article thumbnail

Cybersecurity Research Topics for Beginners: Exploring the Fundamentals

CyberSecurity Insiders

Password Security: Investigate different password security techniques, such as password hashing algorithms, two-factor authentication (2FA), and biometric authentication. Social Engineering: Investigate the human element of cybersecurity by exploring social engineering techniques and tactics used to manipulate individuals.

article thumbnail

Top 5 Cyber Predictions for 2024: A CISO Perspective

Security Boulevard

This past year set a profound stage, from the advent of stringent cyber regulations to the convergence of generative AI, social engineering, and ransomware. Last year, we witnessed the fast-evolving nature of social engineering attacks, and this evolution poses greater challenges for detection and defense.

CISO 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Predictions for 2023: My Reflections

Jane Frankland

Cyberattacks and data breaches will continue to arise because of credential theft, social engineering (phishing, smishing, vishing etc), vulnerabilities in third party software and supply chain processes, forged or stolen machine identities, and misconfigured cloud computing. Here are my predictions for 2023. Types of attacks.

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 1)

The Last Watchdog

Implementing a Zero Trust architecture involves verifying every attempt to access the system. John Gunn , CEO, Token Gunn The carnage from 2023 reveals that legacy mutifactor authentication was the most frequent point of failure. The majority of ransomware attacks gained initial access by defeating legacy MFA.

article thumbnail

Emerging Trends in Cybersecurity: Strategies to Combat Cyber Extortion Attacks on Businesses in 2023

Cytelligence

Implementing advanced endpoint security measures, such as multi-factor authentication, encryption, and regular patching and updating of software, can significantly reduce the risk of attacks. Embracing Zero Trust Architecture: The traditional perimeter-based security model is no longer sufficient in today’s threat landscape.

article thumbnail

Intro to Phishing: How Dangerous Is Phishing in 2023?

Duo's Security Blog

Accounting for nearly a quarter of reported incidents in Australia, phishing is a broad category of social engineering with several variations. These social engineering techniques tricked employees into revealing their login credentials, which allowed attackers to access additional systems and data. What is phishing?

article thumbnail

2023 Phishing Report Reveals 47.2% Surge in Phishing Attacks Last Year

Security Boulevard

Zscaler ThreatLabz publishes this report year after year to help organizations recognize the social engineering tactics and sophisticated coding used in phishing attacks to prevent costly data breaches.

Phishing 122