article thumbnail

Nine Top of Mind Issues for CISOs Going Into 2023

Cisco Security

In my role, I regularly engage with CISOs in all kinds of sectors, representatives at industry bodies, and experts at analyst houses. This gives me an invaluable macroview not only of how the last 12 months have affected organizations and what CISOs are thinking about, but also how the upcoming year is shaping up.

CISO 127
article thumbnail

MailChimp breached, intruders conducted phishing attacks against crypto customers

Security Affairs

Threat actors gained access to internal tools of the email marketing giant MailChimp to conduct phishing attacks against crypto customers. Trezor WARNING: Elaborate Phishing attack. Trazor also took the phishing domain used by threat actors offline and launched an investigation to determine how many users have been impacted.

Phishing 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is the NIST Phish Scale?

SecureWorld News

The National Institute of Standards and Technology (NIST) recently developed a new method that will help prevent organizations and their employees from falling victim to phishing cyberattacks, which it calls the Phish Scale. A tool like the Phish Scale could be very useful for organizations in the fight against phishing.

article thumbnail

Why CISOs at gaming companies need to reimagine security

SC Magazine

The hack of Words with Friends in 2019 was high-profile, but today’s columnist, Yuval Elddad of CYE, says CISOs at all gaming companies have to take a closer look at the growing threats to online gaming platforms. The post Why CISOs at gaming companies need to reimagine security appeared first on SC Media.

CISO 94
article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

CISOs will have to get quantum resilient encryption on their cyber roadmap. Nick Mistry , SVP, CISO, Lineaje Mistry The software landscape is poised for significant changes, with a growing emphasis on Software Bill of Materials (SBOM.) In 2024 I encourage leadership to dedicate more attention to discussing the risks of spear phishing.

article thumbnail

What Are Passkeys?

Duo's Security Blog

Before we can discuss passkeys, we need to lay some groundwork and discuss authentication, Passwordless and WebAuthn. What is authentication? Authentication is the process of verifying your online identity. We added multi-factor authentication (MFA) – something you know and something you have or are. What is passwordless?

article thumbnail

3 Steps to Prevent a Case of Compromised Credentials

Duo's Security Blog

Passwords are a weak point in modern-day secure authentication practices, with Verizon highlighting that almost 50% of breaches start with compromised credentials. In our previous two features, we covered the dangers of phishing (one method of credential compromise) and how to mitigate its impact on users. Likely not immediately.