Remove Authentication Remove CISO Remove Data privacy Remove Social Engineering
article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

Cryptographic inventories need finalizing and quantum safe encryption needs to be adopted for sensitive communications and data. CISOs will have to get quantum resilient encryption on their cyber roadmap. But they also increase the potential for security flaws and data privacy violations.

article thumbnail

Three Risk Mitigation Strategies to Address the Latest Data Security Threats

CyberSecurity Insiders

By Dannie Combs , Senior Vice President and CISO, Donnelley Financial Solutions (DFIN) As security threats to data continue to ebb and flow (mostly flow!), Threats are also growing, with 40 percent of data breaches involving stolen credentials, according to the 2022 Verizon Data Breach Investigation Report.

Risk 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LinkedIn Hack is Scraped Data, Company Claims

eSecurity Planet

” In response, Hodson urged all LinkedIn users to update their passwords and enable two-factor authentication. RestorePrivacy examined the sample posted online and found that it does appear to be authentic, linked to real users, and up to date. ” A Wake-Up Call for Social Media Users. “Bottom line? .

Hacking 112
article thumbnail

Cybersecurity Outlook 2022: Third-party, Ransomware and AI Attacks Will Get Worse

eSecurity Planet

Ransomware has already been combined with distributed denial-of-service (DDoS) attacks , and Manky notes that ransomware could see the addition of wiper malware, “which could not only wreck data but destroy systems and hardware. … This could be a concern for emerging edge environments, critical infrastructure, and supply chains.”

article thumbnail

The Most Common Insider Threats

SecureWorld News

SecureWorld recently hosted a panel discussion on the topic of insider threat featuring three guests: Phillip Curran, CISO and CPO for Cooper; Jordan Fischer, Cyber Attorney for Beckage; Billy VanCannon, Head of Product for Spirion; and Justin Turner, Associate Director of Cybersecurity and Data Privacy for Protiviti.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

Making matters worse, the cameras employ facial recognition technology, which leads to questions as to whether an attacker could actually identify individuals caught on camera and then pursue them as targets for social engineering schemes or something even more nefarious. When surveillance leads to spying.