Remove CISO Remove Cybercrime Remove Risk Remove Threat Detection
article thumbnail

Is fighting cybercrime a losing battle for today’s CISO?

CyberSecurity Insiders

In this blog, we’ll look at the root causes of concern for today's CISO and share some practical strategies to deter cybercriminals. The CISO role can be an unenviable one. Is the cyber deck stacked against today's CISO? The asymmetry of resources: It’s hard to fight cybercrime on an uneven playing field.

CISO 126
article thumbnail

Unmasking the Cracks of Today’s Cyber Defence

Jane Frankland

Instead, they’ve become complacent in their defence practices and may be exposing themselves to increased risks without even realising it. I’ve partnered with e2e-assure, a leading managed threat detection and response firm as I believe in their brand. You know economic downturns incentivise cybercriminals.

CISO 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tackling Cyber Threats: Is AI Cybersecurity Our Only Hope?

Jane Frankland

Could artificial intelligence (AI) be the key to outsmarting cyber threats in an increasingly connected world? These are questions I’ve been asking myself recently as AI and cybercrime have become hot topics in the tech industry, and for world leaders. Is it our only hope for survival?These

article thumbnail

GUEST ESSAY: How SIEMS, UEBAs fall short in today’s turbulent threat landscape

The Last Watchdog

And the cost of damage directly related to cybercrime is adding up, expected to reach $6 trillion by 2021. The painful impact of cyber attacks on businesses is worsening despite advances in technology aimed at protecting enterprises from malicious network traffic, insider threats, malware, denial of service attacks and phishing campaigns.

CISO 140
article thumbnail

Why an Ounce of Cybersecurity Prevention is Worth a Pound of Detection

McAfee

Cybersecurity detection is a criminal investigation. Cybercrime investigators are experts who are in limited supply. You can apply predictive analytics to leverage in-depth threat intelligence sources to produce real-time, automated assessments of your security posture risks from device to cloud. Proactive Threat Hunting.

article thumbnail

Lapsus$ Attack on Okta: How to Evaluate the Impact to your Organization

Security Boulevard

Microsoft and Okta disclosed breaches this week involving Lapsus$, a cybercrime group that has made headlines multiple times in recent months for attacks against corporations including NVIDIA, Ubisoft, Samsung, and Vodafone. Per Okta, the incident was mitigated within hours of the initial compromise and is no longer a security risk.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Cedric Leighton is founder and president of Cedric Leighton Associates, a strategic risk and leadership management consultancy. Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. Leighton is also a founding partner of CYFORIX, specializing in the field of cyber risk.