Remove Authentication Remove CISO Remove eBook Remove Phishing
article thumbnail

Nine Top of Mind Issues for CISOs Going Into 2023

Cisco Security

In my role, I regularly engage with CISOs in all kinds of sectors, representatives at industry bodies, and experts at analyst houses. This gives me an invaluable macroview not only of how the last 12 months have affected organizations and what CISOs are thinking about, but also how the upcoming year is shaping up.

CISO 138
article thumbnail

Passkeys and The Beginning of Stronger Authentication

Thales Cloud Protection & Licensing

Passkeys and The Beginning of Stronger Authentication madhav Fri, 02/02/2024 - 05:23 How passkeys are rewriting the current threat landscape Lillian, an experienced CISO, surveyed the threat landscape. Lillian knew that a shift in authentication couldn't wait. Fortunately, it didn’t have to.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Passkeys and The Beginning of Stronger Authentication

Security Boulevard

Passkeys and The Beginning of Stronger Authentication madhav Fri, 02/02/2024 - 05:23 How passkeys are rewriting the current threat landscape Lillian, an experienced CISO, surveyed the threat landscape. Lillian knew that a shift in authentication couldn't wait. Fortunately, it didn’t have to.

article thumbnail

Protecting Against Ransomware 3.0 and Building Resilience

Duo's Security Blog

Compromised credentials and phishing attacks, our previous two points of focus in the series, are two of the most common entry paths to ransomware deployment. When users get phished, bad guys start attempting to use the stolen credentials within 10 minutes. In the final instalment of this series, we cover the rise of ransomware 3.0

article thumbnail

Five Lessons from the JBS Attack for Securing the Manufacturing Supply Chain

Security Boulevard

And what steps should CISOs in the manufacturing industry be taking to secure their rapidly evolving supply chain? Ransomware code propagated through phishing and malware attacks that target weak workforce, supplier, and partner access credentials is perhaps the most common type of attack. Lesson 3: Strengthen Authentication.