Remove CISO Remove Cyber threats Remove Technology
article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

MacMillan William MacMillan , Chief Product Officer, Andesite In 2025, we’ll see AI platforms analyze massive amounts of threat intel in seconds. Well see CISOs increasingly demand answers about why models flag certain malicious activity and how that activity is impactful at enterprise scale. That’s the easy part.

article thumbnail

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The Last Watchdog

Related: Technology and justice systems The U.S. Avaya Holdings , Check Point Software Technologies , and Mimecast Limited each minimized or obscured the extent of security breaches linked to the SolarWinds Orion hack, impacting investor trust and highlighting the critical importance of clear, truthful communication.

CISO 263
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Rebels Teach us About Stronger Cyber Defence

Jane Frankland

But if we switch our focus to the world of technology, we seei a starkly different picturea landscape increasingly shaped by control, compliance, and automation. The rapid advancement of technology, particularly in AI and automation, is transforming the way we interact with the digital world.

article thumbnail

LW ROUNDTABLE:  Predictive analytics, full-stack visualization to solidify cyber defenses in 2025

The Last Watchdog

To wrap up our 2024 year-end roundtable, we turn our attention to new technologies and trends that are emerging to help bridge the gaps. FIPS-203 enables legal PQC deployment, prompting CISOs to overhaul encryption strategies. Enterprises are using AI-enabled automations to satisfy the Tier 1 cyber activities.

Risk 173
article thumbnail

MY TAKE: RSAC 2025 – Conversing with vendors hanging out in the Marriott Marquis mezzanine

The Last Watchdog

Alcavio: AI-powered deception Anand Akela of Alcavio Technologies offered a provocative take: Deception technology is the only way to detect threats that no one has seen before zero days generated on the fly by LLMs. But without automation, he added, threat teams are drowning.

Mobile 189
article thumbnail

Shifting from Business Continuity to Continuous Business in Cyber

Jane Frankland

A scenario where you could face any looming cyber crisis knowing that you’d emerge unscathed. As ITDMs, CISOs and cyber risk owners this is our dream scenario, and he got me thinking. It means ensuring that you’re future ready and better equipped than your competitors to meet the demands of new technologies and threats.

article thumbnail

The strong link between cyber threat intelligence and digital risk protection

CSO Magazine

While indicators of compromise (IoCs) and attackers’ tactics, techniques, and processes (TTPs) remain central to threat intelligence, cyber threat intelligence (CTI) needs have grown over the past few years, driven by things like digital transformation, cloud computing, SaaS propagation, and remote worker support.