article thumbnail

How Diversity and Inclusion Initiatives Can Reduce Cyber Risk

Centraleyes

It involves fostering a culture where people can bring their authentic selves to work, school, or any other setting without fear of discrimination or exclusion. Including diverse groups and minorities in risk mitigation in cyber security is not overvalued; in fact, it’s increasingly essential for cyber risk reduction.

article thumbnail

News alert: AppDirect poll reveals company leaders losing sleep over cyber risks, compliance

The Last Watchdog

But that’s not enough to assuage their anxiety and instill confidence that they’re well protected against security threats. Their top areas of concern include cybersecurity risk (58%), information security risk (53%) and compliance risk (39%). Human error is among the top causes of security breaches.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

The Last Watchdog

Related: Good to know about IoT Physical security is often a second thought when it comes to information security. Despite this, physical security must be implemented correctly to prevent attackers from gaining physical access and taking whatever they desire.

article thumbnail

How to Use Your Asset Management Software to Reduce Cyber Risks

CyberSecurity Insiders

For instance, the team of WhatsApp introduced a new browser extension from early this week to keep their app service users via web safe and secure. . . The extension is called Code Verify and reassures the WhatsApp web version whether their session is authenticated or not, eliminating the threat of the text being tampered in transmission.

article thumbnail

Passwordless? Imagining the Future of Authentication

The Security Ledger

Gerald Beuchelt, the Chief Information Security Officer at LogMeIn talks about how changes in authentication may deliver a passwordless future. Imagining the Future of Authentication appeared first on The Security. Will we ever rid ourselves of them and, if so, how? The post Passwordless? Read the whole entry. »

article thumbnail

Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape

The Security Ledger

Jim and I talk about the findings of DirectDefense’s latest Security Operations Threat Report and dig into the intriguing ways artificial intelligence (AI) is shaping both cyberattack and defense automation strategies. Jim Broome is the President and CTO at DirectDefense.

article thumbnail

Palo Alto Networks fixes a critical flaw in firewall PAN-OS

Security Affairs

Palo Alto Networks addressed a critical flaw in the PAN-OS of its next-generation firewalls that could allow attackers to bypass authentication. OS ) that powers its next-generation firewalls that could allow unauthenticated network-based attackers to bypass authentication. x base score of 10. . x base score of 10.