<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-03-26T06:19:59Z</updated>
  <generator>https://yabu.me</generator>

  <title>Nostr notes by Wade Baker</title>
  <author>
    <name>Wade Baker</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://yabu.me/npub1wpkuuwakp07q2kqzlfnmc9jy8y5mlrarue2vglmjjwveugdkzq5qj3derl.rss" />
  <link href="https://yabu.me/npub1wpkuuwakp07q2kqzlfnmc9jy8y5mlrarue2vglmjjwveugdkzq5qj3derl" />
  <id>https://yabu.me/npub1wpkuuwakp07q2kqzlfnmc9jy8y5mlrarue2vglmjjwveugdkzq5qj3derl</id>
  <icon>https://media.infosec.exchange/infosec.exchange/accounts/avatars/109/365/489/872/594/146/original/157fc4f4f796f0e2.jpg</icon>
  <logo>https://media.infosec.exchange/infosec.exchange/accounts/avatars/109/365/489/872/594/146/original/157fc4f4f796f0e2.jpg</logo>




  <entry>
    <id>https://yabu.me/nevent1qqsgq9skdxarh6ew2mn0vrmryd2g24fw4re3s6nnqt2d295q2yv8ezqzypcxmn3mkc9lcp2cqtax00qkgsujn0u050n9f3rlw2fen83pkcgzsjvwzme</id>
    
      <title type="html">Are #cybersecurity incidents growing more costly? Cyentia ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsgq9skdxarh6ew2mn0vrmryd2g24fw4re3s6nnqt2d295q2yv8ezqzypcxmn3mkc9lcp2cqtax00qkgsujn0u050n9f3rlw2fen83pkcgzsjvwzme" />
    <content type="html">
      Are #cybersecurity incidents growing more costly? &lt;br/&gt;&lt;br/&gt;Cyentia Institute&amp;#39;s recent Information Risk Insights Study points to a 15-fold increase in the cost of #incidents and #databreaches over the last 15 years. &lt;br/&gt;&lt;br/&gt;The chart on the left shows the distribution of known/reported financial losses from incidents across the time period of the study. The typical (median) incident costs about $600K, while more extreme (95th percentile) losses swell to $32M. Note that the chart uses a log scale, so the tail of large losses is a lot longer than it appears.&lt;br/&gt;&lt;br/&gt;The chart on the right trends the escalating costs of cyber events over time. Median losses from a security incident have absolutely exploded over the last 15 years, rising 15-fold from $190K to almost $3 million! The cost of extreme events has also risen substantially (~5x). So, yeah—cyber events are definitely growing more costly. &lt;br/&gt;&lt;br/&gt;That said, this picture looks a lot different among different types and sizes of organizations. How are financial losses and other #cyberrisk factors trending for orgs like yours? &lt;br/&gt;&lt;br/&gt;Download the full IRIS 2025 to find out! &lt;br/&gt;Free with no reg req&amp;#39;d - though you can join Cyentia&amp;#39;s free membership forum for bonus analytical content related to the report.&lt;br/&gt;&lt;br/&gt;&lt;a href=&#34;https://www.cyentia.com/iris2025/&#34;&gt;https://www.cyentia.com/iris2025/&lt;/a&gt;&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/114/671/579/755/610/377/original/14198c66a4c9dcaf.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2025-06-12T17:32:09Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsw3vpp4fsrsxm90ytdlvqapqt2y83nl7vagc9wrz4d25nsetgc96gzypcxmn3mkc9lcp2cqtax00qkgsujn0u050n9f3rlw2fen83pkcgzsw5h9gz</id>
    
      <title type="html">Would def be interesting to look at a long time horizon like ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsw3vpp4fsrsxm90ytdlvqapqt2y83nl7vagc9wrz4d25nsetgc96gzypcxmn3mkc9lcp2cqtax00qkgsujn0u050n9f3rlw2fen83pkcgzsw5h9gz" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsz7t0wr73t0fy9y6xm7z0lprgfytxr8x4ugeqg306f3qchdkqj7rc8lwzld&#39;&gt;nevent1q…wzld&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;Would def be interesting to look at a long time horizon like that. It&amp;#39;s  often hard to see forward progress in this field, but that could show investments making a difference.
    </content>
    <updated>2024-11-20T19:57:48Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2yk5h9swmty6scrudazzuexf640cly4nzzr36xnr0qzv5vku90qqzypcxmn3mkc9lcp2cqtax00qkgsujn0u050n9f3rlw2fen83pkcgzsun03yp</id>
    
      <title type="html">I&amp;#39;m fascinated by the concept of measuring attacker-defender ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2yk5h9swmty6scrudazzuexf640cly4nzzr36xnr0qzv5vku90qqzypcxmn3mkc9lcp2cqtax00qkgsujn0u050n9f3rlw2fen83pkcgzsun03yp" />
    <content type="html">
      I&amp;#39;m fascinated by the concept of measuring attacker-defender advantage in software, devices, and even entire IT environments. What do I mean by &amp;#34;attacker-defender advantage?&amp;#34; Lemme sum up and then share a chart.&lt;br/&gt;&lt;br/&gt;Let&amp;#39;s say you could measure the speed at which defenders remediate various types of security vulnerabilities across all relevant assets. Then say you could detect and measure the speed at which attackers find/exploit those vulnerable assets across the target population of organizations using them. Finally, plot those curves (across time and assets) to see the delta between them and derive a measure of relative advantage for attackers and defenders. That relative value is what I mean by attacker-defender advantage. &lt;br/&gt;&lt;br/&gt;Since a picture is worth a thousand words, here&amp;#39;s a visual example of the concept. The blue line represents defenders, measuring the speed of remediation. Red measures how attacker exploitation activity spreads across the target population. When the blue line is on top, defenders have a relative advantage (remediating faster than attackers are attempting to exploit new targets). When red&amp;#39;s on top, the opposite is true. The delta between the lines corresponds to the relative degree of advantage (also expressed by the number in the upper left).&lt;br/&gt;&lt;br/&gt;This chart comes from prior Cyentia Institute research in which we were able to combine datasets from two different partners (with their permission). Unfortunately, those datasets/partners are no longer available to further explore this concept - but maybe this post will inspire new partnerships and opportunities!&lt;br/&gt;&lt;br/&gt;Any surprises in the attacker-defender advantage results depicted in the chart? Has anyone measured this or something similar?&lt;br/&gt;&lt;br/&gt;#cybersecurity #vulnerabilities #cyberattacks #infosec #exploitation&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/113/516/092/496/764/298/original/b192b5542662d394.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2024-11-20T15:55:15Z</updated>
  </entry>

</feed>