Remove Architecture Remove Cyber Risk Remove Cyber threats Remove Phishing
article thumbnail

NASA Audit: Cyber Risk Skyrockets with 'Work from Home'

SecureWorld News

The audit proves what we've heard from many security leaders during our SecureWorld Remote Sessions : the pandemic and work from home have greatly increased the cyber attack surface and attack attempts. NASA cyber threats: insiders, third-parties, nation-states. Did you even have the visibility to track them?

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

Last Watchdog posed two questions: •What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at my organization? The cyber threat landscape is evolving rapidly. In 2024 I encourage leadership to dedicate more attention to discussing the risks of spear phishing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korean Hackers Intensify Cyberattacks on South's Arms Industry

SecureWorld News

The group employed sophisticated spear-phishing, watering hole attacks, and kernel-level malware to compromise the targets. Organizations can then work to counter these TTPs specific to each their assets, criticality, architecture, and other unique risks and considerations for that organization.

article thumbnail

NIS2 Framework: Your Key To Achieving Cybersecurity Excellence

Centraleyes

The Evolving Cyber Threat Landscape The contemporary threat and regulatory landscape have pressed organizations to fortify their cyber-crisis management capabilities. In recent years, a surge in cyber-attacks targeting critical infrastructure has been observed globally.

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 1)

The Last Watchdog

A look back at the cybersecurity landscape in 2023 rings all-too familiar: cyber threats rapidly evolved and scaled up , just as they have, year-to-year, for the past 20 years. The “trust but verify” approach is no longer viable in a landscape where threats can originate from anywhere. Here is part one of three groupings.

article thumbnail

Cyber CEO: A Look Back at Cybersecurity in 2021

Herjavec Group

Mitigate Vulnerability Risk. Gone are the days where defending your enterprise from cyber threats and knowing how to properly respond to an incident was on your IT department’s shoulders alone. Operating with a team of individuals who are cybersecurity savvy is one of the best tools for cyber risk management.

article thumbnail

2023 Cybersecurity Predictions from Marcus Fowler, Darktrace

CyberSecurity Insiders

Today and in the future, MFA should be viewed as one component of a wider zero trust architecture, one where behavior-based analytics are central to understanding employee behavior and authenticating the actions taken using certain credentials. 3 – Crypto-jacking neglect gets dangerous.