article thumbnail

Best Practices Q&A: The importance of articulating how cybersecurity can be a business enabler

The Last Watchdog

The technology and best practices for treating cybersecurity as a business enabler, instead of an onerous cost-center, have long been readily available. Now comes a Forrester Research report that vividly highlights why attaining and sustaining a robust cybersecurity posture translates into a competitive edge.

article thumbnail

News alert: Memcyco report reveals only 6% of brands can stop digital impersonation fraud

The Last Watchdog

More than half of all respondents (53%) said their existing cybersecurity solutions do not effectively address website impersonation attacks, and 41% said their existing solutions only protect them and their customers “partially.” This creates a glaring blindspot in cybersecurity — the inability of companies to protect their customers online.”

Scams 162
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using social media as a tool to share knowledge on day-to-day Cybersecurity risks

CyberSecurity Insiders

When most people think about social media and cybersecurity, they typically think about hackers taking over Instagram accounts or Facebook Messenger scammers taking private information. The Identity Theft Resource Center’s 2022 Consumer Impact Report revealed that social media account takeovers have grown by 1,000% in one year.

Media 89
article thumbnail

Seven things to considering Account-Based Marketing– My Thales ABM Journey

Thales Cloud Protection & Licensing

Seven things to considering Account-Based Marketing– My Thales ABM Journey. Back in March, as I was getting ready to come back from maternity leave, I was offered the chance to embark on a new and exciting career journey: piloting Account-Based Marketing for the Thales CPL EMEA region. No cold calls ” and “ ABM is B2B ”).

article thumbnail

ROUNDTABLE: What happened in privacy and cybersecurity in 2021 — and what’s coming in 2022

The Last Watchdog

Meanwhile, President Biden issued a cybersecurity executive order finally putting the federal government’s regulatory stamp on foundational cyber hygiene practices many organizations should have already been doing, yet continue to gift short shrift. Business Email Compromise (BEC) as accounted for over $500 billion in losses.

article thumbnail

Explaining User and Entity Behavior Analytics: Enhanced Cybersecurity Through UEBA

CyberSecurity Insiders

User and entity behavior analysis (UEBA) is a cybersecurity technology that helps organizations detect malicious attacks by highlighting anomalous behavior. As such, now is a great time to learn about UEBA’s role in cybersecurity systems. What is UEBA? In fact, market research by ReporterLink projects UEBA to reach a global $4.2

article thumbnail

The State of Blockchain Applications in Cybersecurity

eSecurity Planet

We’ll look at what blockchain technology is, how its development relates to cybersecurity, and the state of blockchain-based security solutions. While cybersecurity trends like zero trust push the focus inward, organizations must always consider endpoint vulnerabilities. Blockchain-Powered Cybersecurity Vendors.