Remove B2B Remove Cyber Attacks Remove Phishing Remove Technology
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Editor’s note: I recently had the chance to participate in a discussion about the overall state of privacy and cybersecurity with Erin Kapczynski, OneRep’s senior vice president of B2B marketing. Byron: I was initially drawn to cybersecurity as a USA TODAY technology reporter assigned to cover Microsoft.

article thumbnail

Top 5 Attack Vectors to Look Out For in 2022

Security Affairs

Malicious actors are continually looking for better ways to carry out successful cyber attacks. This article focuses on the top five attack vectors organizations should look out for and defend against in 2022. Some threat actors carry out phishing attacks using social media and networking platforms, such as Twitter or LinkedIn.

IoT 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity in the Evolving Threat Landscape

Security Affairs

As technology evolves and our dependence on digital systems increases, the cybersecurity threat landscape also rapidly changes, posing fresh challenges for organizations striving to protect their assets and data. A Dynamic, Complex Threat Landscape Today’s cyber threat landscape is characterized by its dynamic and complex nature.

article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

Compromised logins continue to facilitate cyber attacks at all levels, from phishing ruses to credential stuffing to enabling hackers to probe deep inside of a breached network. With Trusona’s technology , authentication via smartphones replaces the former password login screens.

Passwords 164
article thumbnail

ROUNDTABLE: What happened in privacy and cybersecurity in 2021 — and what’s coming in 2022

The Last Watchdog

In 2021, we endured the fallout of a seemingly endless parade of privacy controversies and milestone cyber attacks. Last Watchdog sought commentary from technology thought leaders about lessons learned in 2021– and any guidance they might have to offer heading into 2022. Related: The dire need to security-proof APIs.