Remove CISO Remove Cyber threats Remove InfoSec Remove Phishing
article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. One prominent threat is business email compromise (BEC), which remains a leading vector for cyber threats. Real-world conflicts cast shadows that significantly amplify cyber risks.

article thumbnail

Inflation Is Making Cybersecurity Even More Challenging for Leaders

SecureWorld News

All of this makes it more difficult for organizations to protect themselves from new and emerging cyber threats. Additionally, cybercriminals may be able to use inflation to their advantage, such as by sending phishing emails that appear to be from legitimate companies offering discounts or assistance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs. Christine Bejerasco, CISO of WithSecure , expands that “in the physical dimension, poisoning the well could impact communities in the area.

article thumbnail

Peer Report Explores Concerns, Challenges Facing Cybersecurity Leaders

SecureWorld News

Results of the study, conducted in partnership with research consultancy Censuswide, reveal that businesses are struggling to understand their cyber risks, with 66% of respondents indicating they have limited visibility and insight into their cyber risk profiles, hindering their ability to prioritize investments and allocate resources effectively.

article thumbnail

Burnout: The Hidden Cost of Working in Cybersecurity & Other High Risk Fields

Jane Frankland

In this blog, and ahead of my talk at Infosec this week , I’m delving into this, and giving you tips for recognising its signs and preventing it as a leader. It poses a threat in numerous ways. Much of this time is spent investigating and remediating threats caused by employee mistakes. Naturally, attackers take advantage.

article thumbnail

How security professionals will rise to the challenge of cyber defense in 2022

CyberSecurity Insiders

We have seen firsthand that it takes more than an individual task force to combat ransomware and other related threats such as phishing, insider threats and more. Tyler Farrar, CISO, Exabeam. What do ransomware, phishing, advanced persistent threats and the like all have in common?

article thumbnail

The Hacker Mind: G-Men in Cyberspace

ForAllSecure

Vamos i I realized this isn't the typical InfoSec opening for The Hacker Mind but it is an important backstory for this episode's guest. And you know, there's a lot in between that but at the end, I totally understand the cyber threat that that the nation is facing. How we ended up here at this point. Around companies, right?