article thumbnail

How CISOs Limit Downtime Without Impacting Security

Security Boulevard

In the last decade the role of the chief information security officer (CISO) has evolved considerably. Not long ago, the CISO was considered a part of the IT team and their main focus was on building firewalls, implementing antivirus and keeping spam emails at bay. Today, however, things are very different. The huge surge in.

CISO 127
article thumbnail

BSides Sofia 2023 – Cristian Cornea – Bypassing AntiVirus Using badUSB

Security Boulevard

Permalink The post BSides Sofia 2023 – Cristian Cornea – Bypassing AntiVirus Using badUSB appeared first on Security Boulevard. Our thanks to BSides Sofia for publishing their presenter’s tremendous BSides Sofia 2023 content on the organizations’ YouTube channel.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: 7 tips for protecting investor data when it comes to alternative asset trading

The Last Watchdog

Employ real-time antivirus scanning. By using real-time antivirus scanning to detect and neutralize security risks as they enter the trading system, threats can be quickly identified and eliminated. Real-time antivirus scanning enhances the security of investor data by providing immediate protection against known and emerging threats.

article thumbnail

Stop betting on detection-based security technology

SC Magazine

Today’s columnist, Aviv Grafi of Votiro, says companies need stronger, more proactive tools, and must give CISOs a seat at the table –or else we’ll have more major attacks like the ones on SolarWinds, Microsoft Exchange, Colonial Pipeline, and now Kaseya. ecooper99 CreativeCommons CC BY 2.0. Guess what? They’re not.

article thumbnail

“Future of Vulnerability Management” Podcast Episode 6: The Role Vulnerability Management Plays in Proper Cyber Hygiene

NopSec

In this episode, Lisa talks with Tim Brown, the CISO at SolarWinds. Over the past two decades, Lisa has advised Fortune 500 enterprises on data security, privacy and technology risk management, and led many diverse teams at Ally Financial (GMAC), KPMG, and Blue Cross Blue Shield.

article thumbnail

3 Keys to Defending Active Directory

Security Boulevard

While perimeter defenses like firewalls and antivirus software remain essential elements of comprehensive network defense, stopping 100% of attacks at the perimeter is an impossibility with today’s ever-evolving attack surface.

article thumbnail

Researchers offer advice on how to block WFH employees from downloading pirated software

SC Magazine

Security teams should also have antivirus in place to help prevent malicious downloads. “If Joseph Carson, chief security scientist and Advisory CISO at ThycoticCentrify, added that it’s very common for pirated software to have unwanted features, such as password stealers or hidden backdoors.