Remove Architecture Remove Authentication Remove Cyber Insurance Remove Cybersecurity
article thumbnail

Key Cybersecurity Trends for 2024: My Predictions

Jane Frankland

Cybersecurity can often feel like a game of cat and mouse where cyber attackers and defenders engage in a chase, with one party trying to outsmart the other. Just like in previous years, 2024 is set to test practitioners’ skills as the frequency of cyber threats continues to surge leaving no room for complacency.

article thumbnail

2023 Cybersecurity Predictions from Marcus Fowler, Darktrace

CyberSecurity Insiders

It wasn’t just the recent Uber attack in which the victim’s Multi-Factor Authentication (MFA) was compromised; at the core of the vast majority of cyber incidents is the theft and abuse of legitimate credentials. 2 – Continued ‘hacktivism’ from non-state actors complicates cyber attribution and security strategies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

One Year Later: What Have We Learned Since the Colonial Pipeline Attack

Thales Cloud Protection & Licensing

While implementation of security technologies such as multi-factor authentication and encryption have slightly increased, we have not yet reached the level where the majority of applications, data and operational technology are fully protected. Therefore, immediate action is needed to deploy more robust cybersecurity strategies.

article thumbnail

BlastWave and Cysurance Roundtable: More Fender Benders, Fewer Totals, and a Smog Test

Security Boulevard

Click here to watch the roundtable and learn about the future of cyber insurance from leading experts. In partnership with Cysurance, BlastWave hosted a roundtable entitled “The Future of Cyber Insurance and MSP Insurability. The expert panelists held an honest discussion about insurability difficulties for MSPs.

article thumbnail

Seven Massachusetts Cities Join Forces to Bolster Cybersecurity Posture

SecureWorld News

Seven small coastal towns in Massachusetts have formed a partnership to better tackle their IT and cybersecurity needs in the region. Tom Brennan is the Executive Director, Americas Region, at CREST, a global community of cybersecurity businesses and professionals working to keep information safe in a digital world.

article thumbnail

Zero Trust: Can It Be Implemented Outside the Cloud?

eSecurity Planet

government and others, we are still no closer to seeing zero trust architecture widely adopted. The only exception, it seems, has been cloud service providers, who boast an enviable record when it comes to cybersecurity, thanks to rigorous security practices like Google’s continuous patching. No asset is inherently trusted.

Insurance 107
article thumbnail

Securing Government Agencies: Essential Eight and Other Efforts

Duo's Security Blog

Four years ago, the Australian Signals Directorate created the “Essential Eight” — recommendations to secure federal entities and improve cybersecurity protections. The UK’s National CyberSecurity Centre (NCSC) already provides a number of recommendations that overlap the Australian, US, and EU directives.