article thumbnail

Who is your biggest insider threat?

CSO Magazine

Penetration testing has shown cybersecurity manager David Murphy just how problematic people can be. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ]. In his career, he has seen people pick up and use dropped thumb drives, give up passwords over the phone and, yes, even click on simulated phishing links.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Kennedy founded cybersecurity-focused TrustedSec and Binary Defense Systems and co-authored Metasploit: The Penetration Tester’s Guide. Jason Haddix | @JHaddix.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Excess privilege in the cloud is a universal security problem, IBM says

CSO Magazine

Excess privilege granted to cloud identities is a key component in 99% of all security tests performed by IBM’s X-Force Red penetration testing team, according to a report released Wednesday by the company. That severity score, which is based on CVSS , rose to an average of 18 in the latest report, up from 15 ten years ago.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

“When an attacker gains access to surveillance cameras, the amount of knowledge which stands to be gained could be vast and poses a very real physical security threat,” said James Smith, principal security consultant and head of penetration testing at Bridewell Consulting. What did Verkada do wrong?

article thumbnail

Are You Prepared for Cybersecurity in the Boardroom?

McAfee

Everyone in the company and on the board should be responsible and accountable for good cybersecurity practices. In July 2020, we saw key high-profile Twitter accounts compromised. Everyone is responsible and accountable. It is not only the CISO, CSO or CIO’s responsibility to care and do the right thing.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

The Global State of Information Security Survey 2017 suggests that companies should look into deploying threat detection tools and processes (including monitoring and analyzing security intelligence information), conducting vulnerability and threat assessments, penetration tests and security information, and event management (SIEM) tools.