Remove Architecture Remove CISO Remove Internet Remove Social Engineering
article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

CISOs will have to get quantum resilient encryption on their cyber roadmap. Nick Mistry , SVP, CISO, Lineaje Mistry The software landscape is poised for significant changes, with a growing emphasis on Software Bill of Materials (SBOM.) Consumers will begin to see their favorite applications touting “quantum-secure encryption.”

article thumbnail

A Reactive Cybersecurity Strategy Is No Strategy at All

CyberSecurity Insiders

A foundational approach to cybersecurity empowers CISOs to see abnormalities and block threats before they do damage. By increasing visibility into DNS traffic, CISOs can detect, block, and respond to incidents more quickly as well as use this data to institute new controls and increase overall resiliency.

DNS 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ROUNDTABLE: Why T-Mobile’s latest huge data breach could fuel attacks directed at mobile devices

The Last Watchdog

The configuration issue made this access point publicly available on the Internet. Chris Clements, VP of Solutions Architecture, Cerberus Sentinel. It is not be simply a matter of hiring a CISO, but ensuring that proper procedures and tools are implemented across the organization, including its third-party suppliers and contractors.

Mobile 306
article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Prior to joining Delta Dental, Almeida was the CISO at Covanta Holding Corporation, a leader in energy-from-waste management services. His expertise is in social engineering, technology, security algorithms and business. David Poe is the vice president of data architecture and shared solutions for United Way Worldwide.

article thumbnail

To Achieve Zero Trust Security, Trust The Human Element

Thales Cloud Protection & Licensing

I would strongly advise anyone who is contemplating a move to Zero Trust models or architecture to read and consider the many valuable points made in the current documents, such as NIST Special Publication 800-207. Jenny Radcliffe, People Hacker & Social Engineer.

article thumbnail

Decipher Security Podcast With ForAllSecure CEO David Brumley

ForAllSecure

There's the people who are doing social engineering attacks. Did you just put a system on the internet that shouldn't be? There's a lot an IT person can do to prevent being hacked: they can make sure they use strong passwords, or they can make sure that they have proper network architecture. We don't handle that.

article thumbnail

Decipher Security Podcast With ForAllSecure CEO David Brumley

ForAllSecure

There's the people who are doing social engineering attacks. Did you just put a system on the internet that shouldn't be? There's a lot an IT person can do to prevent being hacked: they can make sure they use strong passwords, or they can make sure that they have proper network architecture. We don't handle that.