Skip navigation
Year in Review
cybersecurity_globe_alamy.jpg Alamy

Cybersecurity in 2022: ITPro Today’s Top 10 Stories

2022 saw an increase in cyberattacks, a keener understanding of security gaps, global tensions amid Russia’s invasion of Ukraine, and a focus on security innovation.

Cybersecurity is an evergreen priority for users, manufacturers, and business leaders alike, especially with the uptick in cyberattacks in 2022.

This year, ITPro Today readers focused on Russia’s invasion of Ukraine, which involved cyberattacks and a tech boycott; increasingly sophisticated ransomware; and vulnerabilities in firmware, Active Directory, and machine identity management. 

Here’s a roundup of ITPro Today's most-read cybersecurity stories in 2022.

1. Tech Walls Off Russia Like Never Before

The U.S. led a boycott against Russia, depriving the nation access to digital platforms, tech, and weapons components, in hopes that Putin will feel the ramifications of his decision to invade Ukraine. Learn about the boycott and its risks. 

2. Report Finds Active Directory Security Failings

A Semperis report showed that organizations have significant security gaps around Active Directory, which can expose data to stealth cyberattacks. Read more about the security failings as well as possible solutions. 

3. Digital Transformation, Cybersecurity, IT Staffing Top C-Suite Concerns

Executives are focused on digital transformation, but to grow they must first address a host of other challenges. Contributor Nathan Eddy explores the top concerns of executive leadership.

Further reading: IT Security Decision Makers Struggle to Implement Strategies

4. Let's Unpack the 10 Immutable Laws of Security Administration

Tech expert Brien Posey expands on Microsoft’s “The 10 Immutable Laws of Security Administration” and provides actionable tips to reinforce data security. 

 

5. Microchip Adds Real-Time Security to Its Root of Trust Silicon Tech

Firmware security has not always been a high priority for manufacturers. Companies like Microchip are developing root of trust technologies to provide users with enhanced protections.

6. How Not to Waste Money on Cybersecurity

While investing in security is always a smart move, money can be wasted when you base your budget on the latest cybersecurity trends or model your approach after the needs of other businesses. This article provides tips for devising a holistic cybersecurity plan. 

7. VMs Help Ransomware Attackers Evade Detection, But It's Uncommon

Ransomware groups have successfully run payloads hidden in virtual machines, but this attack method proves difficult to execute. Dark Reading senior editor Kelly Sheridan explains the likelihood of such an attack as well as the measures business leaders can take to protect themselves.

Further reading: Ransomware Security for IT Pros: 2022 Report

8. Cybersecurity Startups Make Waves at RSAC 2022

A host of cybersecurity startups vie for attention in an increasingly crowded field. Here’s a roundup of some of the exciting new security products showcased at this year’s RSA convention.

9. Machine Identity Management: A Fast-Growing Frontier of Security

The exponential growth in IoT devices and remote workforces means that machine identities are shared across many devices and move through different systems. This has made securing data an unwieldy task. Contributor Maria Korolov explores the impact of mismanaged machine identities. 

10. Look Beyond Price When Acquiring IT Security Products

When selecting security products, business leaders should opt for a big picture approach that considers more than just initial cost. This article provides an in-depth look at what customers need to consider.

What was the most important technology product you used for cybersecurity in 2022? Tell us below in the comments!

Hide comments

Comments

  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
Publish