article thumbnail

News alert: Diversified, GroCyber form partnership to deliver media-centric cybersecurity solutions

The Last Watchdog

Cyber hygiene and monitoring.This new Diversified managed service monitors the hardware and software at a business to ensure it has the latest security patches, configuration and access control – minimizing the enterprise’s cyber risk exposure. Vulnerability management.

Media 100
article thumbnail

North Korean Hackers Intensify Cyberattacks on South's Arms Industry

SecureWorld News

"Heavily armored and weaponized nation-state threats are difficult to stop compared to lesser threats of opportunistic eCrime or more immature threats," says Ken Dunham, Cyber Threat Director at Qualys Threat Research Unit. "A currently Hanwha Ocean Co.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

Last Watchdog posed two questions: •What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at my organization? Wayne Schepens , Chief Cyber Market Analyst, CyberRisk Alliance Schepens The weakest link is still humans; attacks caused by social engineering remain a critical risk for all organizations.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Her work centered on helping aerospace manufacturers manage the convergence of cyber risk across their increasingly complex business ecosystem, including IT, OT and connected products. Director/CISO of IT Risk Management at Ulta Beauty located in Bolingbrook, IL. Director of Cyber Risk & Security Services.

article thumbnail

When It comes to Cybersecurity – An ounce of prevention

CyberSecurity Insiders

Social engineering. Social engineering is the most prevalent way threat actors find their way into your environment. Network design and architecture. More complex architectures may be needed depending on the industry or the data. In others, it is a lack of budgetary foresight creating cyber risk.

article thumbnail

The Evolution of SIEM: Where It’s Been and Where It is Going

CyberSecurity Insiders

The most prevalent first- and second-generation SIEMs also came with very basic correlation engines, the best they knew how to do at that time. Splunk was founded in 2003 as essentially the first-ever flexible and powerful store and search engine for big data. They were also used for data retention and compliance.

Marketing 116
article thumbnail

MY TAKE: Why companies had better start taking the security pitfalls of API proliferation seriously

The Last Watchdog

That said, APIs are certain to get a lot more attention by security teams — and board members concerned about cyber risk mitigation — in 2022. Legacy security architectures just don’t fit this massively complex, highly dynamic environment. Related: ‘SASE’ framework extends security to the network edge.