Remove category threats-book
article thumbnail

Digital Risk Types Demystified: A Strategic Insight into Online Threats

Centraleyes

This section seeks to objectively explore specific categories of digital risks, unraveling strategic approaches to mitigate them effectively. This category encompasses threats like data breaches and inadequate privacy controls. Security Risks Security risks encompass threats to digital assets, networks, and information systems.

Risk 52
article thumbnail

Security Roundup August 2023

BH Consulting

Privacy progress: Dr Valerie Lyons’ book publication and award nomination Congratulations to BH Consulting chief operations officer Dr Valerie Lyons, who will become a published author later this year. Her book, “The Privacy Leader Compass” is available to pre-order from 1 November.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NIS2 Framework: Your Key To Achieving Cybersecurity Excellence

Centraleyes

The Evolving Cyber Threat Landscape The contemporary threat and regulatory landscape have pressed organizations to fortify their cyber-crisis management capabilities. These sectors play a pivotal role in the functioning of society and the economy, making them primary targets for cyber threats.

article thumbnail

Reflective Practice and Threat Modeling (Threat Model Thursday)

Adam Shostack

Lately, I’ve been asking what takes threat modeling from a practice to a mission. If you’re reading this blog, you may have seen that some people are nearly mad about threat modeling. The ones who say “you’re never done threat modeling.” Real threat models. Real cases. Real systems.

article thumbnail

Security Roundup October 2021

BH Consulting

A new category for this edition is ‘insecure design’. This way, it hopes to catch risks and threats before coding begins. ESET’s latest threat report (PDF) tracked a 103.9 The pledge logo is visible on every page of the BH Consulting website and the commitment is detailed in full on our blog. Here’s the security book.

VPN 52
article thumbnail

New ransomware trends in 2023

SecureList

Looking back on last year’s report Last year, we discussed three trends in detail: Threat actors trying to develop cross-platform ransomware to be as adaptive as possible The ransomware ecosystem evolving and becoming even more “industrialized” Ransomware gangs taking sides in the geopolitical conflict These trends have persisted.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

I wrote two books, one on IoT Security and another with Kevin Mitnick, then jumped around a couple of different jobs. Around 2014 Chenxi authored a blog , which was very important for the industry in my opinion. So my friend was a Zenobia, who co authored the blog with me, s he and I walked around on the show floor.

InfoSec 40