article thumbnail

LinkedIn being targeted by fake CISO Profile Positions in Large Companies

CyberSecurity Insiders

LinkedIn has publicly announced that for some reasons, its servers are being targeted by fake CISO Profiles that disclose vacant positions at large multinational companies. Krebs On Security received this update from the professional social media giant and initiated an inquiry along with the public disclosure.

CISO 133
article thumbnail

How CyberSecurity Technology Companies Can Stand Out In A Crowded Field

Joseph Steinberg

Additionally, during the interview, now available as a recoded podcast episode on Spotify, Steinberg, whose independent column covering the fields of cybersecurity, artificial intelligence, and privacy regularly receives millions of reads per month , offered insights on topics such as: • Are there too many vendors of cybersecurity technology?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Words of advice for President Biden’s new CISO

SC Magazine

Today’s columnist, Steve Durbin of the Information Security Forum, offers advice to Chris DeRusha the new federal CISO. Only then can the new CISO conduct a thorough risk assessment across the government to determine where and how to best allocate funds. It’s quite a challenge for a federal CISO to knit these groups together.

CISO 93
article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

SC Media caught up with Touhill this week to learn how he hopes to make an impact in his new role, what issues and projects he plans to prioritize in his first year and how the old cybersecurity models we’ve relied on no longer work. He was then appointed as the first-ever U.S. chief information security officer.

CISO 109
article thumbnail

Cloud Security Podcast?—?Two Years Later or Our Year-End Reflections for 2022!

Security Boulevard

We seem to have removed the curse of AI  — namely that our first 2 episodes on securing AI ( “EP52 Securing AI with DeepMind CISO” and “EP68 How We Attack AI? And then “EP84 How to Secure Artificial Intelligence (AI): Threats, Approaches, Lessons So Far ” really did. More “CISO meets cloud” episodes are planned as well!

article thumbnail

Security Affairs newsletter Round 452 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

INC RANSOM ransomware gang claims to have breached Xerox Corp Spotify music converter TuneFab puts users at risk Cyber attacks hit the Assembly of the Republic of Albania and telecom company One Albania Russia-linked APT28 used new malware in a recent phishing campaign Clash of Clans gamers at risk while using third-party app New Version of Meduza (..)

article thumbnail

The Unseen Threats: Anticipating Cybersecurity Risks in 2024

Security Boulevard

The primary target and focus for nation-states will continue to be their adversaries Critical Infrastructure sectors, such as healthcare, government, communications, transportation, defense industrial base, media, utilities, finance, and cargo logistics. SEC enforcement is making a substantial impression on the cybersecurity community.

Risk 115