" target="_blank" rel="noreferrer noopener">Cyber Resilience Act (CRA)</a></strong>, which mandates security for products with digital elements and reporting obligations starting September 11, 2026. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-275"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-273">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-274'
	>
	Across the Atlantic, the U.S. <strong>Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) </strong>is coming into force, requiring rapid reporting of cyber incidents and ransomware payments.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-277"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-276'
	>
	Compliance is becoming a key driver of change in modern organizations, as businesses increasingly focus on <a href="https://infinum.com/enterprise-cyber-risk-management/" id="https://infinum.com/enterprise-cyber-risk-management/">enhanced risk management</a>, supply chain security, employee training, and transparent incident reporting to meet board-level obligations and avoid significant penalties. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-280"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-278">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-279'
	>
	Turning regulatory requirements into something teams can actually operate requires clear ownership, realistic controls, and alignment with how the business works. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-287"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-281"
	 href='https://infinum.com/cybersecurity/#governance'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<p	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-282'
	>
	Infinum’s GRC services help organizations design and run security governance that meets NIS2, DORA, and CRA obligations without slowing teams down.</p>		</div>

		<p	class='typography typography--size-16-text-roman js-typography card-simple__paragraph'
	data-id='es-283'
	 id='es-281-paragraph'>
	Whether you need hands-on policy work, certification support, regulatory compliance, or incident readiness, our experts bring clarity, structure, and practical guidance that lasts.</p><button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-284"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-285'
	>
	<strong>Build security governance that works</strong></div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-286'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-290"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-288">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-289'
	>
	<strong>AI still on both sides of the fence</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-293"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-291">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-292'
	>
	Artificial intelligence has become both the sword and the shield.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-296"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-294">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-295'
	>
	Threat actors now rely on AI to scale phishing operations, localize social engineering campaigns at speed, evade detection by generating polymorphic malware, and automate reconnaissance across massive attack surfaces.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-299"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-297">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-298'
	>
	<a href="https://www.anthropic.com/news/disrupting-AI-espionage" target="_blank" rel="noreferrer noopener">Anthropic’s article on the first AI-orchestrated campaign</a><em> </em>says that this marks a pivotal shift in cybersecurity, highlighting the emergence of <a href="https://infinum.com/artificial-intelligence/agent-development/" id="https://infinum.com/artificial-intelligence/agent-development/">AI agents</a> – systems that can be run autonomously for long periods of time and that complete complex tasks largely independent of human intervention.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-304"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="blockquote block-blockquote__blockquote" data-id="es-300">
	
	<div class="blockquote__content">
		<i
	class="icon blockquote__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='blockquote-24' data-id='es-301'>
	<svg fill='none' height='24' viewBox='0 0 24 24' width='24' xmlns='http://www.w3.org/2000/svg'><path clip-rule='evenodd' d='m12 24c6.6274 0 12-5.3726 12-12 0-2.79685-.9568-5.37021-2.561-7.41062-.581.22951-1.0832.60583-1.5069 1.12898-.5132.60844-.7698 1.41969-.7698 2.43375v.07605h2.5789v5.59004h-5.6197v-5.01962c0-1.11547.154-2.06616.4619-2.85205.3336-.81125.757-1.48307 1.2702-2.01545.528-.52161 1.1175-.92155 1.7687-1.1998-2.0728-1.70651-4.7279-2.73128-7.6223-2.73128-6.62742 0-12 5.37258-12 12 0 6.6274 5.37258 12 12 12zm-3.53811-18.05347c-.30793.78589-.46189 1.73658-.46189 2.85205v5.01962h5.6197v-5.59004h-2.5789v-.07605c0-1.01406.2566-1.82531.7698-2.43375.5389-.63379 1.1804-1.05209 1.9245-1.2549v-2.28164c-.7441.07605-1.4626.25351-2.1555.53238-.6928.27887-1.3086.68449-1.84752 1.21688-.51321.53238-.9366 1.2042-1.27019 2.01545z' fill='currentColor' fill-rule='evenodd'/></svg></i><p	class='typography typography--size-36-text js-typography blockquote__quote'
	data-id='es-302'
	>
	<strong><strong><em>“Agents are valuable for everyday work and productivity – but in the wrong hands, they can substantially increase the viability of large-scale cyberattacks.”</em></strong></strong></p>
		<div class="blockquote__caption-wrap">
					</div>
	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-307"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-305">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-306'
	>
	Deepfakes, voice cloning, and identity fraud also became mainstream tools for deception, with deepfakes in particular growing increasingly difficult to detect. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-310"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-308">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-309'
	>
	The result is what many organizations now recognize as a <strong>crisis of authenticity </strong>&#8211; verifying identity, intent, and digital trust has never been harder.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-313"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-311">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-312'
	>
	At the same time, a new risk category has emerged: <strong>attacks targeting AI systems themselves</strong>. Data and model poisoning, prompt injection, model extraction, and compromised AI pipelines are becoming real concerns. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-315"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-314'
	>
	As AI begins influencing security decisions, operations, customer interactions, and even automated business workflows, its integrity and trustworthiness become mission-critical. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-318"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-316">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-317'
	>
	Protecting AI systems is now inseparable from protecting core infrastructure.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-321"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-319">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-320'
	>
	<strong>On the defensive side</strong>, organizations are increasingly deploying AI-powered security operations platforms and <a href="https://cloud.google.com/blog/products/identity-security/the-dawn-of-agentic-ai-in-security-operations-at-rsac-2025">agentic SOC</a> tooling to process behavioral alerts, correlate signals, and accelerate incident response.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-324"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-322">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-323'
	>
	AI now plays a central role in threat detection, analysis, and automated containment, helping defenders simply keep up with the scale of modern attack activity.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-327"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-325">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-326'
	>
	<strong><strong>The rise of vibe coding and the speed-security tradeoff</strong></strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-330"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-328">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-329'
	>
	We’re not done with AI quite yet.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-333"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-331">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-332'
	>
	AI-assisted development has transformed how software is built. Natural-language prompts replace detailed requirements. Entire features are generated instantly. Deployment cycles have collapsed from weeks into hours.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-336"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-334">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-335'
	>
	The productivity gains are enormous, but so is the risk. <a href="https://www.wiz.io/blog/common-security-risks-in-vibe-coded-apps" target="_blank" rel="noreferrer noopener">Wiz showed that almost 20% of vibe coded apps include serious vulnerabilities</a>.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-338"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-337'
	>
	<strong>In 2025, teams increasingly shipped code that included unreviewed logic, insecure defaults, poorly understood dependencies, or even hallucinated functionality. Speed has often outpaced review processes, while security teams struggle to adapt to unprecedented development velocity.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-341"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-339">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-340'
	>
	In 2026, the challenge is clear: organizations must preserve development speed without abandoning safety.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-344"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-342">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-343'
	>
	Automated code security analysis, dependency scanning, AI-generated testing, and policy-based delivery guardrails are becoming mandatory to keep pace with modern development practices.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-351"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-345"
	 href='https://infinum.com/cybersecurity/penetration-testing/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<p	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-346'
	>
	Automated tooling can catch a lot, but still can&#8217;t reason about business logic, chained vulnerabilities, or how real attackers actually move through a system. </p>		</div>

		<p	class='typography typography--size-16-text-roman js-typography card-simple__paragraph'
	data-id='es-347'
	 id='es-345-paragraph'>
	If you want to understand how your applications really fail under pressure, Infinum’s penetration testing helps you identify exploitable weaknesses before attackers do.</p><button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-348"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-349'
	>
	Pressure-test your apps</div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-350'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-354"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-352">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-353'
	>
	<strong><strong><strong>The evolution of phishing</strong></strong></strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-357"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-355">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-356'
	>
	Of all cyber threats in 2025, phishing remained the dominant force. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-360"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-358">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-359'
	>
	High-profile attacks, such as the <a href="https://thehackernews.com/2025/06/scattered-spider-behind-cyberattacks-on.html" target="_blank" rel="noreferrer noopener">Scattered Spider compromise</a> of Marks &amp; Spencer and the Co-Op incident, highlighted the enormous financial impact of credential-focused campaigns, with losses estimated at £300M and £270-440M, respectively. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-362"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-361'
	>
	<strong><strong>According to forecasts by the <a href="https://www.deloitte.com/us/en/insights/industry/financial-services/deepfake-banking-fraud-risk-on-the-rise.html" target="_blank" rel="noreferrer noopener">Deloitte Center for Financial Services</a>, genAI-enabled fraud losses in the US are expected to hit $40 billion by 2027.</strong></strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-365"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-363">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-364'
	>
	What changed in 2025? </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-368"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-366">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-367'
	>
	Phishing became more sophisticated and precise:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-371"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-369">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-370'
	>
	<li>Multi-factor authentication bypasses grew more common, often through session hijacking, real-time phishing proxies, and MFA fatigue via push bombing.</li><li>AI-powered attacks became localized, multilingual, grammatically flawless, and emotionally tailored, dramatically increasing click-through and credential-submission success rates. Not to mention voice and video deepfakes.</li><li>Emerging tactics like <a href="https://www.kaspersky.com/blog/what-is-clickfix/53348/">ClickFix</a> made users run malicious commands on their systems themselves by providing seemingly feasible solutions to supposed technical issues.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-374"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-372">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-373'
	>
	In 2026, defending against phishing means putting identity security at the center of operational defense:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-377"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-375">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-376'
	>
	<li><strong>Implementing zero-trust and least privilege policies</strong></li><li><strong>Continuous monitoring for credential leaks</strong></li><li><strong>Behavioral authentication and anomaly detection</strong></li><li><strong>Session-hijacking protections</strong></li><li><strong>MFA enforcement beyond static implementation</strong></li><li><strong>Rapid credential rotation and account isolation workflows</strong></li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-380"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-378">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-379'
	>
	Identity has become the new firewall, the first line of defense in a landscape where trust is constantly under attack.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-383"
	 data-animation='slideFade' data-animation-target='inner-items'>
				<div class="wrapper__anchor" id="what-is-software-supply-chain-security"></div>
	
			<div class="block-typography" data-id="es-381">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-382'
	>
	<strong><strong>Modern supply chain security = owning risk beyond what you control</strong></strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-386"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-384">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-385'
	>
	Cue <a href="https://unit42.paloaltonetworks.com/npm-supply-chain-attack/" target="_blank" rel="noreferrer noopener">Shai-Hulud </a><a href="https://unit42.paloaltonetworks.com/npm-supply-chain-attack/">2.0</a> as a prominent recent example.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-389"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-387">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-388'
	>
	Shai-Hulud 2.0 demonstrated how upstream compromise of developer tooling can silently infect thousands of downstream projects, without attackers targeting the end organizations at all.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-392"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-390">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-391'
	>
	By poisoning packages that developers trusted and pulled directly into production, the attack bypassed perimeter defenses entirely.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-395"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-393">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-394'
	>
	We can almost predict the headlines for 2026.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-406"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="grid block-grid__grid" data-id="es-405">
	
<div class="block-grid-item" data-id="es-398">
	
<div class="block-media">
	<div	class="media block-media__media media__border--none media__align--center-center"
	data-id="es-396"
	 data-media-type='image'>

	<figure class="image block-media__image-figure image--size-stretch" data-id="es-397">
	<picture class="image__picture block-media__image-picture">
								
			<source
				srcset=https://infinum.com/uploads/2025/12/Infinum-novine-1-1-1400x1897.webp				media='(max-width: 699px)'
				type=image/webp								height="1897"
												width="1400"
				 />
												<img
					src="https://infinum.com/uploads/2025/12/Infinum-novine-1-1.webp"
					class="image__img block-media__image-img"
					alt="Front-page–style layout with a red globe graphic above the headline: “Large SaaS breach affecting hundreds of companies simultaneously.”"
										height="1904"
															width="1405"
										loading="lazy"
					 />
					</picture>

	</figure></div></div>
</div>

<div class="block-grid-item" data-id="es-401">
	
<div class="block-media">
	<div	class="media block-media__media media__border--none media__align--center-center"
	data-id="es-399"
	 data-media-type='image'>

	<figure class="image block-media__image-figure image--size-stretch" data-id="es-400">
	<picture class="image__picture block-media__image-picture">
								
			<source
				srcset=https://infinum.com/uploads/2025/12/Infinum-novine-2-1-1400x1897.webp				media='(max-width: 699px)'
				type=image/webp								height="1897"
												width="1400"
				 />
												<img
					src="https://infinum.com/uploads/2025/12/Infinum-novine-2-1.webp"
					class="image__img block-media__image-img"
					alt="“Front-page–style layout with a stylized illustration of a person facing multiple screens, above the headline: ‘Data exposures cascading across dozens of vendor ecosystems.’”"
										height="1904"
															width="1405"
										loading="lazy"
					 />
					</picture>

	</figure></div></div>
</div>

<div class="block-grid-item" data-id="es-404">
	
<div class="block-media">
	<div	class="media block-media__media media__border--none media__align--center-center"
	data-id="es-402"
	 data-media-type='image'>

	<figure class="image block-media__image-figure image--size-stretch" data-id="es-403">
	<picture class="image__picture block-media__image-picture">
								
			<source
				srcset=https://infinum.com/uploads/2025/12/Infinum-novine-3-1400x1897.jpg				media='(max-width: 699px)'
				type=image/jpeg								height="1897"
												width="1400"
				 />
												<img
					src="https://infinum.com/uploads/2025/12/Infinum-novine-3.jpg"
					class="image__img block-media__image-img"
					alt="“Front-page–style layout with a futuristic illustration of a glowing lock inside a doorway, above the headline: ‘Billions of personal records leaked via a single compromised integration.’”"
										height="1904"
															width="1405"
										loading="lazy"
					 />
					</picture>

	</figure></div></div>
</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-409"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-407">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-408'
	>
	Security maturity is now measured not only by how well you protect your own assets, but by how deeply you understand and manage your entire vendor ecosystem, including your <a href="https://en.wikipedia.org/wiki/Shadow_IT" target="_blank" rel="noreferrer noopener">shadow </a><a href="https://en.wikipedia.org/wiki/Shadow_IT">IT</a>. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-412"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-410">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-411'
	>
	Dependencies are no longer just code libraries &#8211; they are hosted platforms, analytics services, support tools, collaboration APIs, and managed cloud infrastructure.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-415"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-413">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-414'
	>
	The <a href="https://infinum.com/blog/axios-npm-supply-chain-attack/">axios npm supply chain attack</a> in March 2026 shows exactly how this plays out — a single compromised npm account turned a library with 100 million weekly downloads into a malware delivery vehicle for under three hours.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-418"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-416">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-417'
	>
	In 2026, supply-chain security is operational security:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-421"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-419">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-420'
	>
	<li><strong>Continuous dependency scans and vendor audits</strong></li><li><strong>Software bill of materials (SBOM) tracking</strong></li><li><strong>Immutable offline backups</strong></li><li><strong>Access reviews and API exposure monitoring</strong></li><li><strong>Vendor breach response coordination</strong></li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-424"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-422">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-423'
	>
	For a structured framework to manage this vendor exposure end-to-end, our guide to <strong><a href="https://infinum.com/third-party-cyber-risk-management/">third-party cyber risk management</a></strong> walks through the full lifecycle from vendor identification to offboarding. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-427"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-425">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-426'
	>
	These steps now define baseline resilience. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-430"
	 data-animation='slideFade' data-animation-target='inner-items'>
				<div class="wrapper__anchor" id="most-common-software-supply-chain-threats"></div>
	
			<div class="block-typography" data-id="es-428">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-429'
	>
	<strong><strong><strong>Resilience meets prevention</strong></strong></strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-433"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-431">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-432'
	>
	The mindset around cybersecurity has changed.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-436"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-434">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-435'
	>
	While prevention remains critical, leadership teams now actively assume that compromise is possible, even likely, and design accordingly.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-439"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-437">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-438'
	>
	The breaches in recent years showed that many attacks operate without malware, relying instead on stolen credentials, social engineering, abused APIs, or compromised vendors. These techniques bypass traditional perimeter defenses and signature-based detection tools entirely.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-442"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-440">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-441'
	>
	In response, organizations should be prioritizing:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-445"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-443">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-444'
	>
	<li><strong>Regular tabletop incident simulations</strong></li><li><strong>Business continuity and disaster recovery planning</strong></li><li><strong>Immutable offline backups</strong></li><li><strong>Session-hijacking protections</strong></li><li><strong>Cyber insurance readiness</strong></li><li><strong>Crisis communication protocols</strong></li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-448"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-446">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-447'
	>
	The focus is shifting from <em>“How do we prevent every attack?”</em> to <em>“How quickly can we detect, contain, and recover?”</em></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-451"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-449">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-450'
	>
	With ransomware-as-a-service still looming large and threat actors broadening their scope, robust resilience and incident response capabilities are becoming the new benchmark of cybersecurity maturity. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-454"
	 data-animation='slideFade' data-animation-target='inner-items'>
				<div class="wrapper__anchor" id="most-common-software-supply-chain-threats"></div>
	
			<div class="block-typography" data-id="es-452">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-453'
	>
	<strong><strong>Finding a holistic security partner</strong></strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-457"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-455">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-456'
	>
	In this new environment, cybersecurity requires more than just point solutions or compliance checklists.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-460"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-458">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-459'
	>
	Organizations need a <strong>holistic security partner</strong> &#8211; one that understands modern application ecosystems, AI exposure, supply-chain complexity, and operational resilience.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-463"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-461">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-462'
	>
	That’s why Infinum’s <a href="https://infinum.com/cybersecurity/" target="_blank" rel="noreferrer noopener">emerging</a><a href="https://infinum.com/cybersecurity/"> </a><a href="https://infinum.com/cybersecurity/" target="_blank" rel="noreferrer noopener">cybersecurity</a><a href="https://infinum.com/cybersecurity/"> offering</a> covers a wide-range of cybersecurity services. Here’s how we can help:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-466"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-464">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-465'
	>
	<li><strong><a href="https://infinum.com/cybersecurity/penetration-testing/" id="https://infinum.com/cybersecurity/penetration-testing/">Penetration testing</a> </strong>&#8211; Identify vulnerabilities before attackers do.</li><li><strong><a href="https://infinum.com/cybersecurity/red-teaming/" id="https://infinum.com/cybersecurity/red-teaming/">Red teaming</a> </strong>&#8211;<strong> </strong>Simulate real-world attacks to test detection, response, and resilience, ensuring security controls work under pressure.</li><li><a href="https://infinum.com/social-engineering-testing-services/" target="_blank" rel="noreferrer noopener"><strong>Social engineering</strong></a><strong> </strong>&#8211; Assess human vulnerabilities through realistic phishing exercises and other tactics, strengthening employee awareness.</li><li><a href="https://infinum.com/cybersecurity/#ssdlc" target="_blank" rel="noreferrer noopener"><strong>SSDLC</strong></a><strong> </strong>&#8211; Integrate security at every stage of development, reducing coding errors, vulnerabilities, and post-release remediation costs.</li><li><a href="https://infinum.com/cybersecurity/#secure-architecture" target="_blank" rel="noreferrer noopener"><strong>Secure architecture</strong></a><strong> &#8211; </strong>Design systems with built-in zero trust security principles, minimizing attack surfaces and ensuring long-term resilience.</li><li><a href="https://infinum.com/governance-risk-compliance-services/" id="https://infinum.com/governance-risk-compliance-services/" target="_blank" rel="noreferrer noopener"><strong>Governance, risk, and compliance (GRC)</strong></a><strong> </strong>&#8211; Establish structured policies and controls, aligning security with regulatory requirements such as NIS2, DORA, CRA</li><li><a href="https://infinum.com/cybersecurity/#pci-dss" target="_blank" rel="noreferrer noopener"><strong>PCI DSS compliance</strong></a><strong> </strong>&#8211; Ensure payment card systems meet industry standards, protecting sensitive financial data and avoiding fines or reputational damage.</li><li><a href="https://infinum.com/cybersecurity/#ot" target="_blank" rel="noreferrer noopener"><strong>Operational technology security</strong></a><strong> (OT) </strong>&#8211; Safeguard industrial control systems and critical infrastructure, preventing disruption, physical damage, and operational downtime</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-469"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-467">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-468'
	>
	As we step into 2026, organizations need cybersecurity that is practical, adaptive, and deeply integrated with how modern products are built and operated.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-472"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-470">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-471'
	>
	<em>If you need help to design, deploy, and operate secure digital products that can stand strong not only today, but through whatever innovations tomorrow brings – <a href="https://infinum.com/cybersecurity/#form">contact our experienced team.</a></em></p></div>	</div>
</div>
</div>		</div>
	</div><p>The post <a href="https://infinum.com/blog/cybersecurity-trends-2026/">Cybersecurity Trends 2026 Explained: AI Threats, Compliance, and Operational Resilience</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</content:encoded>
			</item>
					<item>
				<image>
					<url>19270959https://infinum.com/uploads/2025/10/img-From-Code-to-Cloud-min-1.webp</url>
				</image>
				<title>Securing Your Software Supply Chain: A Step-by-Step Framework</title>
				<link>https://infinum.com/blog/software-supply-chain-security/</link>
				<pubDate>Fri, 17 Oct 2025 10:56:15 +0000</pubDate>
				<dc:creator>Neven Matas</dc:creator>
				<guid isPermaLink="false">https://infinum.com/?p=19270959</guid>
				<description>
					<![CDATA[<p>Software supply chain security is now critical to protecting not just your code, but everything your code depends on. Learn how to secure your systems.</p>
<p>The post <a href="https://infinum.com/blog/software-supply-chain-security/">Securing Your Software Supply Chain: A Step-by-Step Framework</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</description>
				<content:encoded>
					<![CDATA[

<div
	class="wrapper"
	data-id="es-748"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-475">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-478"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-476">
	<p	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-477'
	>
	<strong>Sometimes the most dangerous piece of software is the one you didn’t even write. With supply chain attacks on the rise, software supply chain security is now critical to protecting not just your code, but everything your code depends on.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-481"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-479">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-480'
	>
	When we talk about a “supply chain,” most people picture the journey of a physical product: from raw materials through manufacturing to assembling, distribution, and sale. Obviously, no company does it all alone; they rely on a network of partners to make it happen.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-484"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-482">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-483'
	>
	Software works the same way.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-487"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-485">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-486'
	>
	<a href="https://infinum.com/custom-app-development-services/">Modern applications</a> aren’t built from scratch, they’re assembled. Behind every app is a complex ecosystem of developer tools, CI/CD systems, cloud services, and open-source code.<strong> As<a href="https://www.linuxfoundation.org/blog/blog/a-summary-of-census-ii-open-source-software-application-libraries-the-world-depends-on"> The Linux Foundation reports</a>, 70 to 90% of most applications today are made up of third-party components.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-489"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-488'
	>
	That means every time you run or build software, you&#8217;re depending on hundreds of interconnected moving parts. And if just one of those links is compromised, the whole system is at risk.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-492"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-490">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-491'
	>
	We saw that risk explode into reality recently.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-495"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-493">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-494'
	>
	<a href="https://cycode.com/blog/npm-debug-chalk-supply-chain-attack-the-complete-guide/">Cycode states</a> that a <a href="https://infinum.com/blog/how-do-phishing-simulations-contribute-to-enterprise-security/">phishing campaign</a> led to the hijacking of core NPM packages like chalk, debug, and strip-ansi, libraries downloaded over 2 billion times per week. <a href="https://www.scworld.com/brief/npm-supply-chain-attack-hits-crowdstrike-packages-implications-for-cybersecurity">SC Media reports</a> that days later, another attack infected more than 200 NPM packages, including those linked to <a href="https://infinum.com/blog/crowdstrike-3-takeaways/">CrowdStrike</a>, using a self-replicating worm that exfiltrated data, created rogue GitHub workflows, and attempted to spread downstream.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-500"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="blockquote block-blockquote__blockquote" data-id="es-496">
	
	<div class="blockquote__content">
		<i
	class="icon blockquote__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='blockquote-24' data-id='es-497'>
	<svg fill='none' height='24' viewBox='0 0 24 24' width='24' xmlns='http://www.w3.org/2000/svg'><path clip-rule='evenodd' d='m12 24c6.6274 0 12-5.3726 12-12 0-2.79685-.9568-5.37021-2.561-7.41062-.581.22951-1.0832.60583-1.5069 1.12898-.5132.60844-.7698 1.41969-.7698 2.43375v.07605h2.5789v5.59004h-5.6197v-5.01962c0-1.11547.154-2.06616.4619-2.85205.3336-.81125.757-1.48307 1.2702-2.01545.528-.52161 1.1175-.92155 1.7687-1.1998-2.0728-1.70651-4.7279-2.73128-7.6223-2.73128-6.62742 0-12 5.37258-12 12 0 6.6274 5.37258 12 12 12zm-3.53811-18.05347c-.30793.78589-.46189 1.73658-.46189 2.85205v5.01962h5.6197v-5.59004h-2.5789v-.07605c0-1.01406.2566-1.82531.7698-2.43375.5389-.63379 1.1804-1.05209 1.9245-1.2549v-2.28164c-.7441.07605-1.4626.25351-2.1555.53238-.6928.27887-1.3086.68449-1.84752 1.21688-.51321.53238-.9366 1.2042-1.27019 2.01545z' fill='currentColor' fill-rule='evenodd'/></svg></i><p	class='typography typography--size-36-text js-typography blockquote__quote'
	data-id='es-498'
	>
	<strong>These weren’t targeted attacks. They were ecosystem-level compromises with the potential to impact millions, which is why Software Supply Chain Security matters now more than ever.</strong></p>
		<div class="blockquote__caption-wrap">
			<div	class='typography typography--size-12-text-roman js-typography blockquote__caption'
	data-id='es-499'
	>
	NEVEN MATAS, CYBERSECURITY TEAM DIRECTOR, INFINUM</div>		</div>
	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-503"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-501">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-502'
	>
	It’s <a href="https://infinum.com/blog/cybersecurity-trends-2025/">no longer just about writing secure code</a>,<strong> it’s about securing everything you rely on to build, deploy, and maintain it. </strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-506"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-504">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-505'
	>
	In this article, we’ll introduce supply chain security and cover best practices for reducing risk – from defining requirements all the way to development, deployment, and maintenance.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-509"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-507">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-508'
	>
	The topics we’ll cover include:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-512"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-510">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-511'
	>
	<strong><strong><a href="#what-is-software-supply-chain-security">What is Software Supply Chain Security (SSCS)?</a></strong></strong></p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-515"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-513">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-514'
	>
	<strong><strong><strong><a href="#most-common-software-supply-chain-threats">What are the most common threats in the software supply chain?</a></strong></strong></strong></p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-518"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-516">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-517'
	>
	<a href="#types-of-supply-chain-attacks">What are the <strong><strong><strong><strong>most common types of supply chain attacks</strong></strong></strong></strong>?</a></p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-521"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-519">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-520'
	>
	<a href="#Integrating-security-at-every-stage-of-the-SDLC">How to<strong> integrate security at every stage of the SDLC</strong>?</a></p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-524"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-522">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-523'
	>
	<a href="#adopting-secure-software-development-lifecycle-practices"><strong>How to adopt secure software development lifecycle (SSDLC) practices</strong>?</a></p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-527"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-525">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-526'
	>
	<strong><a href="#SSDLC-industry-standards-and-frameworks">Which industry standards and frameworks to explore for SSDLC?</a></strong></p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-530"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-528">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-529'
	>
	<a href="#How-to-build-a-security-response-plan">How to <strong>build a response plan and keep your security policies sharp</strong>?</a></p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-533"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-531">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-532'
	>
	<a href="#managing-human-risk-in-the-supply-chain-security"><strong>How to manage human risk in the supply chain security</strong></a></p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-536"
	 data-animation='slideFade' data-animation-target='inner-items'>
				<div class="wrapper__anchor" id="what-is-software-supply-chain-security"></div>
	
			<div class="block-typography" data-id="es-534">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-535'
	>
	<strong>What is Software Supply Chain Security (SSCS)?</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-539"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-537">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-538'
	>
	<strong>Software Supply Chain Security (SSCS) is the practice of securing all the components, tools, people, and processes involved in the development, deployment, and maintenance of software</strong>, from third-party libraries and CI/CD pipelines to developer environments and cloud infrastructure. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-542"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-540">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-541'
	>
	If you’re only securing your app but ignoring the tools and dependencies you use to build it, you’re not secure. Modern software isn’t built from scratch. <strong>It’s assembled. </strong>And even a single vulnerable dependency can compromise your entire product.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-545"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-543">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-544'
	>
	That’s why SSCS is a critical part of secure software development. It ensures every link in the chain is trusted, verified, and resilient. It’s also why regulations like <a href="https://infinum.com/blog/eu-cybersecurity-legislation-nis2-dora/" target="_blank" rel="noreferrer noopener"><strong>NIS2</strong></a> or <a href="https://infinum.com/blog/cyber-resilience-act/"><strong>CRA</strong></a> put so much emphasis on it.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-548"
	 data-animation='slideFade' data-animation-target='inner-items'>
				<div class="wrapper__anchor" id="most-common-software-supply-chain-threats"></div>
	
			<div class="block-typography" data-id="es-546">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-547'
	>
	What are the most common threats in the software supply chain?</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-551"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-549">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-550'
	>
	Software supply chain security goes far beyond writing secure code. It’s about making sure malicious actors can’t sneak in through the<strong> tools, environments, and people your app depends on.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-554"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-552">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-553'
	>
	Here are some of the most common entry points attackers exploit:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-557"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-555">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-556'
	>
	<li><strong>Open-source dependencies</strong> that could contain malicious code</li><li><strong>Package managers and artifact repositories</strong> that could distribute malicious packages</li><li><strong>Source code repositories</strong> (GitHub, GitLab…) that may be targeted for unauthorized access</li><li><strong>Build tools and environments</strong> that can be tampered with to insert malicious artifacts</li><li><strong>CI/CD systems</strong> that are attractive targets for attackers to introduce compromised code into production</li><li><strong>Cloud infrastructure and third-party services</strong> that could be exploited to gain access</li><li><strong>Developer machines and IDEs</strong> that, if infected, could be a direct path towards compromising code</li><li><strong>Your own team,</strong> because human error is always the biggest risk</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-560"
	 data-animation='slideFade' data-animation-target='inner-items'>
				<div class="wrapper__anchor" id="types-of-supply-chain-attacks"></div>
	
			<div class="block-typography" data-id="es-558">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-559'
	>
	<strong>Most common types of supply chain attacks</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-563"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-561">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-562'
	>
	Once inside, here’s what those attacks can look like in the real world:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-566"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-564">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-565'
	>
	<li><strong>Vulnerable components</strong> – outdated or unpatched dependencies (remember Log4j?)</li><li><strong>Malicious packages</strong> – rogue npm/PyPI uploads hiding backdoors or malware. The <a href="https://infinum.com/blog/axios-npm-supply-chain-attack/">axios npm supply chain attack</a> in March 2026 is a textbook example — a compromised maintainer account was used to publish two poisoned versions of a library with 100 million weekly downloads</li><li><strong>Build pipeline tampering</strong> – injecting malicious code during build (e.g. SolarWinds)</li><li><strong>Fake maintainers</strong> – attackers hijacking open-source projects to slip in malicious commits</li><li><strong>Secrets leakage</strong> – exposed API tokens or credentials in public repos</li><li><strong>Weak repo security</strong> – no MFA, poor audit trails, accounts vulnerable to takeover</li><li><strong>Overprivileged scripts</strong> – CI/CD or deploy scripts with excessive permissions</li><li><strong>Dependency confusion</strong> – lookalike packages from public registries winning the name race</li><li><strong>Compromised dev environments</strong> – malware on a single laptop can be all it takes</li><li><strong>Hijacked CI/CD runners</strong> – shared runners or agents used to execute malicious code</li><li><strong>Poisoned artifacts or registries</strong> – malicious Docker images or tampered packages</li><li><strong>Pre-installed backdoors</strong> – third-party SDKs or libraries phoning home</li><li><strong>Social engineering</strong> – phishing maintainers or tricking devs into handing over keys</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-569"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-567">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-568'
	>
	And that’s not even an exhaustive list.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-572"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-570">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-571'
	>
	Many of these attacks exploit gaps in the development process itself. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-575"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-573">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-574'
	>
	Even if your code is secure and your infrastructure hardened, vulnerabilities can slip in when there’s limited visibility, inconsistent practices, or missing security checks — which is why integrating security throughout the Software Development Lifecycle (SDLC), often referred to as the<a href="https://infinum.com/blog/ssdlc-application-security/" target="_blank" rel="noreferrer noopener"><strong> Secure Software Development Lifecycle (SSDLC)</strong></a>, is so valuable.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-578"
	 data-animation='slideFade' data-animation-target='inner-items'>
				<div class="wrapper__anchor" id="Integrating-security-at-every-stage-of-the-SDLC"></div>
	
			<div class="block-typography" data-id="es-576">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-577'
	>
	Integrating security at every stage of the SDLC</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-581"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-579">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-580'
	>
	The SSDLC encourages embedding security practices at every stage of development. This approach, often referred to as <strong>“shifting left”</strong>, helps identify and remediate threats early, before they reach production. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-584"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-582">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-583'
	>
	It doesn’t eliminate supply chain risks entirely, but it reduces the risk of vulnerabilities slipping through unnoticed and the likelihood that compromised dependencies, misconfigured pipelines, or weak controls turn into full-blown breaches.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-586"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-585'
	>
	<strong>‘Shift left’ means integrating security earlier in the development process, so threats are identified and fixed long before they reach production.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-589"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-587">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-588'
	>
	Here’s what that can look like:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-592"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-590">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-591'
	>
	<li>Defining security requirements during planning</li><li>Performing threat modeling during design</li><li>Using automated tools to scan for vulnerabilities during development and testing</li><li>Securing your CI/CD workflows and access controls during build and deployment</li><li>Maintaining clear incident response plans during operations</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-595"
	 data-animation='slideFade' data-animation-target='inner-items'>
				<div class="wrapper__anchor" id="adopting-secure-software-development-lifecycle-practices"></div>
	
			<div class="block-typography" data-id="es-593">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-594'
	>
	How to adopt secure software development lifecycle (SSDLC) practices</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-598"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-596">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-597'
	>
	Let’s break it down through some high-level SSDLC phases and their security-minded steps:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-601"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-599">
	<h3	class='typography typography--size-30-text js-typography block-typography__typography'
	data-id='es-600'
	>
	1. Planning</h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-604"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-602">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-603'
	>
	<strong>Planning is arguably the most critical step for supply chain security, as it helps prevent hidden vulnerabilities through thorough due diligence.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-607"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-605">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-606'
	>
	<li>Perform a risk analysis to identify assets, assess threats, and decide how to handle each risk (avoid, transfer, mitigate, or accept)</li><li>Define security and compliance requirements based on the risk analysis</li><li>Assess third-party risk through vendor reviews and security questionnaires. If third-party risk assessment is a significant concern for your organization, our dedicated guide to <strong><a href="https://infinum.com/third-party-cyber-risk-management/">third-party cyber risk management</a></strong> covers the full TPRM framework in depth.</li><li>Ensure SLAs and contracts include clear, enforceable security terms that work in your favor</li><li>Identify relevant standards and compliance obligations (e.g., ISO 27001, SOC 2) for vendors and third-party software</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-610"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-608">
	<h3	class='typography typography--size-30-text js-typography block-typography__typography'
	data-id='es-609'
	>
	2. Design</h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-613"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-611">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-612'
	>
	<strong>Design is your chance to build supply chain defenses into the architecture.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-616"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-614">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-615'
	>
	<li>Conduct threat modeling to identify potential attack vectors</li><li>Select secure architecture patterns and apply least privilege, zero trust, and secure defaults principles from the start</li><li>Define clear trust boundaries between internal components and third-party integrations</li><li>Plan for secure communication channels, including encryption in transit and at rest</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-619"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-617">
	<h3	class='typography typography--size-30-text js-typography block-typography__typography'
	data-id='es-618'
	>
	3. Development</h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-622"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-620">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-621'
	>
	<strong>Development is where insecure code or unvetted dependencies can silently enter your supply chain. </strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-625"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-623">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-624'
	>
	<li>Enforce secure coding standards (e.g., OWASP)</li><li>Enforce pull requests (PRs) reviews to ensure code quality and security before merging</li><li>Use properly configured SCA tools (Software Composition Analysis) in the CI pipeline to identify and manage security risks in third-party libraries and open-source dependencies</li><li>Scan for secrets and credentials in code</li><li>Restrict sensitive projects to private repositories and limiting access to authorized developer teams only</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-628"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-626">
	<h3	class='typography typography--size-30-text js-typography block-typography__typography'
	data-id='es-627'
	>
	4. Testing</h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-631"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-629">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-630'
	>
	<strong>Testing is where you validate not just your code, but the behavior of any external components or APIs. It helps expose risks before they become real threats</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-634"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-632">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-633'
	>
	<li>Use SAST (Static Application Security Testing) tools in the CI pipeline to detect vulnerabilities and insecure coding patterns before it reaches production</li><li>Use DAST (Dynamic Application Security Testing) tools to identify security vulnerabilities in a running application by simulating real-world attacks</li><li>Perform regular penetration tests to simulate real-world attacks and identify vulnerabilities an attacker could actually exploit – not just what a scanner detects.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-640"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-635"
	 href='https://infinum.com/cybersecurity/penetration-testing/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
					</div>

		<p	class='typography typography--size-24-text js-typography card-simple__paragraph'
	data-id='es-636'
	 id='es-635-paragraph'>
	<span class='screen-reader-text'>Our certified pen testers simulate real-world attacks to uncover vulnerabilities before someone else does. Get clear, actionable insights into your software’s security posture.</span><span aria-hidden='true'><strong><strong><strong><strong>Our certified pen testers simulate real-world attacks to uncover vulnerabilities before someone else does. Get clear, actionable insights into your software’s security posture.</strong></strong></strong></strong></span></p><button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-637"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-638'
	>
	Start here</div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-639'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-643"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-641">
	<h3	class='typography typography--size-30-text js-typography block-typography__typography'
	data-id='es-642'
	>
	5. Build &amp; deploy</h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-646"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-644">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-645'
	>
	<strong>Build and deployment pipelines are a prime target for supply chain attacks. Securing CI/CD is a non-negotiable for trust and integrity.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-649"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-647">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-648'
	>
	<li>Enforce strong authentication and role-based access controls (RBAC) for build systems</li><li>Centralize and automate secret management (e.g., HashiCorp Vault)</li><li>Harden all environments—including staging and production—as well as the CI/CD infrastructure (e.g., by using isolation, comprehensive logging, and ephemeral runners)</li><li>Sign build artifacts and verify their integrity before deployment to ensure that the software has not been tampered with</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-652"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-650">
	<h3	class='typography typography--size-30-text js-typography block-typography__typography'
	data-id='es-651'
	>
	6. Distribution</h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-655"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-653">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-654'
	>
	<strong>Distribution is when your software becomes part of someone else’s supply chain. It helps build trust and transparency with clients and downstream users.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-658"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-656">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-657'
	>
	<li>Maintain and distribute SBOMs (Software Bill of Materials) to track all software components</li><li>Scan packages pre- and post-publish for malware or vulnerabilities</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-661"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-659">
	<h3	class='typography typography--size-30-text js-typography block-typography__typography'
	data-id='es-660'
	>
	7. Maintenance</h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-664"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-662">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-663'
	>
	<strong>Maintenance ensures your supply chain remains secure over time. Nothing is more dangerous than running software that becomes forgotten</strong>.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-667"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-665">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-666'
	>
	<li>Continuously monitor for new CVEs (Common Vulnerabilities and Exposures) and third-party advisories</li><li>Regularly audit and harden configurations (cloud, infra, access policies)</li><li>Automate patching and dependency updates</li><li>Replace insecure or deprecated components</li><li>Maintain and rehearse incident response plans for supply chain attacks (including backup and disaster recovery procedures) to ensure supply chain resilience</li><li>Periodically reassess vendor and third-party risks to capture changes in their security posture</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-669"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-668'
	>
	<strong>Security isn’t a checkbox at the end of your sprint, it’s a continuous mindset that spans every phase of development. Adopting SSDLC practices means baking security into your process, not bolting it on after the fact. </strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-672"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-670">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-671'
	>
	You don’t need to get it perfect from day one. Just start building with intention, iterate often, and treat security as a shared responsibility across your stack.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-675"
	 data-animation='slideFade' data-animation-target='inner-items'>
				<div class="wrapper__anchor" id="SSDLC-industry-standards-and-frameworks"></div>
	
			<div class="block-typography" data-id="es-673">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-674'
	>
	<strong>Which industry standards and frameworks to explore for SSDLC?</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-678"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-676">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-677'
	>
	Luckily for you, you don’t have to start from scratch.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-681"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-679">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-680'
	>
	There are frameworks built by security pros to help you get it right. Use <strong>OWASP SAMM, NIST SSDF, or Microsoft’s SDL</strong> as a baseline to evaluate your current practices and make steady, structured improvements.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-684"
	 data-animation='slideFade' data-animation-target='inner-items'>
				<div class="wrapper__anchor" id="How-to-build-a-security-response-plan"></div>
	
			<div class="block-typography" data-id="es-682">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-683'
	>
	<strong>How to build a response plan and keep your security policies sharp</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-687"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-685">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-686'
	>
	The worst time to figure out your incident response plan is while the incident is happening.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-690"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-688">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-689'
	>
	Investing time into developing a clear, actionable incident response plan is non-negotiable. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-692"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-691'
	>
	<strong>You need to know how you’ll detect an incident, who’s responsible for what, how to contain it, and how to communicate both internally and externally. The worst time to figure it out is while it’s happening.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-695"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-693">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-694'
	>
	And that’s just the beginning.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-698"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-696">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-697'
	>
	As software evolves, so do the threats. If your security policies are stuck in last year’s playbook, you’re not protected. <strong>Review and update your practices regularly</strong>, from dependency management and access control to patching and third-party risk.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-701"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-699">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-700'
	>
	Stay informed, stay adaptable, and stay ahead before someone else forces you to.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-704"
	 data-animation='slideFade' data-animation-target='inner-items'>
				<div class="wrapper__anchor" id="managing-human-risk-in-the-supply-chain-security"></div>
	
			<div class="block-typography" data-id="es-702">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-703'
	>
	How to manage human risk in the supply chain security</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-707"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-705">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-706'
	>
	Technology alone isn&#8217;t enough. Security depends on people, and <strong>people are often the easiest way in.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-710"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-708">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-709'
	>
	<a href="https://infinum.com/social-engineering-testing-services/">Phishing and social engineering</a> remain some of the most effective tactics in supply chain attacks. <a href="https://infinum.com/blog/cybersecurity-trends-2025/">Recent incidents</a> like the hijacking of chalk and debug began with a fake MFA email sent to a trusted maintainer. No zero-days. No malware. Just a well-crafted message and a <a href="https://infinum.com/blog/how-do-phishing-simulations-contribute-to-enterprise-security/">moment of inattention</a>.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-713"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-711">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-712'
	>
	That’s why security culture matters as much as security tooling.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-716"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-714">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-715'
	>
	Start with the basics:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-719"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-717">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-718'
	>
	<li><strong>Code reviews with security checklists</strong> – don’t rely on automation alone</li><li><strong>Pair programming </strong>– share knowledge, spot issues early</li><li><strong>Regular security training</strong> – not just once a year, but as an ongoing habit</li><li><strong>Simulated phishing campaigns</strong> – <a href="https://infinum.com/social-engineering-testing-services/">train your team</a> to recognize real threats</li><li><strong>Fostering a security-first culture</strong> – where reporting issues is expected, not punished</li><li><strong>Cross-functional collaboration</strong> – involve product, legal, and ops in risk decisions<br />
<br />
<br />
<br />
</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-725"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-720"
	 href='https://infinum.com/social-engineering-testing-services/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
					</div>

		<p	class='typography typography--size-24-text js-typography card-simple__paragraph'
	data-id='es-721'
	 id='es-720-paragraph'>
	<span class='screen-reader-text'>Reduce risk where it’s most human. Our social engineering services test your team’s readiness with real-world phishing </span><span aria-hidden='true'><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong><strong>Reduce risk where it’s most human.</strong></strong></strong></strong></strong></strong></strong></strong></strong></strong></strong></strong></strong> Our social engineering services <strong><strong><strong><strong><strong><strong><strong><strong><strong>test your team’s readiness with real-world phishing </strong></strong></strong></strong></strong></strong></strong></strong></strong></span></p><button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-722"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-723'
	>
	Start here</div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-724'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-728"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-726">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-727'
	>
	<strong>Isn’t this all a bit too much?</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-731"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-729">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-730'
	>
	Yes, it can feel like a lot. But you don’t need to boil the ocean, just <strong>start where it matters most. </strong>Use a model like <a href="https://owaspsamm.org/assessment/">OWASP SAMM</a> to assess where you stand, identify your biggest risks, and go for a few quick wins.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-734"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-732">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-733'
	>
	Here are a few that pack a punch:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-737"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-735">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-736'
	>
	<li>Set up an SCA tool in under an hour (e.g, Dependabot).</li><li>Add 2FA on your GitHub org today &#8211; no excuses</li><li>Add a “security” section to your pull request template.</li><li>Run a <a href="https://infinum.com/cybersecurity/penetration-testing/">penetration test</a></li><li>Draft a basic incident response doc for your team.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-740"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-738">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-739'
	>
	<strong>Security maturity comes from small, consistent moves in the right direction</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-743"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-741">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-742'
	>
	Remember: you can outsource code, but you can’t outsource accountability. What matters most is building a culture where no one makes security the other person’s job.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-746"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-744">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-745'
	>
	<em>Proceed to shift security left, raise awareness, automate what you can, patch early, and document everything. If you need some extra support, feel free to <a href="https://infinum.com/cybersecurity/#form">reach out</a> to our certified experts. </em></p></div>	</div>
</div>
</div>		</div>
	</div><p>The post <a href="https://infinum.com/blog/software-supply-chain-security/">Securing Your Software Supply Chain: A Step-by-Step Framework</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</content:encoded>
			</item>
					<item>
				<image>
					<url>19268956https://infinum.com/uploads/2025/09/img-the-price-of-cyberattack-hero-min.webp</url>
				</image>
				<title>The Cost of Cyberattack in 2025</title>
				<link>https://infinum.com/blog/cyberattack-cost/</link>
				<pubDate>Wed, 17 Sep 2025 12:54:15 +0000</pubDate>
				<dc:creator>Neven Matas</dc:creator>
				<guid isPermaLink="false">https://infinum.com/?p=19268956</guid>
				<description>
					<![CDATA[<p>Discover how cybercrime grew into a $10.5 trillion economy in 2025 and why resilience, not luck, is the only defense.</p>
<p>The post <a href="https://infinum.com/blog/cyberattack-cost/">The Cost of Cyberattack in 2025</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</description>
				<content:encoded>
					<![CDATA[<div
	class="wrapper"
	data-id="es-843"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-749">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-752"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-750">
	<p	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-751'
	>
	Picture this: every second, somewhere in the world, a system is being probed, a login page is under siege, or someone’s inbox is getting a phishing email that looks just convincing enough.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-755"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-753">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-754'
	>
	Cybercrime in 2025 isn’t just a risk; it’s a trillion-dollar economy more profitable than the global drug trade, which operates 24/7.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-758"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-756">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-757'
	>
	<strong>Cyberattacks per day: From thousands to hundreds of millions</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-761"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-759">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-760'
	>
	When discussing cyberattacks, the definition is crucial. Are we counting every spammy probe, or only the ones that hurt?</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-764"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-762">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-763'
	>
	<li><strong>Total attempts</strong>: Microsoft clocks a jaw-dropping <a href="https://news.microsoft.com/en-cee/2024/11/29/microsoft-digital-defense-report-600-million-cyberattacks-per-day-around-the-globe/#:~:text=from%20July%202023%20to%20July,deeply%20intertwined%20with%20geopolitical%20conflicts">600 million attack attempts every day</a> across its customer base. That’s phishing, brute force, malware, the whole buffet.</li><li><strong>Significant breaches</strong>: Roughly 2,300 meaningful cyberattacks happen daily, including major intrusions, breaches, or confirmed compromises. That’s about <a href="https://www.bdemerson.com/article/complete-cybercrime-statistics#:~:text=How%20Many%20Cyber%20Crimes%20Are,Committed%20Each%20Day">850,000 big incidents per year</a>.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-767"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-765">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-766'
	>
	And if you zoom out to victims, the Identity Theft Resource Center reports that 1.7 billion people were affected by cyber incidents in 2024. Do the math: that’s <a href="https://explodingtopics.com/blog/cybersecurity-stats#:~:text=The%20Identity%20Theft%20Resource%20Center,and%20just%20754%20in%202018">4.6 million individuals per day</a>, or <strong>54 people affected every second</strong>. By the time you’ve finished reading this sentence, a handful more people just got pwned.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-770"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-768">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-769'
	>
	<strong>The price of a breach: $4.4M on average</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-773"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-771">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-772'
	>
	Getting hacked isn’t just embarrassing; it’s expensive.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-776"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-774">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-775'
	>
	<li>In 2024, the <a href="https://www.bdemerson.com/article/complete-cybercrime-statistics#:~:text=2,9">average global breach cost was $4.88M</a>, the highest on record.</li><li>In 2025, there’s actually good-ish news: the number <a href="https://www.ibm.com/reports/data-breach#:~:text=4">dipped slightly to $4.4M</a>.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-779"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-777">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-778'
	>
	That 9% drop is attributed to improved detection and the rise of AI-powered defenses. But don’t break out the champagne yet: multimillion-dollar hits are still the norm.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-782"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-780">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-781'
	>
	Healthcare continues to top the charts, with breach costs hovering around $10M per incident. That marks a grim 14-year streak of leading the “most expensive” list. Finance, tech, and energy aren’t far behind.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-785"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-783">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-784'
	>
	Energy, utilities, and manufacturing face a compounding factor that purely digital sectors do not: many of their systems run on operational technology — industrial controls and SCADA platforms where a breach can trigger physical shutdowns, not just data loss. Understanding <a href="https://infinum.com/what-is-ot-security/">OT security</a> and where IT networks intersect with these physical systems is what separates a recoverable incident from an infrastructure failure.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-791"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-786"
	 target='_blank' rel='noopener noreferrer' href='https://infinum.com/cybersecurity/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<p	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-787'
	>
	<strong><strong>New cybersecurity challenges keep popping up—but you don’t have to face them alone. Explore our cybersecurity services to protect your business.</strong></strong></p>		</div>

		<button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-788"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-789'
	>
	Explore cybersecurity</div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-790'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-794"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-792">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-793'
	>
	<strong>The cybercrime economy: $10.5 trillion in 2025</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-797"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-795">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-796'
	>
	Here’s where it gets truly staggering: <a href="https://www.fortinet.com/resources/cyberglossary/cybersecurity-statistics#:~:text=2,year%20increase">the total global cost of cybercrime is projected to hit $10.5 trillion</a> annually by the end of 2025.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-800"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-798">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-799'
	>
	To put that in perspective:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-803"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-801">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-802'
	>
	<li>That’s about $26 billion a day.</li><li>Or <a href="https://www.bdemerson.com/article/complete-cybercrime-statistics#:~:text=,11">$302,000 every second</a> that&#8217;s bleeding out of the global economy.</li><li>If cybercrime were a country, it would be the third-largest economy in the world, right behind the U.S. and China.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-806"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-804">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-805'
	>
	This $10.5 trillion includes everything from ransomware payouts and fraud to downtime, recovery, and stolen IP. For context, cybercrime “only” cost $3 trillion back in 2015, which means damages have ballooned by 250% in a decade.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-809"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-807">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-808'
	>
	<strong>The bottom line</strong></h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-812"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-810">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-811'
	>
	Cybercrime in 2025 isn’t just a line item in IT’s budget. It’s a planetary-scale economic drain bigger than natural disasters.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-814"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-813'
	>
	Here’s the uncomfortable question for decision-makers: <strong>When was the last time you pressure-tested your product, your defenses, or your people?</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-817"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-815">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-816'
	>
	If the answer is unsettling, structured <strong><a href="https://infinum.com/governance-risk-compliance-services/">governance, risk, and compliance services</a></strong> are often where organisations start, defining what needs protecting, who owns what, and what happens when something goes wrong.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-820"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-818">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-819'
	>
	The good news? Smarter defenses are starting to bend some curves, as seen in the dip in average breach costs. The bad news? The scale of attacks means vigilance isn’t optional.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-823"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-821">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-822'
	>
	So here’s the uncomfortable question for decision-makers: <strong>When was the last time you pressure-tested your product, your defenses, or your people?</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-826"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-824">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-825'
	>
	<li>Not just running an AI scanner, but letting a real human try to break what you’ve built.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-829"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-827">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-828'
	>
	<li>Not just training staff to ignore the “Nigerian prince,” but seeing if they’d catch the difference between microsoft.com and microso4t.com.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-832"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-830">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-831'
	>
	Because in 2025, resilience isn’t about whether you’ll be targeted. It’s about when and how ready you’ll be when it happens. The most direct way to measure that readiness is a <a href="https://infinum.com/red-team-services/">red team exercise</a> — a controlled simulation of a real attack that tests whether your detection and response would actually hold up.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-835"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-833">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-834'
	>
	One often-overlooked exposure is vendor risk, a single compromised third party can trigger the very breaches described above. Our guide to <a href="https://infinum.com/third-party-cyber-risk-management/" id="https://infinum.com/third-party-cyber-risk-management/">third-party cyber risk management</a> explains how to get ahead of it.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-841"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-836"
	 target='_blank' rel='noopener noreferrer' href='https://infinum.com/cybersecurity/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<p	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-837'
	>
	<strong><strong>Reach out to our cybersecurity team to protect your business and avoid becoming part of the grim statistics.</strong></strong></p>		</div>

		<button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-838"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-839'
	>
	Explore cybersecurity</div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-840'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>
</div>
</div>		</div>
	</div><p>The post <a href="https://infinum.com/blog/cyberattack-cost/">The Cost of Cyberattack in 2025</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</content:encoded>
			</item>
					<item>
				<image>
					<url>19262047https://infinum.com/uploads/2025/01/Cybersecurity_chalanges_2025-blog-hero-min.webp</url>
				</image>
				<title>Cybersecurity Trends 2025: Threats, Hacks, and Counterattacks</title>
				<link>https://infinum.com/blog/cybersecurity-trends-2025/</link>
				<pubDate>Fri, 24 Jan 2025 13:11:42 +0000</pubDate>
				<dc:creator>Neven Matas</dc:creator>
				<guid isPermaLink="false">https://infinum.com/?p=19262047</guid>
				<description>
					<![CDATA[<p>Discover the latest cybersecurity trends for 2025. Arm yourself with the knowledge and tools to stay secure in the face of evolving threats.</p>
<p>The post <a href="https://infinum.com/blog/cybersecurity-trends-2025/">Cybersecurity Trends 2025: Threats, Hacks, and Counterattacks</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</description>
				<content:encoded>
					<![CDATA[<div
	class="wrapper"
	data-id="es-1052"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-844">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-847"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-845">
	<p	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-846'
	>
	<strong>The 2025 cybersecurity trends point to another high-stakes year. From the omnipresent AI helping both attackers and defenders to growing regulatory pressure, here’s what to expect – and how to stay one step ahead. </strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-850"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-848">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-849'
	>
	From a cybersecurity standpoint, 2024 was a pretty wild ride. Around this time last year, we were mapping out the trends it might bring, <a href="https://infinum.com/blog/cybersecurity-trends-2024/" target="_blank" rel="noreferrer noopener">spurred by the largest data breach in history</a>. It turned out that it wasn’t the only record of the year – 2024 also gave us the largest IT outage of all time, <a href="https://infinum.com/blog/crowdstrike-3-takeaways/" target="_blank" rel="noreferrer noopener">which we also didn’t fail to address</a>.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-853"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-851">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-852'
	>
	Twelve months have gone by, and while some of last year’s trends remain just as relevant, new challenges also appear on the horizon. Hopefully, by building awareness around these topics and continuing to make security a priority, we just might keep 2025 from serving up any more “largest-ever” incidents. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-856"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-854">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-855'
	>
	On that note, let’s dive into the 2025 cybersecurity trends. Buckle up, because the ride is only getting faster.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-862"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-857"
	 target='_blank' rel='noopener noreferrer' href='https://infinum.com/cybersecurity/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<p	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-858'
	>
	<strong><strong>2025 will bring new cybersecurity challenges—but you don’t have to face them alone. Explore our cybersecurity services to protect your business and stay ahead of the curve.</strong></strong></p>		</div>

		<button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-859"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-860'
	>
	Learn more </div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-861'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-865"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-863">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-864'
	>
	AI between heaven &amp; hell</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-868"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-866">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-867'
	>
	There’s hardly a corner of the digital world AI hasn’t transformed, or at least disrupted, and cybersecurity is no exception. In this space, artificial intelligence is a tool for both sides of the fence, serving attackers as well as defenders.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-871"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-869">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-870'
	>
	AI in cyber defense</h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-874"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-872">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-873'
	>
	A key defense area in cybersecurity is tracking and analyzing massive volumes of data in real time to spot suspicious behavior – something AI excels at. By instantly processing network traffic, user activities, access logs, and various Indicators of Compromise (IoC), AI-powered security systems can detect anomalies, identify threats, and generate actionable intelligence far faster than humans can.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-878"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="blockquote block-blockquote__blockquote" data-id="es-875">
	
	<div class="blockquote__content">
		<i
	class="icon blockquote__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='blockquote-24' data-id='es-876'>
	<svg fill='none' height='24' viewBox='0 0 24 24' width='24' xmlns='http://www.w3.org/2000/svg'><path clip-rule='evenodd' d='m12 24c6.6274 0 12-5.3726 12-12 0-2.79685-.9568-5.37021-2.561-7.41062-.581.22951-1.0832.60583-1.5069 1.12898-.5132.60844-.7698 1.41969-.7698 2.43375v.07605h2.5789v5.59004h-5.6197v-5.01962c0-1.11547.154-2.06616.4619-2.85205.3336-.81125.757-1.48307 1.2702-2.01545.528-.52161 1.1175-.92155 1.7687-1.1998-2.0728-1.70651-4.7279-2.73128-7.6223-2.73128-6.62742 0-12 5.37258-12 12 0 6.6274 5.37258 12 12 12zm-3.53811-18.05347c-.30793.78589-.46189 1.73658-.46189 2.85205v5.01962h5.6197v-5.59004h-2.5789v-.07605c0-1.01406.2566-1.82531.7698-2.43375.5389-.63379 1.1804-1.05209 1.9245-1.2549v-2.28164c-.7441.07605-1.4626.25351-2.1555.53238-.6928.27887-1.3086.68449-1.84752 1.21688-.51321.53238-.9366 1.2042-1.27019 2.01545z' fill='currentColor' fill-rule='evenodd'/></svg></i><p	class='typography typography--size-36-text js-typography blockquote__quote'
	data-id='es-877'
	>
	AI security systems process network traffic, user activities, access logs, and Indicators of Compromise (IoC) in real time, identifying threats faster than any human ever could.</p>
		<div class="blockquote__caption-wrap">
					</div>
	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-881"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-879">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-880'
	>
	This job is performed by various advanced tools that have successfully integrated AI into their solutions. Beyond detecting threats, they’re also evolving to include capabilities such as:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-884"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-882">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-883'
	>
	<li>Learning from historical attack patterns</li><li>Predictive analytics to anticipate attacks</li><li>Automated responses to specific types of attacks</li><li>Vulnerability scanning on autopilot</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-887"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-885">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-886'
	>
	And this is just the beginning. AI’s potential stretches toward advanced threat detection, autonomous security systems, proactive threat hunting, and AI-driven incident response – all on the horizon and ready to redefine what’s possible in cybersecurity.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-890"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-888">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-889'
	>
	AI in cyber attacks</h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-893"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-891">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-892'
	>
	The<a href="https://www.weforum.org/publications/global-cybersecurity-outlook-2025/digest/" target="_blank" rel="noreferrer noopener"> WEF Global Cybersecurity Outlook 2025</a> notes that:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-895"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-18-text-roman js-typography block-highlighted-text__typography'
	data-id='es-894'
	>
	<em>Nearly 47% of organizations cite adversarial advances powered by generative AI (GenAI) as their primary concern, enabling more sophisticated and scalable attacks. In 2024 there was a sharp increase in phishing and social engineering attacks, with 42% of organizations reporting such incidents.</em></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-898"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-896">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-897'
	>
	Why manually craft <a href="https://infinum.com/social-engineering-testing-services/">social engineering attacks</a> when AI can churn out endless variations with minimal time, effort, or investment? And it’s not just emails – deepfake attacks have also skyrocketed in 2024, with <a href="https://www.entrust.com/company/newsroom/deepfake-attacks-strike-every-five-minutes-amid-244-surge-in-digital-document-forgeries" target="_blank" rel="noreferrer noopener">Entrust reporting</a> one attempt every five minutes on average.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-901"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-899">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-900'
	>
	Pair that with <a href="https://www.mcafee.com/blogs/privacy-identity-protection/artificial-imposters-cybercriminals-turn-to-ai-voice-cloning-for-a-new-breed-of-scam/" target="_blank" rel="noreferrer noopener">McAfee&#8217;s study</a> showing that 70% of people are unsure whether they can tell the difference between a cloned voice and the real thing, and you&#8217;ve got real cause for concern in the upcoming years.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-904"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-902">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-903'
	>
	And when it comes to threats to AI and ML systems themselves, <a href="https://owasp.org/www-project-machine-learning-security-top-10/" target="_blank" rel="noreferrer noopener">OWASP ML Top 10</a> is a valuable resource for those interested in security testing and exploring the wealth of attack scenarios. The list covers input manipulation, model poisoning, and more critical vulnerabilities.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-907"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-905">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-906'
	>
	Reining in AI?</h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-910"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-908">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-909'
	>
	As AI continues to grow in power and influence, so do the calls to regulate it. The potential for misuse, alongside the security and <a href="https://infinum.com/blog/generative-ai-vs-responsible-ai/" target="_blank" rel="noreferrer noopener">ethical risks it presents</a>, has prompted a wave of new frameworks and legislation. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-914"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="blockquote block-blockquote__blockquote" data-id="es-911">
	
	<div class="blockquote__content">
		<i
	class="icon blockquote__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='blockquote-24' data-id='es-912'>
	<svg fill='none' height='24' viewBox='0 0 24 24' width='24' xmlns='http://www.w3.org/2000/svg'><path clip-rule='evenodd' d='m12 24c6.6274 0 12-5.3726 12-12 0-2.79685-.9568-5.37021-2.561-7.41062-.581.22951-1.0832.60583-1.5069 1.12898-.5132.60844-.7698 1.41969-.7698 2.43375v.07605h2.5789v5.59004h-5.6197v-5.01962c0-1.11547.154-2.06616.4619-2.85205.3336-.81125.757-1.48307 1.2702-2.01545.528-.52161 1.1175-.92155 1.7687-1.1998-2.0728-1.70651-4.7279-2.73128-7.6223-2.73128-6.62742 0-12 5.37258-12 12 0 6.6274 5.37258 12 12 12zm-3.53811-18.05347c-.30793.78589-.46189 1.73658-.46189 2.85205v5.01962h5.6197v-5.59004h-2.5789v-.07605c0-1.01406.2566-1.82531.7698-2.43375.5389-.63379 1.1804-1.05209 1.9245-1.2549v-2.28164c-.7441.07605-1.4626.25351-2.1555.53238-.6928.27887-1.3086.68449-1.84752 1.21688-.51321.53238-.9366 1.2042-1.27019 2.01545z' fill='currentColor' fill-rule='evenodd'/></svg></i><p	class='typography typography--size-36-text js-typography blockquote__quote'
	data-id='es-913'
	>
	Trump&#8217;s rescinding of the Biden Administration&#8217;s executive order underscores how politics, artificial intelligence, and cybersecurity are becoming deeply intertwined.</p>
		<div class="blockquote__caption-wrap">
					</div>
	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-917"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-915">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-916'
	>
	For example, the International Organization for Standardization (ISO) has introduced <a href="https://www.iso.org/standard/81230.html" target="_blank" rel="noreferrer noopener">ISO 42001</a>, providing organizations with a framework for managing risks associated with AI-powered systems.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-920"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-918">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-919'
	>
	The <a href="https://digital-strategy.ec.europa.eu/en/policies/regulatory-framework-ai" target="_blank" rel="noreferrer noopener">EU&#8217;s AI Act</a>, which entered into force on August 1, 2024, establishes a harmonized regulatory framework for AI across member states. It categorizes AI systems based on risk levels – minimal, limited, high, and unacceptable – and imposes corresponding requirements. High-risk AI systems, especially in sectors like healthcare and law enforcement, face stringent obligations to ensure transparency, data governance, and human oversight. The Act also bans certain practices, such as real-time remote biometric identification in public spaces, with limited exceptions.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-923"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-921">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-922'
	>
	In the US, in the absence of comprehensive federal AI legislation, individual states are stepping in, such as Colorado with its <a href="https://leg.colorado.gov/bills/sb24-205" target="_blank" rel="noreferrer noopener">AI Act</a>. In 2023, the Biden Administration issued an <a href="https://www.engadget.com/sweeping-white-house-ai-executive-order-takes-aim-at-the-technologys-toughest-challenges-090008655.html" target="_blank" rel="noreferrer noopener">executive order</a> on AI regulation, only to be <a href="https://www.engadget.com/ai/trump-executive-order-rescinds-bidens-ai-framework-012825311.html?guccounter=1" target="_blank" rel="noreferrer noopener">rescinded</a> on Trump’s first day back in office. This underscores how politics, AI, and cybersecurity are becoming deeply intertwined and leaves us wondering how this story will unfold in the year ahead.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-926"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-924">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-925'
	>
	While we still have a long way to go, it’s clear that steps are being taken in the right direction.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-929"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-927">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-928'
	>
	Moles in the supply chain</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-932"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-930">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-931'
	>
	As businesses fortify their defenses against direct attacks, hackers are shifting focus to a more indirect route: the <a href="https://infinum.com/blog/software-supply-chain-security/">supply chain</a>. By exploiting vulnerabilities in third-party suppliers and service providers, attackers can slip through the cracks and gain backdoor access to sensitive IT systems. In environments where IT connects to operational technology, manufacturing lines, energy grids, and water treatment, that backdoor access can escalate from a data breach into a physical disruption. Understanding <a href="https://infinum.com/what-is-ot-security/">OT security</a> and how IT/OT convergence expands the attack surface is increasingly relevant for any organization running industrial or critical infrastructure.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-935"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-933">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-934'
	>
	One recent example of this growing threat is the <a href="https://www.cyberhaven.com/blog/cyberhavens-chrome-extension-security-incident-and-what-were-doing-about-it" target="_blank" rel="noreferrer noopener">Cyberhaven Chrome Extension hack</a>, where an employee&#8217;s account was hacked in a phishing attack. This allowed attackers to publish a malicious version of Cyberhaven&#8217;s Chrome extension so they could steal browser cookies and authentication sessions. The irony here is that the extension’s very purpose is preventing unauthorized data exfiltration.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-938"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-936">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-937'
	>
	Another notable incident occurred in December 2024, when the US Treasury <a href="https://www.forbes.com/sites/daveywinder/2025/01/02/us-treasury-hacked-fbi-investigation-underway-china-suspected/" target="_blank" rel="noreferrer noopener">fell victim to a cyberattack attributed to a Chinese state-sponsored actor</a>. The hackers exploited vulnerabilities in a third-party remote tech support product, demonstrating the risks of relying on external vendors. Experts predict these types of breaches will only increase in 2025.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-941"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-939">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-940'
	>
	To combat these threats, businesses must take proactive steps to assess and monitor their suppliers, ensuring they meet strict security standards. Key measures include:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-944"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-942">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-943'
	>
	<li>Implementing robust supplier risk management practices</li><li>Securing the software development pipeline</li><li>Keeping software and systems up to date</li><li>Enforcing strong access controls</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-947"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-945">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-946'
	>
	By finding and addressing their security vulnerabilities, organizations can better protect themselves from becoming the next victim of a supply chain attack.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-953"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-948"
	 target='_blank' rel='noopener noreferrer' href='https://infinum.com/cybersecurity/penetration-testing/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<p	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-949'
	>
	<strong><strong>Supply chain vulnerabilities can open the door for attackers—don’t let them. Penetration testing is your first line of defense to uncover and address hidden risks.</strong></strong></p>		</div>

		<button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-950"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-951'
	>
	Learn more </div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-952'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-956"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-954">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-955'
	>
	Disorder in the cloud</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-959"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-957">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-958'
	>
	Cloud adoption continues its steady rise, cementing its role as a key component of modern business operations. According to <a href="https://www.g2.com/articles/cloud-computing-statistics" target="_blank" rel="noreferrer noopener">G2&#8217;s recent report on cloud statistics</a>:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-962"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-960">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-961'
	>
	<li>94% of enterprise organizations use cloud computing.</li><li>Over 60% of all corporate data resides in cloud storage.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-966"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="blockquote block-blockquote__blockquote" data-id="es-963">
	
	<div class="blockquote__content">
		<i
	class="icon blockquote__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='blockquote-24' data-id='es-964'>
	<svg fill='none' height='24' viewBox='0 0 24 24' width='24' xmlns='http://www.w3.org/2000/svg'><path clip-rule='evenodd' d='m12 24c6.6274 0 12-5.3726 12-12 0-2.79685-.9568-5.37021-2.561-7.41062-.581.22951-1.0832.60583-1.5069 1.12898-.5132.60844-.7698 1.41969-.7698 2.43375v.07605h2.5789v5.59004h-5.6197v-5.01962c0-1.11547.154-2.06616.4619-2.85205.3336-.81125.757-1.48307 1.2702-2.01545.528-.52161 1.1175-.92155 1.7687-1.1998-2.0728-1.70651-4.7279-2.73128-7.6223-2.73128-6.62742 0-12 5.37258-12 12 0 6.6274 5.37258 12 12 12zm-3.53811-18.05347c-.30793.78589-.46189 1.73658-.46189 2.85205v5.01962h5.6197v-5.59004h-2.5789v-.07605c0-1.01406.2566-1.82531.7698-2.43375.5389-.63379 1.1804-1.05209 1.9245-1.2549v-2.28164c-.7441.07605-1.4626.25351-2.1555.53238-.6928.27887-1.3086.68449-1.84752 1.21688-.51321.53238-.9366 1.2042-1.27019 2.01545z' fill='currentColor' fill-rule='evenodd'/></svg></i><p	class='typography typography--size-36-text js-typography blockquote__quote'
	data-id='es-965'
	>
	Attackers can easily take advantage of vulnerabilities in the cloud, especially if one assumes the “shared responsibility model” actually means “the provider is 100% responsible for security.”</p>
		<div class="blockquote__caption-wrap">
					</div>
	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-969"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-967">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-968'
	>
	However, as businesses increasingly lean on the cloud, its security challenges become harder to ignore. Over the years, we have identified several cloud security threats that vigilant attackers can see as low-hanging fruit:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-972"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-970">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-971'
	>
	<li><strong>Misconfigurations</strong> (e.g., overly permissive access controls or publicly exposed storage) remain the primary entryway, accounting for more than 30% of cloud data breaches.</li><li><strong>Weak authentication and credential reuse</strong> make it easier for attackers to gain unauthorized access.</li><li><strong>Inadequate monitoring and poor backup practices</strong> create blind spots and vulnerabilities ripe for exploitation.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-975"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-973">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-974'
	>
	Together, this can be a perfect storm for attackers to exploit, especially if one assumes the “shared responsibility model” actually means “the provider is 100% responsible for security.”</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-978"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-976">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-977'
	>
	But it’s not all doom and gloom. The zero trust security model, which operates on the principle of &#8220;never trust, always verify,&#8221; is gaining widespread adoption. This approach enhances network security and reduces the risk of unauthorized access by requiring continuous verification of users and devices, regardless of their location.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-981"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-979">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-980'
	>
	Additionally, Cloud Security Posture Management (CSPM) tools, such as <a href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-cloud-introduction" target="_blank" rel="noreferrer noopener">Microsoft Defender for Cloud</a>), are becoming essential for identifying vulnerabilities and maintaining secure cloud configurations. By combining these with Identity and Access Management (IAM) practices, organizations can ensure that only legitimate users interact with cloud resources.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-984"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-982">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-983'
	>
	In 2025, DevSecOps teams worldwide will be keeping busy architecting and implementing cloud environments that are more resilient to these challenges, ensuring businesses can harness the cloud’s benefits without compromising security.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-987"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-985">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-986'
	>
	The ransomware threat</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-990"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-988">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-989'
	>
	According to Google&#8217;s<a href="https://cloud.google.com/security/resources/cybersecurity-forecast"> Cybersecurity Forecast 2025</a>:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-992"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-18-text-roman js-typography block-highlighted-text__typography'
	data-id='es-991'
	>
	<em><em>Ransomware, data theft extortion, and multifaceted extortion are, and will continue to be in 2025, the most disruptive type of cybercrime globally – both due to the volume of incidents and the scope of potential damage for each event.</em></em></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-995"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-993">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-994'
	>
	The numbers from 2024 back this up. Comparitech&#8217;s <a href="https://www.comparitech.com/news/ransomware-roundup-2024-end-of-year-report/" target="_blank" rel="noreferrer noopener">Randsomware roundup: 2024 end-of-year report</a> reveals that nearly 200 million records were compromised last year, and over $133 million was paid in ransoms, with the average payment reaching a staggering $9,5 million. Finance and healthcare institutions bore the brunt of these attacks, with attackers deploying more than two dozen ransomware strains to exploit vulnerabilities in these sectors.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-998"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-996">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-997'
	>
	And that’s just what’s been reported. The true scale of ransomware incidents is outside anyone&#8217;s reach. One thing is clear, though: the ransomware economy is thriving, and its upward trajectory will likely continue in 2025.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1001"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-999">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1000'
	>
	Regulations, regulations, regulations</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1004"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1002">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1003'
	>
	Cybersecurity regulations are evolving rapidly, keeping businesses, governments, and individuals on high alert. As cyber threats grow more sophisticated, global and regional frameworks like the <a href="https://infinum.com/blog/eu-cybersecurity-legislation-nis2-dora/" target="_blank" rel="noreferrer noopener">European Union&#8217;s NIS2, DORA</a>, and CRA are pushing private companies and public institutions to rethink their cyber defenses.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1007"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1005">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1006'
	>
	In the US, a significant step was taken on January 16, 2025, with an <a href="https://www.securityweek.com/biden-executive-order-aims-to-shore-up-us-cyber-defenses/">executive order</a> mandating adherence to minimum security standards. The order addresses a wide range of priorities, including anticipating foreign cyberattacks and preparing for the emerging threats posed by quantum computing.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1010"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1008">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1009'
	>
	While they may be demanding, these regulations serve an important purpose: fostering a culture of vigilance, accountability, and proactive risk management. Cybersecurity is no longer a siloed concern – it’s a shared responsibility across all sectors.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1013"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1011">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1012'
	>
	Infinum recommends: how to stay cyber-safe in 2025</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1016"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1014">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1015'
	>
	Knowing what’s trending in the cybersecurity space is important, but staying safe requires action. Here are five key recommendations from Infinum’s cybersecurity team to help secure your systems in 2025:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1021"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--number bullet__color--infinum block-bullet__bullet" data-id="es-1017">
	<p	class='typography typography--size-14-text js-typography bullet__dot'
	data-id='es-1018'
	>
	1</p>	<div class="bullet__content">
		<h3	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-1019'
	>
	<strong>Start with regular risk assessments.</strong></h3><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1020'
	>
	In today’s threat landscape, fostering a culture of security is non-negotiable. Run It’s never too late to begin conducting risk assessments. Regularly perform <a href="https://infinum.com/blog/why-penetration-testing-is-important/" target="_blank" rel="noreferrer noopener">penetration testing</a> (or <a href="https://infinum.com/cybersecurity/penetration-testing/" target="_blank" rel="noreferrer noopener">let us do it for you</a>) and vulnerability assessments of your applications, networks, and infrastructure. Don’t forget to evaluate third-party and supply-chain security risks – these proactive measures go a long way in identifying potential vulnerabilities before attackers do.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1026"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--number bullet__color--infinum block-bullet__bullet" data-id="es-1022">
	<p	class='typography typography--size-14-text js-typography bullet__dot'
	data-id='es-1023'
	>
	2</p>	<div class="bullet__content">
		<h3	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-1024'
	>
	<strong>Build a security-first culture.</strong></h3><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1025'
	>
	In today’s threat landscape, fostering a culture of security is non-negotiable. Run regular and up-to-date cybersecurity training for all employees, use <a href="https://infinum.com/blog/how-do-phishing-simulations-contribute-to-enterprise-security/" target="_blank" rel="noreferrer noopener">phishing simulation</a> tools, and maintain basic cyber hygiene. These steps are the actual low-hanging fruit for strengthening your defenses and building resilience across your organization.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1031"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--number bullet__color--infinum block-bullet__bullet" data-id="es-1027">
	<p	class='typography typography--size-14-text js-typography bullet__dot'
	data-id='es-1028'
	>
	3</p>	<div class="bullet__content">
		<h3	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-1029'
	>
	<strong>Integrate security into every stage of development.</strong></h3><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1030'
	>
	For software development companies (or the ones you partner with), implementing a <a href="https://infinum.com/blog/ssdlc-application-security/" target="_blank" rel="noreferrer noopener">Secure Software Development Lifecycle (SSDLC)</a> and fostering a DevSecOps culture ensures security is never left for last in the endless cycle of changes, upgrades, and patches.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1036"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--number bullet__color--infinum block-bullet__bullet" data-id="es-1032">
	<p	class='typography typography--size-14-text js-typography bullet__dot'
	data-id='es-1033'
	>
	4</p>	<div class="bullet__content">
		<h3	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-1034'
	>
	<strong>Test and refine your incident response and business continuity plans.</strong></h3><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1035'
	>
	Policies alone aren’t enough. Ensure your incident response and business continuity plans are up-to-date and have been tested in real-world scenarios. The time to discover gaps in your plan is before a disaster strikes.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1041"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--number bullet__color--infinum block-bullet__bullet" data-id="es-1037">
	<p	class='typography typography--size-14-text js-typography bullet__dot'
	data-id='es-1038'
	>
	5</p>	<div class="bullet__content">
		<h3	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-1039'
	>
	<strong>Prioritize collaboration around security.</strong></h3><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1040'
	>
	While it may be tempting to delegate security to a specialized team, effective cybersecurity depends on strong communication and alignment across management and technical leadership. After all, cybersecurity is everyone’s business.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1044"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1042">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1043'
	>
	Make 2025 the year of resilience</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1047"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1045">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1046'
	>
	The cybersecurity landscape will only become more dynamic in 2025. Regardless of your industry or company size, meeting this year’s challenges will demand adaptability, expertise, and constant vigilance.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1050"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1048">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1049'
	>
	If you’re looking for a partner to help you navigate these complexities – or to tackle specific activities from our recommendation list (we offer most of them) – head over to our <a href="https://infinum.com/cybersecurity/" target="_blank" rel="noreferrer noopener">Cybersecurity page</a> for more information. Together, we can make 2025 a safer year for your business.</p></div>	</div>
</div>
</div>		</div>
	</div><p>The post <a href="https://infinum.com/blog/cybersecurity-trends-2025/">Cybersecurity Trends 2025: Threats, Hacks, and Counterattacks</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</content:encoded>
			</item>
					<item>
				<image>
					<url>19256644https://infinum.com/uploads/2024/08/How_to_make_Software_Development_more_Secure-hero-min.webp</url>
				</image>
				<title>Level Up Your SDLC to SSDLC for Ultimate Application Security</title>
				<link>https://infinum.com/blog/ssdlc-application-security/</link>
				<pubDate>Thu, 08 Aug 2024 14:30:37 +0000</pubDate>
				<dc:creator>Neven Matas</dc:creator>
				<guid isPermaLink="false">https://infinum.com/?p=19256644</guid>
				<description>
					<![CDATA[<p>Discover how adopting the Secure Development Life Cycle (SSDLC) can strengthen your application's security against ever-evolving cyber threats.</p>
<p>The post <a href="https://infinum.com/blog/ssdlc-application-security/">Level Up Your SDLC to SSDLC for Ultimate Application Security</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</description>
				<content:encoded>
					<![CDATA[<div
	class="wrapper"
	data-id="es-1141"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-1053">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1056"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1054">
	<p	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-1055'
	>
	<strong>Security is a dish best served throughout the development process. Find out how adopting the Secure Software Development Life Cycle (SSDLC) protects your application from ever-evolving dangers in the digital space.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1059"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1057">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1058'
	>
	In today’s software development world, there is so much to think about: quality code, continuous integration and development, cloud environments, high performance and availability, top-notch user experience… The list goes on. However, one aspect that genuinely ties it all together is <a href="https://infinum.com/cybersecurity/">cybersecurity</a>. Or, in this case, application security.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1062"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1060">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1061'
	>
	Why is this so important? You can have the most beautiful windows and the finest furniture in the world, but they’re of little use if the first gust of wind brings the whole building down. And as we know, the winds, tornadoes, hurricanes, and earthquakes of cyber threats <a href="https://infinum.com/blog/cybersecurity-trends-2024/" target="_blank" rel="noreferrer noopener">show no signs of letting up</a>.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1065"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1063">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1064'
	>
	And this isn’t just about product team responsibility anymore, it’s a legal requirement.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1068"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1066">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1067'
	>
	The <a href="https://infinum.com/blog/cyber-resilience-act/" target="_blank" rel="noreferrer noopener"><strong>Cyber Resilience Act</strong></a>, taking effect throughout 2026, introduces mandatory cybersecurity rules for digital products sold in the EU. It’s part of a broader push to raise digital resilience and will directly impact how products are designed, built, and maintained.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1071"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1069">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1070'
	>
	This is where the Secure Software Development Life Cycle (SSDLC) comes in. Often mentioned alongside the phrase “shift left,” the methodology emphasizes the importance of integrating security practices throughout the development process. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1074"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1072">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1073'
	>
	This challenge is compounded when teams use AI-assisted development. Our research into <a href="https://infinum.com/blog/ai-generated-code-security-risks/">AI-generated code security risks</a> shows that even <a href="https://infinum.com/blog/security-gaps-in-vibe-coded-applications/" id="https://infinum.com/blog/security-gaps-in-vibe-coded-applications/">detailed security prompts leave significant gaps</a>.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1077"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1075">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1076'
	>
	For mobile applications specifically, this means building in runtime protections from the start — anti-root, anti-hook, and anti-debug mechanisms that resist reverse engineering. <a href="https://infinum.com/blog/understanding-defeating-android-protections/">Our breakdown of Android protection bypass techniques</a> shows exactly what attackers do when those layers are absent or poorly implemented.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1080"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1078">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1079'
	>
	From SDLC to SSDLC</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1083"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1081">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1082'
	>
	Let’s start with the first abbreviation: a software development lifecycle (SDLC) is a set of rules and processes a team uses to design, develop, test, deploy, and maintain software. Some of them are standard, like waterfall or XP, but in practice, there are as many specific SDLCs as development teams worldwide. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1086"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1084">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1085'
	>
	You could probably bet that as soon as <a href="https://en.wikipedia.org/wiki/Ada_Lovelace" target="_blank" rel="noreferrer noopener">Ada Lovelace</a> wrote the first computer program, someone started to wonder, “Hmmm, how do we formalize this?” The fact is, when we standardize a process, it tends to run more smoothly. And considering that software gets shipped by the truckload every day, those SDLCs seem to be working. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1089"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1087">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1088'
	>
	So, why would we want to shift anything anywhere?</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1092"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1090">
	<h3	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-1091'
	>
	The ‘shift left’ approach</h3></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1095"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1093">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1094'
	>
	The metaphor refers to moving a process to an earlier point in the development lifecycle, moving it left on an imagined project timeline. Some may argue that &#8220;shift left&#8221; is a buzzword or a worn-out phrase in software development, but it is essential nonetheless. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1097"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-1096'
	>
	Security calls for an urgent shift left. When we implement security practices at every step of the development process, SDLC becomes SSDLC. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1100"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1098">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1099'
	>
	Almost anyone working on a development project wants to get involved earlier on in the cycle – nobody wants to finish the race last. Years ago, it was software testers; they didn’t want the aforementioned truckload of software passed on to them without prior knowledge or involvement. Changes in development culture and test automation did, to a degree, manage to get them there.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1103"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1101">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1102'
	>
	Today, security calls for its own shift left. Thus, SDLC becomes SSDLC – Secure Software Development Lifecycle.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1106"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1104">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1105'
	>
	One way to achieve this goal is to adopt a DevSecOps culture, something that teams worldwide are already doing, and with relative success. The DevSecOps methodology is based on key principles such as automation, collaboration, and continuous monitoring. As the name suggests, it involves security teams working alongside development teams and operations to bake in security practices at every stage of the process. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1109"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1107">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1108'
	>
	Microsoft’s<a href="https://www.microsoft.com/en-us/securityengineering/sdl" target="_blank" rel="noreferrer noopener"> Security Development Lifecycle</a> and NIST’s<a href="https://csrc.nist.gov/Projects/ssdf" target="_blank" rel="noreferrer noopener"> Secure Software Development Framework</a> can also serve as examples. These methods may not be directly comparable, but the main idea is the same – to infuse every stage of the SDLC with security thinking and introduce activities that ensure the product is resilient and robust.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1115"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-1110"
	 target='_blank' rel='noopener noreferrer' href='https://infinum.com/cybersecurity/penetration-testing/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<p	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-1111'
	>
	Securing your business from cyberattacks requires a holistic approach, and penetration testing is a key component. Explore our pentesting services to identify vulnerabilities early and ensure your application is protected.</p>		</div>

		<button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-1112"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-1113'
	>
	Find out more </div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-1114'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1118"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1116">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1117'
	>
	The benefits of adding the “S”</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1121"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1119">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1120'
	>
	A worrying statistic from<a href="https://www.it-cisq.org/" target="_blank" rel="noreferrer noopener"> CISQ</a> and<a href="https://www.synopsys.com/" target="_blank" rel="noreferrer noopener"> Synopsys</a> (albeit from 2022) notes that “<em>the cost of poor software quality in the U.S.—which includes cyberattacks [&#8230;], complex issues involving the <a href="https://infinum.com/blog/software-supply-chain-security/">software supply chain</a>, and the growing impact of rapidly accumulating technical debt—will total approximately $2.41 trillion.”</em></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1124"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1122">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1123'
	>
	Of course, everyone wants, needs, and expects their applications to be secure by design and default. But let’s unpack this and illuminate what exactly you are getting by integrating security considerations into your SDLC:&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1127"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-1125">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-1126'
	>
	<li>Higher code quality and reliability, less technical debt</li><li>Early detection and eradication of security vulnerabilities and a reduced attack surface</li><li>Faster development and cost-savings by eliminating rework</li><li>Meeting legal security requirements to prevent fines and penalties and avoid release delays</li><li>Protection of sensitive data and prevention of breaches</li><li>Continuous <a href="https://infinum.com/enterprise-cyber-risk-management/" id="https://infinum.com/enterprise-cyber-risk-management/">risk management</a></li><li>Incident response preparedness and quick recovery</li><li>Long-term stability, scalability, and competitive differentiation</li><li>Protection of reputation and ensuring customer trust</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1130"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1128">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1129'
	>
	A big promise? When done right, security initiatives can indeed have that much of an impact. And it may sound like a distant dream, but achieving a secure software environment is well within reach.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1133"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1131">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1132'
	>
	OWASP SAMM as a starting point for SSDLC</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1136"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1134">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1135'
	>
	We’ve mentioned a couple of “frameworks” that can serve as a basis for instilling security into your development process. However, knowing what and how to implement requires assessing the current state. It’s hard to fix anything when you’re working in the dark. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1139"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1137">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1138'
	>
	This is where the<a href="https://owasp.org/www-project-samm/" target="_blank" rel="noreferrer noopener"> OWASP Software Assurance Maturity Model</a> (SAMM) comes in handy. According to its creators, the model is designed to help organizations of all types analyze and improve their security posture effectively and measurably. It covers the entire software lifecycle and is adaptable to various technologies and processes, being both evolutive and risk-driven.</p></div>	</div>
</div>
</div>		</div>
	</div>

<div
	class="wrapper"
	data-id="es-1144"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-media">
	<div	class="media block-media__media media__border--none media__align--center-center"
	data-id="es-1142"
	 data-media-type='image'>

	<figure class="image block-media__image-figure image--size-stretch" data-id="es-1143">
	<picture class="image__picture block-media__image-picture">
								
			<source
				srcset=https://infinum.com/uploads/2024/08/How_to_make_Software_Development_more_Secure-inarticle-1400x735.webp				media='(max-width: 699px)'
				type=image/webp								height="735"
												width="1400"
				 />
												<img
					src="https://infinum.com/uploads/2024/08/How_to_make_Software_Development_more_Secure-inarticle.webp"
					class="image__img block-media__image-img"
					alt=""
										height="1260"
															width="2400"
										loading="lazy"
					 />
					</picture>

			<figcaption class="image__figcaption block-media__image-figcaption">
			OWASP Software Assurance Maturity Model		</figcaption>
	</figure></div></div>		</div>
	</div>

<div
	class="wrapper"
	data-id="es-1207"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-1145">
	

</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1148"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1146">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1147'
	>
	In essence, SAMM is divided into five distinct business functions, each consisting of three security practices. These practices can be scored on a 1-3 maturity scale, and voilà – you get some “measurable” indication of how much security is built into your processes.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1151"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1149">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1150'
	>
	As is always the case with software development, the whole thing is highly contextual. The goal is not to get a maximum score but to assess and minimize the security risk in relation to <em>your</em> industry and <em>your </em>product so you can gradually improve your security posture.&nbsp;&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1154"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1152">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1153'
	>
	No one has ever built a bulletproof process, but state-of-the-art locks and guardrails are better than leaving your door completely open.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1157"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1155">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1156'
	>
	How to go about implementing the model?</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1160"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1158">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1159'
	>
	Your SSDLC stages may not perfectly align with the OWASP SAMM model, but the important thing is to define what&#8217;s crucial for your particular product and business.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1163"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1161">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1162'
	>
	One of the model’s biggest benefits is that it helps your organization determine where it stands on its journey toward software assurance and what it needs to do to move to a next level of maturity.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1166"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1164">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1165'
	>
	The whole implementation process is described in <a href="https://owaspsamm.org/guidance/quick-start-guide/" target="_blank" rel="noreferrer noopener">OWASP’s official documentation</a>, and it includes the following steps:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1170"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-1167">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-1168'
	>
	Prepare</p><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1169'
	>
	Defining the scope of the initiative and identifying the stakeholders.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1174"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-1171">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-1172'
	>
	Assess</p><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1173'
	>
	Evaluating the current practices and determining their maturity level. </p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1178"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-1175">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-1176'
	>
	Set the target</p><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1177'
	>
	Defining which activities we want to improve and what impact this will have on the entire organization.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1182"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-1179">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-1180'
	>
	Define the plan</p><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1181'
	>
	Determining a precise schedule for introducing the changes. </p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1186"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-1183">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-1184'
	>
	Implement</p><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1185'
	>
	Implementing all the activities, considering their impact on processes, people, knowledge, and tools. </p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1190"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--dot bullet__color--infinum block-bullet__bullet" data-id="es-1187">
			<div class="bullet__dot"></div>
		<div class="bullet__content">
		<p	class='typography typography--size-20-text js-typography bullet__heading'
	data-id='es-1188'
	>
	Roll out</p><p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1189'
	>
	Making all the changes visible for everyone involved through education and training; measuring their adoption.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1193"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1191">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1192'
	>
	It may seem like a lot to take in, but once you start adopting a security mindset, you see how vast the area for improvement can be. And hopefully, once you start implementing those improvements, you realize that so are the benefits.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1196"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1194">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1195'
	>
	Time to make that shift to SSDLC</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1199"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1197">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1198'
	>
	Hardening software development practices is no longer a point of contention but a business and technical necessity – at least if you want to make your product stable, resilient, and long-lasting in today’s out-of-control cyber environment.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1202"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1200">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1201'
	>
	Just as a building&#8217;s strength relies on its robust steel rails rather than mere aesthetics, software security depends on rigorous, integrated security measures throughout the development lifecycle.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1205"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1203">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1204'
	>
	To make that shift left, you first need to shift security up on your list of priorities. And if you need any help leveling-up your SDLC to SSDLC, check out our <a href="//infinum.com/cybersecurity/" target="_blank" rel="noreferrer noopener">cybersecurity services</a>. </p></div>	</div>
</div>
</div>		</div>
	</div><p>The post <a href="https://infinum.com/blog/ssdlc-application-security/">Level Up Your SDLC to SSDLC for Ultimate Application Security</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</content:encoded>
			</item>
					<item>
				<image>
					<url>19256461https://infinum.com/uploads/2024/07/CrowdStrike_incident-hero.webp</url>
				</image>
				<title>Patch Me If You Can – 3 Takeaways from the CrowdStrike Crisis</title>
				<link>https://infinum.com/blog/crowdstrike-3-takeaways/</link>
				<pubDate>Tue, 30 Jul 2024 19:01:05 +0000</pubDate>
				<dc:creator>Neven Matas</dc:creator>
				<guid isPermaLink="false">https://infinum.com/?p=19256461</guid>
				<description>
					<![CDATA[<p>Infinum's SecOps team director shares what we can learn from the incident that got 8,5 million screens worldwide singing the blues.</p>
<p>The post <a href="https://infinum.com/blog/crowdstrike-3-takeaways/">Patch Me If You Can – 3 Takeaways from the CrowdStrike Crisis</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</description>
				<content:encoded>
					<![CDATA[<div
	class="wrapper"
	data-id="es-1317"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-1208">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1211"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1209">
	<p	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-1210'
	>
	<strong>Our SecOps team director shares what we can learn from the incident that got 8,5 million screens worldwide singing the blues.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1214"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1212">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1213'
	>
	On July 19th, we witnessed one of the most significant IT outages in history, caused by a problematic update of CrowdStrike’s Falcon Sensor platform. The numbers are staggering: more than 8 million devices were affected, more than 5,000 flights were canceled, and the total damage is assessed at 10 billion USD.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1217"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1215">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1216'
	>
	In the software industry, there’s a well-known principle that one should be extra careful when deploying changes on a Friday. Especially to 100% of your customers, all at the same time.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1220"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1218">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1219'
	>
	However, this is not the only lesson we can take away from this incident that caused worldwide havoc.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1223"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1221">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1222'
	>
	Testing will never go out of fashion</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1226"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1224">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1225'
	>
	Even though CrowdStrike is a cybersecurity company, this was not a security incident. It’s the oldest story in the book—a seemingly trivial change that broke everything.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1229"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1227">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1228'
	>
	This time it came in the shape of a faulty configuration update to CrowdStrike’s security software that was supposed to improve gathering information on potential threats. The update inadvertently caused recurring BSODs (“blue screen of death” –&nbsp; a critical error that indicates a system crash) on Windows machines worldwide, resulting in a historic disruption of daily life, businesses, and governments.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1232"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1230">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1231'
	>
	Everyone in software development and testing knows that minor changes are often the most dangerous ones because they can easily fly under the radar.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1236"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="blockquote block-blockquote__blockquote" data-id="es-1233">
	
	<div class="blockquote__content">
		<i
	class="icon blockquote__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='blockquote-24' data-id='es-1234'>
	<svg fill='none' height='24' viewBox='0 0 24 24' width='24' xmlns='http://www.w3.org/2000/svg'><path clip-rule='evenodd' d='m12 24c6.6274 0 12-5.3726 12-12 0-2.79685-.9568-5.37021-2.561-7.41062-.581.22951-1.0832.60583-1.5069 1.12898-.5132.60844-.7698 1.41969-.7698 2.43375v.07605h2.5789v5.59004h-5.6197v-5.01962c0-1.11547.154-2.06616.4619-2.85205.3336-.81125.757-1.48307 1.2702-2.01545.528-.52161 1.1175-.92155 1.7687-1.1998-2.0728-1.70651-4.7279-2.73128-7.6223-2.73128-6.62742 0-12 5.37258-12 12 0 6.6274 5.37258 12 12 12zm-3.53811-18.05347c-.30793.78589-.46189 1.73658-.46189 2.85205v5.01962h5.6197v-5.59004h-2.5789v-.07605c0-1.01406.2566-1.82531.7698-2.43375.5389-.63379 1.1804-1.05209 1.9245-1.2549v-2.28164c-.7441.07605-1.4626.25351-2.1555.53238-.6928.27887-1.3086.68449-1.84752 1.21688-.51321.53238-.9366 1.2042-1.27019 2.01545z' fill='currentColor' fill-rule='evenodd'/></svg></i><p	class='typography typography--size-36-text js-typography blockquote__quote'
	data-id='es-1235'
	>
	<strong>In the supercharged, fast-paced environment where software is delivered, it is worth reminding ourselves that critical software requires more focus on quality, diligent testing, and intelligent investigation. The alternative can have global ramifications.</strong></p>
		<div class="blockquote__caption-wrap">
					</div>
	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1239"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1237">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1238'
	>
	As<a href="https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/" target="_blank" rel="noreferrer noopener"> CrowdStrike’s post-mortem</a> identifies, the tool they used for verifying the update had an issue, which meant the faulty patch went into production with the underlying problem undetected. It’s interesting to note the improvements to their process that CrowdStrike announced to implement after the incident: </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1242"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-1240">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-1241'
	>
	<li>Local developer testing</li><li>Content update and rollback testing</li><li>Stress testing, fuzzing, and fault injection</li><li>Stability testing</li><li>Content interface testing</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1245"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1243">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1244'
	>
	Any QA specialist will immediately recognize some of these as no more than common, everyday software testing processes. So why would a company as serious as CrowdStrike wait for a crisis of this magnitude to fortify its testing and deployment processes? We can only speculate, but someone somewhere must have declared the above a technical redundancy and prioritized deployment speed above all else. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1248"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1246">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1247'
	>
	Unfortunately, it isn’t just CrowdStrike. The industry has been trying to proclaim testing dead for decades, pushing to replace the entire trade with automated checks running on CI/CD platforms. “If it’s green, we’re good to go!” is today’s modus operandi.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1251"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1249">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1250'
	>
	Yet, in the supercharged, fast-paced environment where software is delivered, it is worth reminding ourselves that critical software requires more focus on quality, diligent testing, and intelligent investigation. The alternative, as this case has shown, can have global ramifications.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1258"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-1252"
	 target='_blank' rel='noopener noreferrer' href='https://infinum.com/cybersecurity/penetration-testing/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<p	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-1253'
	>
	Securing your business from cyberattacks requires a holistic approach. Testing is crucial, but real-world threats go beyond software bugs. Explore our pentesting services and discover any vulnerabilities in your system before malicious actors do.</p>		</div>

		<button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-1255"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-1256'
	>
	Find out more </div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-1257'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1261"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1259">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1260'
	>
	Massive outages are a breeding ground for cybercrime</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1264"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1262">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1263'
	>
	It’s not just that planes stopped flying for a day or two; incidents of this scale open up ample opportunities for additional damage. One could say that every significant IT issue is a cybersecurity issue waiting to happen.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1268"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="blockquote block-blockquote__blockquote" data-id="es-1265">
	
	<div class="blockquote__content">
		<i
	class="icon blockquote__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='blockquote-24' data-id='es-1266'>
	<svg fill='none' height='24' viewBox='0 0 24 24' width='24' xmlns='http://www.w3.org/2000/svg'><path clip-rule='evenodd' d='m12 24c6.6274 0 12-5.3726 12-12 0-2.79685-.9568-5.37021-2.561-7.41062-.581.22951-1.0832.60583-1.5069 1.12898-.5132.60844-.7698 1.41969-.7698 2.43375v.07605h2.5789v5.59004h-5.6197v-5.01962c0-1.11547.154-2.06616.4619-2.85205.3336-.81125.757-1.48307 1.2702-2.01545.528-.52161 1.1175-.92155 1.7687-1.1998-2.0728-1.70651-4.7279-2.73128-7.6223-2.73128-6.62742 0-12 5.37258-12 12 0 6.6274 5.37258 12 12 12zm-3.53811-18.05347c-.30793.78589-.46189 1.73658-.46189 2.85205v5.01962h5.6197v-5.59004h-2.5789v-.07605c0-1.01406.2566-1.82531.7698-2.43375.5389-.63379 1.1804-1.05209 1.9245-1.2549v-2.28164c-.7441.07605-1.4626.25351-2.1555.53238-.6928.27887-1.3086.68449-1.84752 1.21688-.51321.53238-.9366 1.2042-1.27019 2.01545z' fill='currentColor' fill-rule='evenodd'/></svg></i><p	class='typography typography--size-36-text js-typography blockquote__quote'
	data-id='es-1267'
	>
	<strong>Panic, a rapidly developing situation, and a lack of education means a perfect storm for social engineering scams of all shapes and sizes.</strong></p>
		<div class="blockquote__caption-wrap">
					</div>
	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1271"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1269">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1270'
	>
	Immediately after the outage was reported, panic ensued and every IT technician in the world was looking into ways to bring the system back from the dead. However, not every IT technician had passed security awareness training and had enough composure to weed out the scams from legitimate fixes. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1274"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1272">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1273'
	>
	Panic, a rapidly developing situation, and a lack of education means a perfect storm for s<a href="https://infinum.com/social-engineering-testing-services/">ocial engineering scams</a> of all shapes and sizes. Indeed, cybercriminals started impersonating CrowdStrike employees and shipping malicious “fixes” in record time to penetrate someone’s weakened defenses.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1277"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1275">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1276'
	>
	As noticed in <a href="https://blog.knowbe4.com/crowdstrike-phishing-attacks-appear-in-record-time" target="_blank" rel="noreferrer noopener">a blog post from KnowBe4’s CEO</a>:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1279"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-24-text-roman js-typography block-highlighted-text__typography'
	data-id='es-1278'
	>
	<em>Within hours of mass IT outages [&#8230;], a surge of new domains began appearing online, all sharing one common factor: the name CrowdStrike. As the company grapples with a global tech outage that has delayed flights and disrupted emergency services, opportunistic cybercriminals are quick to exploit the chaos.</em></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1282"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1280">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1281'
	>
	It’s hard not to notice the irony of “fixes” for a malfunctioning cybersecurity product being actual cyber-attacks. But that’s our world, and it won’t get any simpler soon.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1285"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1283">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1284'
	>
	Preparation and training are crucial</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1288"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1286">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1287'
	>
	One thing is sure—this is not the first issue of its kind, and it won&#8217;t be the last. We can (and should) take all the steps to prevent such incidents from happening, but there is no 100% guarantee. So how can we reduce their harmful effects?</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1291"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1289">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1290'
	>
	When a massive outage takes place, good incident response plans, readily available technical staff, and clear mitigation steps will help soften the blow. The <a href="https://infinum.com/blog/axios-npm-supply-chain-attack/">axios npm supply chain attack in March 2026</a> is a recent example of exactly this. A malicious package with 100 million weekly downloads was live for under three hours — organizations with version pinning, lockfile enforcement, and <code>--ignore-scripts</code> in CI were protected. Those without had a window of exposure measured in hours, with consequences that may take weeks to fully assess.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1294"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1292">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1293'
	>
	Coming into such situations utterly unprepared on the operations side of things is something no company can afford today, especially if their business depends almost wholly on digital systems.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1297"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1295">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1296'
	>
	Further, we don&#8217;t want to make a bad situation worse by having someone fall for a scam mid-crisis, so we need to focus on strengthening every company’s weakest link – its employees. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1300"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1298">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1299'
	>
	Unless you want to<a href="https://thehackernews.com/2021/03/solarwinds-blame-intern-for-weak.html" target="_blank" rel="noreferrer noopener"> blame interns for a major scandal</a>, security awareness training is crucial. An employee who can recognize a scam will not introduce additional risk into a system already on the brink of collapse. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1303"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1301">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1302'
	>
	Complementing that with up-to-date and followed security policies will result in an organization that enters chaos with less risk and more assurance that working order will be restored in no time.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1306"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1304">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1305'
	>
	Food for thought?</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1309"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1307">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1308'
	>
	As media outlets move on to the next big story and CrowdStrike’s marketing department works to develop a strategy to repair the reputational damage, everyone else would be wise to focus on the lessons we can learn from the incident.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1312"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1310">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1311'
	>
	The event has underlined the importance of rigorous testing, the ever-present threat of cybercrime, and the necessity of robust preparation and training for incident prevention and response. As we navigate an increasingly digital world, <a href="https://infinum.com/blog/cybersecurity-trends-2024/" target="_blank" rel="noreferrer noopener">the threats keep multyplying</a>, and you should double-check your systems and processes are fortified against them. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1315"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1313">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1314'
	>
	<em>If you feel like your company could work on these areas, we have some resources to get you started. Here’s </em><a href="https://infinum.com/blog/how-do-phishing-simulations-contribute-to-enterprise-security/" target="_blank" rel="noreferrer noopener"><em>how phishing simulations contribute to enterprise security</em></a><em>, and if you need any assistance, you can always check out our </em><a href="https://infinum.com/cybersecurity/" target="_blank" rel="noreferrer noopener"><em>cybersecurity services</em></a><em>. </em></p></div>	</div>
</div>
</div>		</div>
	</div><p>The post <a href="https://infinum.com/blog/crowdstrike-3-takeaways/">Patch Me If You Can – 3 Takeaways from the CrowdStrike Crisis</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</content:encoded>
			</item>
					<item>
				<image>
					<url>19255734https://infinum.com/uploads/2024/07/What_do_NIS2_and_DORA_mean_for_your_business-hero-min.webp</url>
				</image>
				<title>NIS2 and DORA, the Power Couple of EU Cybersecurity Legislation</title>
				<link>https://infinum.com/blog/eu-cybersecurity-legislation-nis2-dora/</link>
				<pubDate>Thu, 04 Jul 2024 11:57:07 +0000</pubDate>
				<dc:creator>Neven Matas</dc:creator>
				<guid isPermaLink="false">https://infinum.com/?p=19255734</guid>
				<description>
					<![CDATA[<p>We demystify NIS2 and DORA, the two powerful pieces of cybersecurity legislation in the EU, and explain what they mean for your business.</p>
<p>The post <a href="https://infinum.com/blog/eu-cybersecurity-legislation-nis2-dora/">NIS2 and DORA, the Power Couple of EU Cybersecurity Legislation</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</description>
				<content:encoded>
					<![CDATA[<div
	class="wrapper"
	data-id="es-1487"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-1318">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1321"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1319">
	<p	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-1320'
	>
	The European Union has introduced two powerful pieces of cybersecurity legislation aiming to reshape the digital defenses of businesses across the continent. We take you through NIS2 and DORA and explain what they mean for your organization.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1324"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1322">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1323'
	>
	A number of cybersecurity-related acronyms have been floating around the European Union in the past couple of years. The main ones are, in no particular order: <a href="https://digital-strategy.ec.europa.eu/en/policies/nis2-directive" target="_blank" rel="noreferrer noopener">NIS2</a>, <a href="https://www.esma.europa.eu/esmas-activities/digital-finance-and-innovation/digital-operational-resilience-act-dora" target="_blank" rel="noreferrer noopener">DORA</a>, <a href="https://digital-strategy.ec.europa.eu/en/policies/cyber-resilience-act" target="_blank" rel="noreferrer noopener">CRA</a>, and <a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_23_3992" target="_blank" rel="noreferrer noopener">CER</a>. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1327"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1325">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1326'
	>
	<span class='screen-reader-text'>They are all either part of or related to the EU Cybersecurity Strategy aiming to increase resilience in an increasingly complex, critical, and dangerous cyberspace, with the ultimate goal of creating a safer society.</span><span aria-hidden='true'>They are all either part of or related to the <a href="https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-policies" target="_blank" rel="noreferrer noopener">EU Cybersecurity Strategy</a> aiming to <strong>increase resilience</strong> in an increasingly complex, critical, and dangerous cyberspace, with the ultimate goal of creating a <strong>safer society</strong>.</span></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1330"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1328">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1329'
	>
	While NIS2 and DORA regulate how organizations operate, the <a href="https://infinum.com/blog/cyber-resilience-act/" target="_blank" rel="noreferrer noopener">Cyber Resilience Act </a>regulates what certain organizations build, and <a href="https://eur-lex.europa.eu/eli/dir/2022/2557/oj/eng" target="_blank" rel="noreferrer noopener">Critical Entities Resilience </a>enforces stricter, all-hazard resilience measures for critical infrastructure across 11 sectors. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1333"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1331">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1332'
	>
	<span class='screen-reader-text'>Most of the above will have a major impact on businesses big and small, yet the dense language and large amounts of legal text and cross-references make getting to the core ideas quite a task. </span><span aria-hidden='true'>Most of the above will have a <strong>major impact on businesses</strong> big and small, yet the dense language and large amounts of legal text and cross-references make getting to the core ideas quite a task. </span></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1336"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1334">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1335'
	>
	<span class='screen-reader-text'>In this article, we’ll demystify two major EU cybersecurity regulations whose implementation timelines are drawing near – the NIS2 Directive and DORA. Let’s see how ready you are.</span><span aria-hidden='true'>In this article, we’ll demystify two major EU cybersecurity regulations whose <strong>implementation timelines </strong>are drawing near – the <strong><a href="https://infinum.com/cybersecurity/nis2-compliance-services/" id="https://infinum.com/cybersecurity/nis2-compliance-services/">NIS2 Directive</a></strong> and <strong>DORA</strong>. Let’s see how ready you are.</span></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1339"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1337">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1338'
	>
	What are NIS2 and DORA all about?</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1342"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1340">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1341'
	>
	<span class='screen-reader-text'>NIS2 (Network and Information Security) is an EU directive that builds upon and replaces its 2016 predecessor. The main purpose of NIS was to harden and harmonize the security of network and information systems against cyberattacks in critical sectors such as banking, financial markets, energy, digital infrastructure, health, water, and transportation. The idea was to make sure that both public and private companies implement strong security measures across the board. </span><span aria-hidden='true'>NIS2 (Network and Information Security) is an EU directive that builds upon and replaces its <a href="https://eur-lex.europa.eu/eli/dir/2016/1148/oj" target="_blank" rel="noreferrer noopener">2016 predecessor</a>. The main purpose of NIS was to harden and harmonize the <strong>security of network and information systems</strong> against cyberattacks in <strong>critical sectors</strong> such as banking, financial markets, energy, digital infrastructure, health, water, and transportation. The idea was to make sure that both public and private companies implement strong security measures across the board. </span></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1345"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1343">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1344'
	>
	<strong>The general objectives of NIS were:</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1348"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-1346">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-1347'
	>
	<li><a href="https://infinum.com/enterprise-cyber-risk-management/" id="https://infinum.com/enterprise-cyber-risk-management/">Risk management</a>;</li><li>Defensive measures against cyber attacks;</li><li>Detection of cyber attacks;</li><li>Incident and response management.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1351"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1349">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-1350'
	>
	<strong>NIS2 builds on top of that initial goal</strong> in several ways, chief among them being:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1354"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-1352">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-1353'
	>
	<li>Creating a cyber crisis management structure (<a href="https://www.enisa.europa.eu/topics/eu-incident-response-and-cyber-crisis-management/eu-cyclone">CyCLONe</a>);</li><li>Widening the scope of affected sectors (by adding 11 new sectors to the original 7), effectively adding more than 100 thousand companies to the scope; </li><li>Doubling down on incident reporting, risk assessments, <a href="https://infinum.com/blog/software-supply-chain-security/">managing the supply chain</a>, and other security cybersecurity requirements,</li><li>Imposing personal responsibility and stricter penalties for non-compliance.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1357"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1355">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-1356'
	>
	It’s important to note the word <a href="https://european-union.europa.eu/institutions-law-budget/law/types-legislation_en" target="_blank" rel="noreferrer noopener">directive</a> here:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1360"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1358">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1359'
	>
	<em>A &#8220;directive&#8221; is a legislative act that sets out a goal that EU countries must achieve. However, it is up to individual countries to devise their own laws on how to reach these goals.</em></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1363"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1361">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1362'
	>
	The above means that each member state will have to <strong>transpose NIS2 into their legislation</strong> – by <strong>October 17th, 2024</strong>. Croatia was the first to the finish line by putting the Law on Cybersecurity into force this February. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1366"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1364">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1365'
	>
	Further, by April 17th, 2025, states need to determine which companies will fall within the categories of essential and important entities that are affected by NIS2, which will be regularly updated.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1369"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1367">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1368'
	>
	On the other hand, DORA (Digital Operational Resilience Act) is an EU regulation that must be <strong>applied in its entirety across the EU</strong> as of <strong>January 17th, 2025</strong>. Being a <em>lex specialis</em>, it takes precedence over NIS2 for the relevant organizations.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1372"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1370">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1371'
	>
	DORA primarily focuses on the <strong>financial sector</strong>, which is a high-stakes space and especially vulnerable to cyberattacks. Any downtime or data loss affecting banks, <a href="https://infinum.com/pci-dss-compliance-guide/" id="https://infinum.com/pci-dss-compliance-guide/">payment providers</a>, insurance and investment companies, crypto-asset service providers, or <a href="https://infinum.com/third-party-cyber-risk-management/" id="https://infinum.com/third-party-cyber-risk-management/">critical third parties</a> (such as cloud and data providers) can have <strong>serious repercussions</strong> on the economy at large, making the <strong>resilience of those systems</strong> one of the top priorities.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1375"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1373">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1374'
	>
	Is your business affected by NIS2 and DORA?</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1378"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1376">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1377'
	>
	NIS2 recognizes two categories of companies: <strong>essential and important entities</strong>. The main differences between the two are in the measures these entities must take and how this will be supervised. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1381"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1379">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1380'
	>
	There are certain other criteria that organizations have to meet to fall in either of these categories, the main ones being company size and annual revenue. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1383"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-24-text js-typography block-highlighted-text__typography'
	data-id='es-1382'
	>
	The exact criteria vary by country because each member state defines them in its national legislation, so you should check the local laws to see if the rules apply to you. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1386"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1384">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1385'
	>
	The NIS2 Directive defines <strong>sectors of high criticality</strong> <strong>(essential entities)</strong> as follows:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1389"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-1387">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-1388'
	>
	<li>Banking</li><li>Digital infrastructure</li><li>Drinking water</li><li>Energy</li><li>Financial market infrastructures</li><li>ICT service management (B2B)</li><li>Health</li><li>Public administration</li><li>Transport</li><li>Space</li><li>Waste water</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1392"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1390">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1391'
	>
	It is worth noting that most sectors on this list — energy, transport, drinking water, and waste water rely heavily on operational technology: the industrial control systems, SCADA platforms, and PLCs that manage physical infrastructure. For these organizations, NIS2 compliance is not just an IT exercise; it requires understanding <a href="https://infinum.com/what-is-ot-security/">OT security</a> and how IT/OT convergence creates an additional attack surface that standard IT controls alone do not cover.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1395"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1393">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1394'
	>
	Other <strong>critical sectors (important entities)</strong> include:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1398"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-1396">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-1397'
	>
	<li>Chemicals</li><li>Digital providers</li><li>Food</li><li>Manufacturing</li><li>Postal and courier services</li><li>Research</li><li>Waste management</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1401"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1399">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1400'
	>
	When it comes to DORA, we already mentioned that it focuses on the financial sector. However, this <strong>doesn’t mean it only applies to financial entities</strong>. Companies that provide services to the financial sector are also affected by the act. For example, if you are an ICT vendor to a financial institution, DORA has something to say about your operations as well.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1404"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1402">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1403'
	>
	It’s the same with NIS2 – if you are part of the supply chain, you might be affected since successfully managing “external” risk is crucial in both cases.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1407"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1405">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1406'
	>
	What do NIS2 and DORA requirements mean for your business?</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1410"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1408">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1409'
	>
	The preparation for NIS2 is a relatively complex procedure, but the <strong>high-level steps</strong> can be boiled down to:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1413"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-1411">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-1412'
	>
	<li>Once the EU member state you’re in passes the law, the <strong>categorization of your organization within essential or important entities</strong> will have to be assessed. </li><li>If your company falls within one of the categories, it will be <strong>included in the registry of entities</strong>.</li><li>You will have to map out your <strong>risk management framework</strong> and execute a <strong>gap analysis</strong> to evaluate current compliance with NIS2 and, in certain cases, special cybersecurity regulations (such as DORA).</li><li>Finally, depending on what is determined in the step before, you will need to <strong>amend or implement new policies</strong> in due time on an organization-wide level. This is where the real long-term work lies.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1416"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1414">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1415'
	>
	Sounds simple, doesn’t it? Let’s look at the requirements.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1419"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1417">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1418'
	>
	NIS2 revolves around <strong>implementing an all-hazards (“consider everything”) approach to risk management</strong> to protect network and information systems, including:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1422"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-1420">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-1421'
	>
	<li>Policies on risk analysis and information system security;</li><li>Incident handling;</li><li>Business continuity, such as backup management and disaster recovery, and crisis management;</li><li>Supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers;</li><li>Security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure;&nbsp;</li><li>Policies and procedures to assess the effectiveness of cybersecurity risk-management measures;</li><li>Basic cyber hygiene practices and cybersecurity training;</li><li>Policies and procedures regarding the use of cryptography and, where appropriate, encryption;</li><li>Human resources security, access control policies, and asset management;</li><li>The use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communications and secured emergency communication systems within the entity, where appropriate.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1425"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1423">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1424'
	>
	All of the above is wrapped up with <strong>reporting obligations</strong>, meaning that essential and important entities will be required to <strong>communicate all significant incidents to the local CSIRT</strong> (Computer Security Incident Response Teams) and recipients of their services, i.e. customers. They will also need to inform them about any measures or remedies they can take in response to the threat. The first report must be sent within 24 hours of discovering the incident. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1427"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-24-text js-typography block-highlighted-text__typography'
	data-id='es-1426'
	>
	What does that mean in plain English? No more hiding under the rug. Every incident will have to be reported and documented, which may be both uncomfortable and bothersome for affected companies, but improves the long-term stability of the sector and the safety of the end users.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1430"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1428">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1429'
	>
	DORA further <strong>expands on the above</strong> by covering the following categories:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1433"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-1431">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-1432'
	>
	<li>ICT risk management</li><li>ICT-related incident management, classification, and reporting</li><li>Digital operational resilience testing</li><li>ICT third-party risk management</li><li>Information sharing</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1436"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1434">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1435'
	>
	DORA is somewhat more rigid in its application of <strong>third-party risk management</strong>, mandating contractual obligations between financial organizations and their ICT providers. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1439"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1437">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1438'
	>
	Additionally, while NIS2 compliance can be shown by an audit every two years, DORA prescribes, among other things, a yearly resilience test program. Those tests include:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1442"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-1440">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-1441'
	>
	<li>Vulnerability assessments and scans,</li><li>Open source analyses,</li><li>Network security assessments,</li><li>Gap analyses,</li><li>Physical security reviews,</li><li>Questionnaires and scanning software solutions,&nbsp;</li><li>Source code reviews where feasible,</li><li>Scenario-based tests,</li><li>Compatibility testing,</li><li>Performance testing,</li><li>End-to-end testing and penetration testing.</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1445"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1443">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1444'
	>
	On top of that, an advanced TLPT (threat-led penetration test) is <strong>mandated every three years</strong>.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1448"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1446">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1447'
	>
	Security testers and white hat hackers, rejoice!&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1455"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-1449"
	 target='_blank' rel='noopener noreferrer' href='https://infinum.com/cybersecurity/penetration-testing/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<p	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-1450'
	>
	Keeping your business safe starts with penetration testing—simulated attacks that assess your security posture. Explore our pentesting services and discover any vulnerabilities in your system before malicious actors do.</p>		</div>

		<button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-1452"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-1453'
	>
	Find out more </div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-1454'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1458"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1456">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1457'
	>
	What if your business doesn’t comply?</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1461"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1459">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1460'
	>
	Both NIS2 and DORA come with <strong>significant legal and financial implications</strong> and prescribe stricter supervision.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1464"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1462">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1463'
	>
	To make sure individuals and companies take accountability, NIS2 underlines <strong>personal responsibility for upper management</strong> in case the company fails to comply with certain requirements or doesn’t report security incidents. This could mean the <strong>temporary removal of these individuals from their managerial positions</strong> or other sanctions, depending on the local law implementing NIS2.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1467"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1465">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1466'
	>
	Personal responsibility is topped up with a potential <strong>€7,000,000</strong> (or 1.4% of the total annual worldwide turnover) penalty for important entities and <strong>€10,000,000</strong> (or 2% of the turnover) for essential entities. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1470"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1468">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1469'
	>
	The exact penalties for non-compliance with DORA are yet to be determined by the relevant local authorities, but we already know that critical ICT providers can be fined <strong>up to 1% of the provider’s average daily worldwide turnover</strong>.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1473"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1471">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1472'
	>
	Security is not a nice-to-have</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1476"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1474">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1475'
	>
	For those who aren’t doing so already, the aforementioned should be enough incentive to start taking cybersecurity seriously and building a proactive, transparent, and security-first culture.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1479"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1477">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1478'
	>
	Not to mention this is all part of a larger trend. NIS2 and DORA are, in essence, just some of the pillars on top of which the EU plans to continue expanding its cybersecurity strategy. If your organisation operates within the UK defence supply chain, the equivalent framework is the <a href="https://infinum.com/blog/cyber-security-model-v4/">Cyber Security Model v4</a> — mandatory for all MOD suppliers from December 2025. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1482"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1480">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1481'
	>
	Since digital services are already ubiquitous and manage major parts of our lives, we expect we’ll be writing plenty of articles on the topic in the years to come.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1485"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1483">
	<p	class='typography typography--size-20-text-roman js-typography block-typography__typography'
	data-id='es-1484'
	>
	<em>If you need support in adapting to NIS2 and DORA or just strengthening your security posture, check out our <strong><a href="https://infinum.com/governance-risk-compliance-services/">governance, risk, and compliance services</a></strong> or our broader <strong><a href="https://infinum.com/cybersecurity/">cybersecurity services</a></strong>.</em></p></div>	</div>
</div>
</div>		</div>
	</div><p>The post <a href="https://infinum.com/blog/eu-cybersecurity-legislation-nis2-dora/">NIS2 and DORA, the Power Couple of EU Cybersecurity Legislation</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</content:encoded>
			</item>
					<item>
				<image>
					<url>19253619https://infinum.com/uploads/2024/04/Social_engineering_Phishing_results_blogpost-hero-ig-min.webp</url>
				</image>
				<title>How Do Phishing Simulations Contribute to Enterprise Security?</title>
				<link>https://infinum.com/blog/how-do-phishing-simulations-contribute-to-enterprise-security/</link>
				<pubDate>Fri, 26 Apr 2024 11:26:33 +0000</pubDate>
				<dc:creator>Neven Matas</dc:creator>
				<guid isPermaLink="false">https://infinum.com/?p=19253619</guid>
				<description>
					<![CDATA[<p>Find out and strengthen your defenses by identifying weaknesses and educating your teams.</p>
<p>The post <a href="https://infinum.com/blog/how-do-phishing-simulations-contribute-to-enterprise-security/">How Do Phishing Simulations Contribute to Enterprise Security?</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</description>
				<content:encoded>
					<![CDATA[<div
	class="wrapper"
	data-id="es-1667"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-1488">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1491"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1489">
	<p	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-1490'
	>
	<strong>How do phishing simulations contribute to enterprise security? They enable organizations to identify weak points and educate their teams, boosting the resilience of the primary target of a phishing attack – your people. </strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1494"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1492">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1493'
	>
	Having celebrated its 40th birthday last year, the internet has grown up. However, from its inception to the present day, there has always been something slightly dangerous about it. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1497"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1495">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1496'
	>
	Back in the 1990s, we feared the dialer – a particularly nasty Trojan often disguised as an innocent MP3 file that added zeros to your monthly telephone bill if you didn’t catch it in time.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1500"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1498">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1499'
	>
	Around the same time, another sneaky type of attack emerged – phishing. But unlike the dialer, which eventually went the way of the dodo, phishing never went out of style. In fact, with the emergence of technologies like artificial intelligence, it became even more widespread and sophisticated.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1503"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1501">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1502'
	>
	Phishing targets individuals at large, but it can be particularly dangerous in corporate settings. In this case, a weak link can become a gateway to hurting an entire organization.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1506"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1504">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1505'
	>
	How do phishing simulations contribute to enterprise security? They strengthen those weak links, making them more vigilant and less susceptible to attackers’ deceits.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1513"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-1507"
	 target='_blank' rel='noopener noreferrer' href='https://infinum.com/cybersecurity/penetration-testing/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<p	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-1508'
	>
	Securing your business from cyberattacks requires a holistic approach. While phishing simulations target human vulnerabilities, penetration testing uncovers deeper risks across your entire system. Explore our pentesting services to discover any vulnerabilities in your system before malicious actors do.</p>		</div>

		<button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-1510"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-1511'
	>
	Find out more </div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-1512'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1516"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1514">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1515'
	>
	Phishing 101</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1519"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1517">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1518'
	>
	Phishing is a form of cyber attack in which malicious actors send fraudulent messages impersonating legitimate entities to deceive individuals into revealing sensitive information. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1522"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1520">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1521'
	>
	The scam could have just been called fishing, but the early hacking communities seem to have had a penchant for idiosyncratic spelling (<a href="https://en.wikipedia.org/wiki/Phreaking" target="_blank" rel="noreferrer noopener">phreaking</a> is another example).</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1524"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-1523'
	>
	<strong>Phishing took off in the early 2000s with the meteoric rise of email and social networks. It remains one of the most widespread social engineering tactics to this day.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1527"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1525">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1526'
	>
	The problem with phishing is that it cannot be prevented with a technical solution – it primarily relies on the human factor.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1530"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1528">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1529'
	>
	Any person or company would like nothing more than to delegate their cybersecurity concerns to a newly installed tool so they can go on their merry way enjoying music streaming, cat videos, and instantaneous stock transactions. Unfortunately for both parties, but fortunately for cybercriminals, there is no ready-made patch. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1533"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1531">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1532'
	>
	PEBCAK is another 90s synonym that tells the whole story – Problem Exists Between Computer and Keyboard. In other words, humans are the <a href="https://www.forbes.com/sites/forbestechcouncil/2022/08/26/the-achilles-heel-of-cybersecurity/?sh=7e58ae35a69e" target="_blank" rel="noreferrer noopener">Achilles’ heel of cybersecurity</a>, and perfect phishing material.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1536"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1534">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1535'
	>
	Why phishing works</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1539"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1537">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1538'
	>
	Have you ever wondered why phishing emails are often full of typos and bad grammar? Because it is a cheap and effective method of finding the weakest links. Don&#8217;t worry; an average hacker knows how to use a spell checker, and to make matters worse, in 2024, the <a href="https://en.wikipedia.org/wiki/Advance-fee_scam" target="_blank" rel="noreferrer noopener">Nigerian prince</a> can harness the power of generative AI to do its bidding.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1542"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1540">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1541'
	>
	It is no wonder that the European Council lists <a href="https://www.consilium.europa.eu/en/infographics/cyber-threats-eu/" target="_blank" rel="noreferrer noopener">social engineering among the biggest threats</a> in the digital landscape, noting that 82% of data breaches involve a human element.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1544"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-1543'
	>
	<strong>Phishing relies on our emotional response. You download that attachment or fill in your credentials, trusting the sender is a benevolent actor instead of a criminal using your curiosity, greed, or obedience for monetary gain.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1547"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1545">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1546'
	>
	You could be an average Alice responding to your bank’s supposed request to update your data so that you don&#8217;t lose access to your account or an average Bob wanting to check out the photos from last week’s party. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1550"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1548">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1549'
	>
	You might even be <a href="https://www.theverge.com/2023/3/24/23654996/linus-tech-tips-channel-hack-session-token-elon-musk-crypto-scam" target="_blank" rel="noreferrer noopener">a sales manager on the receiving end of an enticing business proposal that is just one click away</a>. Maybe you really wanted to <a href="https://arstechnica.com/information-technology/2024/02/deepfake-scammer-walks-off-with-25-million-in-first-of-its-kind-ai-heist/" target="_blank" rel="noreferrer noopener">please your deepfake bosses</a>. No firewall in the world could stop that particular adrenaline rush.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1553"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1551">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1552'
	>
	Simulated attacks help combat enterprise-level phishing</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1556"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1554">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1555'
	>
	The risk of phishing attacks is very real. The FBI&#8217;s Internet Crime Complaint Center (IC3) reported <a href="https://www.ic3.gov/Media/PDF/AnnualReport/2023_IC3Report.pdf" target="_blank" rel="noreferrer noopener">almost 300,000 instances of phishing attacks</a> in 2023 alone, making it far and away the most used fraudulent tactic. Business Email Compromise (BEC), closely tied to phishing, translated into almost 3 billion dollars of business losses.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1559"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1557">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1558'
	>
	There are numerous other examples besides the ones mentioned above. One of the most famous ones is how Google and Meta (still Facebook at the time) were <a href="https://www.cpomagazine.com/cyber-security/the-phishing-scam-that-took-google-and-facebook-for-100-million/" target="_blank" rel="noreferrer noopener">duped out of $100 million via fake invoices to their accounting department</a>. Some well-meaning employees likely weren’t properly trained in recognizing these sorts of scams.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1562"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1560">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1561'
	>
	This is exactly the type of situation where a phishing simulation can be the perfect tool.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1564"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-1563'
	>
	<strong>A simulated phishing attack is an undisclosed drill that tests your employees’ vigilance and susceptibility to malicious emails, messages, and other requests to measure your overall security posture. </strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1567"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1565">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1566'
	>
	An effective cybersecurity strategy should always strive to be proactive and one step ahead of the plentiful threats on the horizon. How do phishing simulations contribute to enterprise security? They aim to proactively catch vulnerabilities through real-world scenarios, bolstering the defenses before actual phishing attacks occur.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1570"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1568">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1569'
	>
	If you want to ensure any level of resilience to <a href="https://infinum.com/social-engineering-testing-services/">social engineering attacks</a> that interweave technological and psychological trickery, educating your employees is crucial. But, as we all know, merely sitting in phishing training is the epitome of an ineffective snoozefest that satisfies only the passing auditor. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1573"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1571">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1572'
	>
	To tease out those subconscious decisions into awareness and prevent your employees from falling victim to phishing attacks, you want them to learn from experience. Even one phishing simulation carried out within an organization will decrease the likelihood of compromises among employees.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1576"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1574">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1575'
	>
	How do phishing simulations contribute to enterprise security? We decided to check in practice </h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1579"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1577">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1578'
	>
	They say to sweep before your own door first, so we decided to organize an internal simulated phishing campaign. As we grew and became a multinational company with hundreds of employees, our attack surface grew as well, yet we had no idea how susceptible we might be.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1582"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1580">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1581'
	>
	Seeing as a large percentage of Infinum employees are well-versed in cybersecurity and technology in general, we were confident that the results would reflect this. In other words, we felt we were safe against potential risks and wanted to confirm this.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1585"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1583">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1584'
	>
	This is what we did.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1589"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--number bullet__color--infinum block-bullet__bullet" data-id="es-1586">
	<p	class='typography typography--size-14-text js-typography bullet__dot'
	data-id='es-1587'
	>
	1</p>	<div class="bullet__content">
		<p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1588'
	>
	We defined the objective and timeline of our campaign. In this case, the goal was to determine our employees’ ability to identify phishing.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1593"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--number bullet__color--infinum block-bullet__bullet" data-id="es-1590">
	<p	class='typography typography--size-14-text js-typography bullet__dot'
	data-id='es-1591'
	>
	2</p>	<div class="bullet__content">
		<p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1592'
	>
	We kept very few people in the loop. That included most C-level executives since they are the most probable targets for spear phishing and whaling, given their influence and access rights.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1597"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--number bullet__color--infinum block-bullet__bullet" data-id="es-1594">
	<p	class='typography typography--size-14-text js-typography bullet__dot'
	data-id='es-1595'
	>
	3</p>	<div class="bullet__content">
		<p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1596'
	>
	We whitelisted our attack email server.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1601"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--number bullet__color--infinum block-bullet__bullet" data-id="es-1598">
	<p	class='typography typography--size-14-text js-typography bullet__dot'
	data-id='es-1599'
	>
	4</p>	<div class="bullet__content">
		<p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1600'
	>
	We segmented our employees into random groups so that people next to each other don’t get suspicious emails or messages at the same time.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1605"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--number bullet__color--infinum block-bullet__bullet" data-id="es-1602">
	<p	class='typography typography--size-14-text js-typography bullet__dot'
	data-id='es-1603'
	>
	5</p>	<div class="bullet__content">
		<p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1604'
	>
	We prepared a whole variety of plausible attack scenarios consisting of various convincing phishing emails and landing pages. For example, we shared a folder supposedly containing photos from the company party and a typical warning email that someone was trying to break into the person’s account. </p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1609"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--number bullet__color--infinum block-bullet__bullet" data-id="es-1606">
	<p	class='typography typography--size-14-text js-typography bullet__dot'
	data-id='es-1607'
	>
	6</p>	<div class="bullet__content">
		<p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1608'
	>
	We let the campaign run slowly, for months on end, collecting data on our employees&#8217; interactions.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1613"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--number bullet__color--infinum block-bullet__bullet" data-id="es-1610">
	<p	class='typography typography--size-14-text js-typography bullet__dot'
	data-id='es-1611'
	>
	7</p>	<div class="bullet__content">
		<p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1612'
	>
	We analyzed the data and prepared feedback. Among other metrics, the statistics consisted of open rates, click rates, and compromise rates.</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1616"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1614">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1615'
	>
	After a couple of weeks, we started observing people running in circles on Slack warning each other of spoofing and suspicious emails. At one point, our IT operations specialist disclosed that an attack was underway. You would think that would severely decrease the number of compromises. It didn’t.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1619"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1617">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1618'
	>
	In a particularly ironic plot twist, I almost got hoisted on my own petard. Being the host of one of our company events, I was expecting my colleague to share a folder with various materials. To cut a long story short, I clicked on it but got to my senses before I entered my password. Haste almost got the better of me, and I’m betting the pace is similar at your company too.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1621"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-1620'
	>
	<strong>It only takes one email, text, or phone call</strong><strong> to put your business at risk. It’s not 1998 anymore – encryption, attachment scanning, spam filtering, DKIM, SPF, and DMARC are defaults. We know this, and the attackers know it, too.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1624"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1622">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1623'
	>
	Thousands of emails later, much to our chagrin, the results were in line with the benchmarks for IT companies. Not terrible, but not 0% either, in any of the relevant metrics.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1627"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1625">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1626'
	>
	In the end, we held an all-hands meeting, exchanged a few good laughs, and enrolled everyone into a new and improved security awareness training program. Yes, everyone. The phishing incident has now become a common discussion point, a “did they get you too” icebreaker, at least for the time being.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1630"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1628">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1629'
	>
	Of course, the careful reader will notice that we took some of our defenses down and exclaim that the setup was not realistic. Well, to that I say that it merely expedites the process.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1633"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1631">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1632'
	>
	Protecting your company from real phishing attacks</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1636"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1634">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1635'
	>
	The fact that we are now entering the age of AI might prompt some nostalgia for the good old days when just one simulation or a course was more than enough to stay on top of the game.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1639"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1637">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1638'
	>
	New threats and exploits, remote work, and the barrage of data and communication channels are merely expanding the cybercrime playing field. As we wrote recently, we’re talking about a <a href="https://infinum.com/blog/cybersecurity-trends-2024/" target="_blank" rel="noreferrer noopener">multi-trillion-dollar industry.</a></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1642"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1640">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1641'
	>
	Offense might be the best defense, but in this case, to reinforce best practices in identifying and reporting suspicious activities, we have to consider both. Saying that security awareness training should not be an afterthought is an understatement, to say the least.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1644"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-1643'
	>
	<strong>Nothing can prepare your employees for every scenario, and breaches are always a possibility. This is where a combined strategy of phishing simulations, cyber hygiene, up-to-date tools, security policies, and awareness training shows its ROI.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1647"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1645">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1646'
	>
	To improve and maintain your posture, the following topics should be visited and revisited continuously on a company level:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1650"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-1648">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-1649'
	>
	<li>Identifying threats</li><li>Security protocols</li><li>Password management and password security</li><li>Device security</li><li>Data encryption</li><li>Multi-factor authentication</li><li>Software updates</li><li>Backups</li><li>Incident reporting</li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1653"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1651">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1652'
	>
	By regularly educating your employees on these, you’re already doing a lot to boost your collective’s resilience. To err is human, but humans who know better, err less.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1656"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1654">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1655'
	>
	Phishing simulations turn employees into security ambassadors</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1659"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1657">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1658'
	>
	To protect your company from real phishing attempts and improve your security posture in general, it’s crucial to develop a culture of cybersecurity awareness within your organization.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1662"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1660">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1661'
	>
	Proactive measures like phishing simulation campaigns and continuous security awareness training should be a key component of your broader security strategy. By incorporating these, you empower your employees to become active participants in safeguarding sensitive information instead of just passive recipients of policy and education. In reality, the threats are here to stay, and security is everyone’s responsibility.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1665"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1663">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1664'
	>
	If you need help getting there, check out our <a href="https://infinum.com/cybersecurity/" target="_blank" rel="noreferrer noopener">cybersecurity services</a>. It’s a real link, trust us.</p></div>	</div>
</div>
</div>		</div>
	</div><p>The post <a href="https://infinum.com/blog/how-do-phishing-simulations-contribute-to-enterprise-security/">How Do Phishing Simulations Contribute to Enterprise Security?</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</content:encoded>
			</item>
					<item>
				<image>
					<url>50070https://infinum.com/uploads/2024/02/Cybersecurity-predictions-hero.webp</url>
				</image>
				<title>Beyond the Biggest Breach – 2024 Cybersecurity Trends to Watch</title>
				<link>https://infinum.com/blog/cybersecurity-trends-2024/</link>
				<pubDate>Thu, 01 Feb 2024 14:55:47 +0000</pubDate>
				<dc:creator>Neven Matas</dc:creator>
				<guid isPermaLink="false">https://infinum.com/?p=50070</guid>
				<description>
					<![CDATA[<p>As a supermassive data breach brings security in the spotlight, we identify the cybersecurity trends that will help you navigate 2024's digital landscape.</p>
<p>The post <a href="https://infinum.com/blog/cybersecurity-trends-2024/">Beyond the Biggest Breach – 2024 Cybersecurity Trends to Watch</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</description>
				<content:encoded>
					<![CDATA[<div
	class="wrapper"
	data-id="es-1731"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-1668">
	</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1671"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1669">
	<p	class='typography typography--size-36-text js-typography block-typography__typography'
	data-id='es-1670'
	>
	<strong>As a supermassive data breach brings security once again to the center of attention, we identify the cybersecurity trends that will help you navigate the digital landscape in 2024.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1674"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1672">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1673'
	>
	If cybersecurity wasn’t that high on your list of priorities, the year 2024 seems to be gearing up to adapt your perspective. Before we even got through its first month, the tech media headlines were ablaze with the story of <a href="https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/" target="_blank" rel="noreferrer noopener">MOAB – the mother of all breaches</a>. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1677"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1675">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1676'
	>
	The only things we used to call <em>supermassive </em>were black holes. Today, this adjective is used to describe data leaks. At the center of MOAB is a never-before-seen volume of 26 billion records of leaked user data that can be leveraged by malicious actors for a wide range of attacks.&nbsp;&nbsp;&nbsp;&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1680"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1678">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1679'
	>
	The numbers alone rightfully send chills down the spine of both company leaders and end users. However, they should also serve as motivation for both to turn a fresh leaf and define new cybersecurity goals and strategies.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1683"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1681">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1682'
	>
	To give you an idea of what you might expect, we present cybersecurity trends likely to shape the digital landscape in 2024.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1689"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-1684"
	 target='_blank' rel='noopener noreferrer' href='https://infinum.com/cybersecurity/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<p	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-1685'
	>
	<strong><strong>Our cybersecurity engineers make your company and software more resilient to cyberattacks, backed by 20 years of experience in building secure digital solutions.</strong></strong></p>		</div>

		<button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-1686"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-1687'
	>
	Explore cybersecurity services </div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-1688'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1692"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1690">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1691'
	>
	Cybercrime will be a booming business</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1695"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1693">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1694'
	>
	What are the dangers of the aforementioned MOAB? The leaked data contains user credentials, but also other sensitive information, all valuable to bad actors.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1698"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1696">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1697'
	>
	You’ve probably reused your private or business credentials at least once, right? Well, that makes it easier to fall victim to cyber threats called <a href="https://owasp.org/www-community/attacks/Credential_stuffing" target="_blank" rel="noreferrer noopener">credential stuffing</a> and <a href="https://owasp.org/www-community/attacks/Password_Spraying_Attack" target="_blank" rel="noreferrer noopener">password spraying</a>. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1701"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1699">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1700'
	>
	There’s so much data circulating online that anyone who doesn’t practice ample amounts of cyber hygiene almost automatically becomes a target. For instance, that’s exactly what happened to <a href="https://arstechnica.com/security/2024/01/microsoft-network-breached-through-password-spraying-by-russian-state-hackers/" target="_blank" rel="noreferrer noopener">senior Microsoft execs</a>.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1704"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1702">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1703'
	>
	With the current conflicts going on in the world and the ensuing <a href="https://www.forbes.com/sites/johnwasik/2023/11/01/israel-gaza-war-has-triggered-more-charity-scams-heres-4-ways-to-avoid-getting-swindled/?sh=11308d2f2f91" target="_blank" rel="noreferrer noopener">charity frauds</a>, the upcoming US elections, and the Summer Olympics, the threat landscape of 2024 is shaping up to be very dynamic.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1706"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-1705'
	>
	<a href="https://cybersecurityventures.com/cybercrime-to-cost-the-world-9-trillion-annually-in-2024/" target="_blank" rel="noreferrer noopener"><strong>Cybersecurity Ventures</strong></a><strong> predicts that cybercrime will cost the world $9.5 trillion in 2024. If this were a country’s GDP, you’d be looking at the world’s third-largest economy after the U.S. and China<em>.</em></strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1709"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1707">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1708'
	>
	All of the aforementioned in the context of a <a href="https://www.nist.gov/system/files/documents/2023/06/05/NICE%20FactSheet_Workforce%20Demand_Final_20211202.pdf" target="_blank" rel="noreferrer noopener">3,4 million person global shortage of cybersecurity professionals</a> seems to be brewing a perfect storm for making cybercrime an ever more lucrative business.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1712"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1710">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1711'
	>
	Artificial intelligence will be weaponized for phishing attacks</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1715"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1713">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1714'
	>
	It almost feels like there’s no realm of human endeavor left untouched by the AI revolution we’re witnessing, and it&#8217;s impossible to have a conversation about cybersecurity trends without mentioning it. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1718"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1716">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1717'
	>
	We could wax lyrical about the different ways in which the technology will improve cybersecurity both on the defensive and the offensive side of things, but let’s focus on just one type of social engineering attacks, and that is phishing.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1721"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1719">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1720'
	>
	In the days of yore, one had to at least spend some time preparing a series of semi-coherent texts that would lure their victims into clicking on the “Get your green card now!” button. Nowadays, getting a nice proofread email is a matter of entering a simple prompt into your large language model of choice.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1723"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-1722'
	>
	<strong>You might be using ChatGPT to draft an email to your landlord, but to someone else, generative AI tools are probably the best shortcut to scamming unassuming victims since the invention of </strong><a href="https://en.wikipedia.org/wiki/AOHell" target="_blank" rel="noreferrer noopener"><strong>AOHell</strong></a><strong>. </strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1726"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1724">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1725'
	>
	And this is just one way bad actors might be using artificial intelligence. What about deep fakes? Getting an audio recording of your parents asking you for an urgent wire transfer because their belongings got stolen in transit is far from a science-fiction scenario. It’s a particularly vile example of <a href="https://en.wikipedia.org/wiki/Voice_phishing" target="_blank" rel="noreferrer noopener">vishing</a> combined with <a href="https://en.wikipedia.org/wiki/Phishing#Spear_phishing" target="_blank" rel="noreferrer noopener">spear phishing</a> (yes, these are actual words) that will only become more prevalent as technology advances. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1729"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1727">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1728'
	>
	While the danger there is you getting eked out of a few hundred bucks, similarly placed attacks on a somewhat gullible business executive (think <a href="https://www.microsoft.com/en-us/security/business/security-101/what-is-business-email-compromise-bec" target="_blank" rel="noreferrer noopener">Business Email Compromise</a> 2.0) could have catastrophic consequences for both organizations and their end-users. BEC is already one of the most costly scams for organizations, amounting to more than 50 billion dollars in losses as per the <strong>FBI’s 2023 public service announcement</strong>. No one is safe, not even high-tech companies like <a href="https://www.scmagazine.com/news/facebook-and-google-hit-with-100m-bec-scam" target="_blank" rel="noreferrer noopener">Meta and Google</a>.</p></div>	</div>
</div>
</div>		</div>
	</div>

<div
	class="wrapper"
	data-id="es-1734"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-media">
	<a	class="media block-media__media media__border--none media__align--center-center"
	data-id="es-1732"
	 target='_blank' rel='&quot;noopener noreferrer&quot;' data-media-type='image' href='https://infinum.com/blog/why-penetration-testing-is-important/'>

	<figure class="image block-media__image-figure image--size-stretch" data-id="es-1733">
	<picture class="image__picture block-media__image-picture">
												<img
					src="https://infinum.com/uploads/2024/02/pentesting-in-text-1.webp"
					class="image__img block-media__image-img"
					alt=""
										height="630"
															width="1120"
										loading="lazy"
					 />
					</picture>

			<figcaption class="image__figcaption block-media__image-figcaption">
			An excellent method for making your company’s security infrastructure airtight is penetration testing. <a href="https://infinum.com/blog/why-penetration-testing-is-important/" target="_blank" rel="noreferrer noopener">Check out THE RElated article</a>. 		</figcaption>
	</figure></a></div>		</div>
	</div>

<div
	class="wrapper"
	data-id="es-1859"
	 data-animation-target='inner-items'>
		
			<div class="wrapper__inner">
			<div class="block-blog-content js-block-blog-content">
	
<div class="block-blog-content-sidebar" data-id="es-1735">
	

</div>

<div class="block-blog-content-main">
	
<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1738"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1736">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1737'
	>
	Today, it’s an email or a WhatsApp message, but it could also be voice, video, or a combination of those. It’s a brave new world. <a href="https://www3.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2024.pdf" target="_blank" rel="noreferrer noopener">WEF’s Global Cybersecurity Outlook 2024</a> mentions that <em>fewer than one in 10 respondents* believe that in the next two years, generative AI will give the advantage to defenders over attackers. </em>(*out of 120 executives surveyed at World Economic Forum’s Annual Meeting on Cybersecurity)</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1741"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1739">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1740'
	>
	So what’s the lesson here? Keep your eyes open and trust no one, not even your deepfake parents and business partners. One thing you can do is run continuous phishing simulation campaigns and security awareness training.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1744"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1742">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1743'
	>
	Since the security landscape is changing along with all other advancements in technology, educating employees and hardening your infrastructure and security policies are crucial for minimizing risk, year in and year out.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1747"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1745">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1746'
	>
	IoT systems will be under attack</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1750"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1748">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1749'
	>
	We’ve talked about <a href="https://infinum.com/blog/secure-iot-connectivity/" target="_blank" rel="noreferrer noopener">securing IoT connectivity</a> on your home or office network before, but this topic is by no means done and dusted.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1753"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1751">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1752'
	>
	Taking just a simple look around, you could surely name at least five things connected to the internet right now. Your car is probably one of them. And even if it isn’t, the next one will be.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1756"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1754">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1755'
	>
	Your gut feeling might point in the direction of a car’s infotainment system as a potential point of breach. You trust that Android Auto or Apple CarPlay use state-of-the-art protection and think nothing of the potential threats.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1759"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1757">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1758'
	>
	Unfortunately, that’s not where the story ends. Most of the code running on your car’s plentiful hardware has nothing to do with the infotainment system. Think about vulnerable EV stations, OTA updates, 24/7 connectivity, keyless car theft… and you’ll quickly figure out that cars have an enormous attack surface that will only get bigger with time.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1762"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1760">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1761'
	>
	The car is just one of your many gadgets connected to the internet. What about wearables, smart appliances, voice assistants, smart doorbells, security cameras…? How often do you update all of these devices? How often does anyone? Is anyone making us do so?</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1765"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1763">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1764'
	>
	And personal devices are only the beginning. It’s IoT all the way down to industrial manufacturing and smart cities.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1767"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-1766'
	>
	<strong>IoT systems harness massive potential for improving our quality of life. However, with an estimated </strong><a href="https://iot-analytics.com/number-connected-iot-devices"><strong>16.7 billion connected endpoints in 2023</strong></a><strong>, </strong>the attack surface is becoming increasingly large and risky for both companies and end users. </p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1770"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1768">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1769'
	>
	The <a href="https://cisomag.com/amazons-ring-slammed-with-federal-lawsuit/" target="_blank" rel="noreferrer noopener">class action lawsuit filed against Amazon’s Ring</a> last year is just one of the examples in recent memory that proves the point that IoT security is not an endeavor to be taken lightly.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1773"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1771">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1772'
	>
	DevSecOps will evolve from buzzword to standard practice</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1776"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1774">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1775'
	>
	Cybersecurity (cybersec) seems to have a penchant for weird acronyms. One of those is <a href="https://about.gitlab.com/topics/devsecops/" target="_blank" rel="noreferrer noopener">DevSecOps</a>, and we’d say you’ll either be hearing about it a lot or we’re all collectively moving in the wrong direction.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1779"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1777">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1778'
	>
	We realized long ago that a collaborative culture, agile principles, continuous integration/development, and built-in quality are the norm when it comes to digital products. That’s all fine and dandy but also somewhat half-baked if not permeated by a security-first mindset.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1782"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1780">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1781'
	>
	Enter “Sec” in “DevSecOps” – creating a way of working wherein development, security, and operations are all intertwined every step of the way to accommodate for the rapid deployment so necessary in modern software development.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1785"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1783">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1784'
	>
	Security can no longer be treated as an afterthought. In practice, this means it’s prime time to shift left and move towards a zero-trust mindset, from the smallest start-up to the biggest long-running corporation.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1787"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-highlighted-text">
	<p	class='typography typography--size-36-text js-typography block-highlighted-text__typography'
	data-id='es-1786'
	>
	<strong>We could assemble a list of security breaches that could have been harder to accomplish by baking security into the software development lifecycle, but our editor frowns at blog posts more than 50 pages long.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1790"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1788">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1789'
	>
	Running SAST, DAST SCA and other scanners in the pipeline is a commendable starting point but it still only scratches the surface. A proper secure software development lifecycle starts with strategy and ends with production observability. Doing a “let’s just tick the checkbox” pre-production penetration test won’t cut it in the future. Going beyond mere cybersecurity trends, DevSecOps will be the way to go, and DevSecOps means thinking about security early, seriously, and making it a group effort.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1796"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<a	class="card-simple js-card-simple card-simple--is-ad block-card__card-simple card-simple--has-link js-card-simple-link card-simple__content-align--left"
	data-id="es-1791"
	 target='_blank' rel='noopener noreferrer' href='https://infinum.com/cybersecurity/penetration-testing/'>

	
	
	<div class="card-simple__content">
		<div class="card-simple__heading-wrap">
			<p	class='typography typography--size-24-text js-typography card-simple__heading'
	data-id='es-1792'
	>
	Safe is better than sorry, and pentensting is better done sooner than later. Explore our pentesting services and discover any vulnerabilities in your system before malicious actors do.</p>		</div>

		<button	class="btn btn--color-infinum btn--size-small btn--width-default btn__icon-position--right card-simple__btn js-block-card-btn js-card-simple-link"
	data-id="es-1793"
	 tabindex='-1'>
		<div class="btn__inner">
					<div	class='typography typography--size-none js-typography btn__label'
	data-id='es-1794'
	>
	Find out more </div>		
		<i
	class="icon btn__icon icon--size-16 icon--scale-100"
	 aria-hidden='true' data-name='arrow-right-16' data-id='es-1795'>
	<svg fill='none' height='16' viewBox='0 0 17 16' width='17' xmlns='http://www.w3.org/2000/svg' xmlns:xlink='http://www.w3.org/1999/xlink'><g stroke='currentColor' stroke-width='2'><path d='m.5 7.99999 14 .00001'/><path d='m9.23352 2.7251 5.97848 5.97852'/><path d='m9.23352 13.2744 5.97848-5.9785'/></g></svg></i>	</div>
	</button>	</div>
</a>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1799"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1797">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1798'
	>
	Regulations will drive change</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1802"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1800">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1801'
	>
	In our selection of cybersecurity trends, there are a couple more acronyms that you will probably be hearing about in 2024. In the EU especially, those are NIS2 and DORA. Let’s break them down:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1805"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1803">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1804'
	>
	The NIS2 (<a href="https://nis2directive.eu/what-is-nis2/" target="_blank" rel="noreferrer noopener">Network and Information Security Directive 2</a>) <em>aims to </em><strong><em>enhance the security of network and information systems within the EU</em></strong><em> by requiring operators of critical infrastructure and essential services to implement appropriate security measures and report any incidents to the relevant authorities. </em></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1808"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1806">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1807'
	>
	<strong>EU member states have until October 17th, 2024 to transpose this directive into law.</strong> Complying with it is a complex topic but boils down to the following (as per the <a href="https://nis2directive.eu/nis2-requirements/" target="_blank" rel="noreferrer noopener">NIS2 requirements</a>):</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1811"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="lists" data-id="es-1809">
	<ul	class='typography typography--size-16-text-roman js-typography lists__typography'
	data-id='es-1810'
	>
	<li>Risk assessments and security policies for information systems</li><li>Policies and procedures for evaluating the effectiveness of security measures</li><li>Policies and procedures for the use of cryptography and, when relevant, encryption</li><li>A plan for handling security incidents</li><li>Security around the procurement of systems and the development and operation of systems</li><li>Cybersecurity training and practice for basic computer hygiene</li><li>Security procedures for employees with access to sensitive or important data, including policies for data access</li><li>A plan for managing business operations during and after a security incident</li><li>The use of multi-factor authentication</li><li><a href="https://infinum.com/blog/software-supply-chain-security/">Security around supply chains</a> and the relationship between the company and direct suppliers </li></ul></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1814"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1812">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1813'
	>
	DORA, or the <a href="https://www.digital-operational-resilience-act.com/" target="_blank" rel="noreferrer noopener">Digital Operational Resilience Act</a>, is a regulation that comes on top of NIS2, focuses on the financial sector, and <strong>will</strong> <strong>apply in all EU member states starting January 17th, 2025.</strong></p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1817"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1815">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1816'
	>
	It focuses on the following:</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1821"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--number bullet__color--infinum block-bullet__bullet" data-id="es-1818">
	<p	class='typography typography--size-14-text js-typography bullet__dot'
	data-id='es-1819'
	>
	1</p>	<div class="bullet__content">
		<p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1820'
	>
	ICT risk management</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1825"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--number bullet__color--infinum block-bullet__bullet" data-id="es-1822">
	<p	class='typography typography--size-14-text js-typography bullet__dot'
	data-id='es-1823'
	>
	2</p>	<div class="bullet__content">
		<p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1824'
	>
	ICT third-party risk management</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1829"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--number bullet__color--infinum block-bullet__bullet" data-id="es-1826">
	<p	class='typography typography--size-14-text js-typography bullet__dot'
	data-id='es-1827'
	>
	3</p>	<div class="bullet__content">
		<p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1828'
	>
	Digital operational resilience testing</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1833"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="bullet bullet--left bullet__type--number bullet__color--infinum block-bullet__bullet" data-id="es-1830">
	<p	class='typography typography--size-14-text js-typography bullet__dot'
	data-id='es-1831'
	>
	4</p>	<div class="bullet__content">
		<p	class='typography typography--size-20-text-roman js-typography bullet__paragraph'
	data-id='es-1832'
	>
	ICT-related incident management, classification, and reporting</p>	</div>
</div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1836"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1834">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1835'
	>
	Additionally, March 31, 2024 marks the <a href="https://endoflife.date/pci-dss" target="_blank" rel="noreferrer noopener">retirement date for PCI DSS v3.2.1</a>. With future-dated requirements becoming effective a year after that, organizations complying with that standard will have to do some house cleaning in their security systems this year.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1839"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1837">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1838'
	>
	On top of all that, the U.S. Securities and Exchange Commission (SEC) adopted new rules on <a href="https://www.sec.gov/news/press-release/2023-139" target="_blank" rel="noreferrer noopener">disclosing cybersecurity incidents</a> that came into full effect at the end of 2023. This is another example of the increasing cybersecurity scrutiny placed on companies by agencies, lawmakers, and regulators.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1842"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1840">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1841'
	>
	All of the above further cements the argument that focusing on cybersecurity is not an optional requirement for companies in the US and EU. It is becoming part and parcel of our legal systems and plays a critical role in running viable, large-scale businesses.</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1845"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1843">
	<h2	class='typography typography--size-52-default js-typography block-typography__typography'
	data-id='es-1844'
	>
	Look into cybersecurity trends for a security-first future</h2></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1848"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1846">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1847'
	>
	One of the biggest clichés in our ever-changing tech industry is the relegation of cybersecurity issues to an idyllic future when we’ll have the time and budget to devote proper attention to it. Unfortunately, this perspective is no longer viable as cyber threats are multiplying year after year.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1851"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1849">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1850'
	>
	Some of the cybersecurity trends we discussed might present quite a bleak outlook. Data breaches, a serious lack of cybersecurity measures and professionals, a booming cybercrime industry, AI in the service of threat actors, billions of connected devices&#8230; It almost seems like we’re on the brink of a dystopian future.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1854"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1852">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1853'
	>
	However, there are two sides to each story, and wherever there is risk, there is also a great opportunity for learning, improvement, and growth. This is the mindset that successful businesses have always taken to overcome challenges. By knowing what to expect, both organizations and individuals can prioritize security and find a strategic way of keeping what’s important safe and secure.&nbsp;</p></div>	</div>

<div
	class="wrapper wrapper__use-simple--true"
	data-id="es-1857"
	 data-animation='slideFade' data-animation-target='inner-items'>
		
			<div class="block-typography" data-id="es-1855">
	<p	class='typography typography--size-16-text-roman js-typography block-typography__typography'
	data-id='es-1856'
	>
	<em>If you are looking for a security partner to help you assess and improve your security posture, our cybersecurity team specializes in penetration testing, phishing simulation campaigns, and DevSecOps practices. <a href="https://infinum.com/cybersecurity/" target="_blank" rel="noreferrer noopener">Check out what we can do for your business</a>. </em></p></div>	</div>
</div>
</div>		</div>
	</div><p>The post <a href="https://infinum.com/blog/cybersecurity-trends-2024/">Beyond the Biggest Breach – 2024 Cybersecurity Trends to Watch</a> appeared first on <a href="https://infinum.com">Infinum</a>.</p>
]]>
				</content:encoded>
			</item>
		
	</channel>
</rss>