Remove Architecture Remove CISO Remove Risk Remove Social Engineering
article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

Last Watchdog posed two questions: •What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at my organization? CISOs will have to get quantum resilient encryption on their cyber roadmap. In 2024 I encourage leadership to dedicate more attention to discussing the risks of spear phishing.

article thumbnail

Sunsetting legacy Cybersecurity Process for Better Optimization and Security Modernization

Security Boulevard

Most organizations develop three to five-year phasing plans for most IT and cyber products to align with the manufacturer’s end-of-development, end-of-support, and end-of-life product life cycles and keep up with the latest security risks. Threat modeling (Risk management, vulnerability, and penetration testing).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Reactive Cybersecurity Strategy Is No Strategy at All

CyberSecurity Insiders

A foundational approach to cybersecurity empowers CISOs to see abnormalities and block threats before they do damage. By increasing visibility into DNS traffic, CISOs can detect, block, and respond to incidents more quickly as well as use this data to institute new controls and increase overall resiliency.

DNS 140
article thumbnail

Nurturing Our Cyber Talent

IT Security Guru

The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry: There are many ways we can inspire new cybersecurity professionals to join our industry. We must reduce barriers to entry.

CISO 94
article thumbnail

Inflation Is Making Cybersecurity Even More Challenging for Leaders

SecureWorld News

Increased risk of cyberattacks The rising cost of living can lead to an increase in cybercrime, as people become more desperate to make money. I think it requires taking a step back and assessing what you can do with less," said Chris Roberts, CISO and Senior Director at Boom Supersonic. This is more critical now than it's ever been."

article thumbnail

ROUNDTABLE: Why T-Mobile’s latest huge data breach could fuel attacks directed at mobile devices

The Last Watchdog

Related: Kaseya hack worsens supply chain risk. This stolen booty reportedly included social security numbers, phone numbers, names, home addresses, unique IMEI numbers, and driver’s license information. Chris Clements, VP of Solutions Architecture, Cerberus Sentinel. Jack Chapman, VP of Threat Intelligence, Egress.

Mobile 306
article thumbnail

Lapsus$ Attack on Okta: How to Evaluate the Impact to your Organization

Security Boulevard

Lapsus$ has used tactics such as social engineering, SIM swapping, and paying employees and business partners for access to credentials and multifactor authentication approvals. Per Okta, the incident was mitigated within hours of the initial compromise and is no longer a security risk. What happened in the Okta attack?