article thumbnail

CISO workshop slides

Notice Bored

A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.

CISO 63
article thumbnail

ConnectWise Quietly Patches Flaw That Helps Phishers

Krebs on Security

The third-party cloud storage service is currently shared by both GoTo and its affiliate, the password manager service LastPass. ” However, LastPass maintains that its “customer passwords remain safely encrypted due to LastPass’s Zero Knowledge architecture.” Update, 7:25 p.m.

Phishing 242
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

“Left of Boom” Cybersecurity: Proactive Cybersecurity in a Time of Increasing Threats and Attacks

Cisco Security

The primary job of the Chief Information Security Officer (CISO) is to exercise continuous diligence in reducing risk, within the risk appetite and risk tolerance of the organization, so that the likelihood of a boom is low, and the corresponding magnitude of harm is limited. Some “Left of Boom” Processes. Frameworks.

article thumbnail

‘Everyone had to rethink security’: What Microsoft learned from a chaotic year

SC Magazine

Our CISO has a saying: Hackers don’t break in, they log in. And they log in using password spraying, in many cases, or they log in entering the network from a different access point. We have a built-in defense in depth architecture, we had started with zero trust. That was the good news. The second one is zero trust.

article thumbnail

Okta’s Breach Highlights Risk of Putting Crown Jewels in the Cloud

Security Boulevard

Speculation continued to run wild on Twitter that the breach may have affected other companies, leading them to instruct employees to reset their passwords and identity information. At ShiftLeft we elected to use an agent-based architecture that does not require us to upload all your source code into our systems.

Risk 122
article thumbnail

My 2020 Predictions Revisited: What Worked, What Didn't

Duo's Security Blog

User and entity behavior analytics (UEBA) made significant strides as one way of determining trust in a zero-trust architecture. As one CISO shared with me, “Our crisis response and subsequent focus on securing productivity pushed new initiatives to 2021.” Well, it was. But then it wasn’t.

article thumbnail

Quantum Computing: A Looming Threat to Organizations and Nation States

SecureWorld News

As for the panel presentation at SecureWorld Denver , it features Edgar Acosta, Experienced Cybersecurity Professional (former CISO at DCP Midstream ); Craig Hurter, Sr. Director of Information Security, State of Colorado Governor's Office of Information Technology; and Toby Zimmerer, Sr. Demand and Delivery Director, Optiv.