article thumbnail

News alert: AppDirect poll reveals company leaders losing sleep over cyber risks, compliance

The Last Watchdog

Best-in-class training, with testing and regular retraining and testing, will go a long way to mitigate the risks of social engineering security breaches.” Bisaillon “Cyber crime is a people problem—and better people processes and education are the solution,” said Bisaillon.

article thumbnail

How to Use Your Asset Management Software to Reduce Cyber Risks

CyberSecurity Insiders

The best asset management software sets up a stock of your organization’s assets, phases of their entire life cycles, most recent software upgrades, the risks they could face, and the approaches to ensure their security. . . IoT devices could be used like botnets so as to execute DDoS attacks. . .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 1)

The Last Watchdog

Related: Adopting an assume-breach mindset With that in mind, Last Watchdog invited the cybersecurity experts we’ve worked with this past year for their perspectives on two questions that all company leaders should have top of mind: •What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at my organization?

article thumbnail

Top 5 Cyber Predictions for 2024: A CISO Perspective

Security Boulevard

This past year set a profound stage, from the advent of stringent cyber regulations to the convergence of generative AI, social engineering, and ransomware. Last year, we witnessed the fast-evolving nature of social engineering attacks, and this evolution poses greater challenges for detection and defense.

CISO 104
article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

Last Watchdog posed two questions: •What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at my organization? Wayne Schepens , Chief Cyber Market Analyst, CyberRisk Alliance Schepens The weakest link is still humans; attacks caused by social engineering remain a critical risk for all organizations.

article thumbnail

IDENTITY MANAGEMENT DAY 2023: Advice from Cyber Pros

CyberSecurity Insiders

In the current digital landscape, identity security has gained paramount importance due to the growing cyber risks posed by phishing and social engineering attacks utilizing AI. Why is identity management and security important in 2023? “In This can help guard against identity theft and help prevent unwanted access.

article thumbnail

Establishing an IAM Blueprint for Securing Manufacturing Environments

Thales Cloud Protection & Licensing

The convergence of IT and OT domains has emerged another infection vector – weak access controls to authenticate employees into a wide range of cloud-based and on-premises systems. The example of the Colonial Pipeline attack is a fine example of the risks posed by the convergence of IT and OT. How to reduce the risk of breach.