article thumbnail

BOOK REVIEW: ‘Security Yearbook’ preserves cybersecurity history — highlights tectonic shift

The Last Watchdog

Cybersecurity, which started with antivirus suites, spam filters and firewalls, has mushroomed into a $103 billion industry. Tectonic shift Digital transformation takes on a more precise meaning through the lens of Stiennon’s latest book. At the same time, a tectonic shift to smarter technologies and strategies is rapidly taking shape.

article thumbnail

SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers

The Last Watchdog

Related: The Golden Age of cyber spying A new book by Dr. Chase Cunningham — Cyber Warfare – Truth, Tactics, and Strategies — accomplishes this in a compelling, accessible way. If you look at the way your IPhone and a Surface Book sign in works that’s where we are going.

Passwords 149
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Network Security: A Top Priority for Healthcare Organizations

Security Boulevard

How is FireMon Better Book a Demo Healthcare companies have a responsibility to protect sensitive patient data and ensure compliance with regulations like HIPAA. They help streamline the complex task of managing firewalls and security policies, which is vital for maintaining a secure network. Why Act Now? Why Choose FireMon?

article thumbnail

News alert: Traceable celebrates winning the prestigious SINET16 Innovator Award for 2023

The Last Watchdog

The SINET16 Innovator Award recognizes the most innovative companies and technologies addressing today’s top cybersecurity threats and vulnerabilities. To learn more about how API security can help your business, book a demo with a security expert. San Francisco, Calif.,

InfoSec 100
article thumbnail

Faults in Our Security: 6 Common Misconceptions in Cybersecurity

SecureWorld News

As a regular attendee of security conferences and contributor to security books, it's evident to me that the field remains a hot topic. Whether applied to firewall rules or code execution permissions, Default Permit operates on the flawed assumption that allowing everything except known threats is a sound strategy.

article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

The Last Watchdog

Riccardi: My book discusses how the perception of cyberattacks shifted from being mere data breaches to having real-world consequences, especially after high-profile cases in 2021, like Colonial Pipeline and Schreiber Foods. How does your main theme of tie in? Riccardi: Basic cyber hygiene is 90 percent of what cybersecurity is all about.

article thumbnail

Cybersecurity Training and Tech Aren’t Enough; ‘Culture Change’ Needed

eSecurity Planet

Security executives have been adding features focusing on zero-trust technology , automation, responsive SOAR platforms , secure access service edge (SASE) models, and deception technology , among others. But that technology can at best limit damage if the human element doesn’t improve.