article thumbnail

News alert: Kovrr report reveals exposure and cost of material cyber threats — across industries

The Last Watchdog

“It likewise empowers CISOs and security leaders when communicating risk with boardroom members who may not be well-versed in traditional cybersecurity terminology, enabling them to grasp overall business ramifications more tangibly.” Media contact: Kathy Berardi, 678-644-4122, kathyberardi@berardipr.com

article thumbnail

Fashion brand Guess hacked, DarkSide ransomware group the likely culprit

SC Magazine

Speed is the natural enemy of security, and retailers must beware of increased risks of DDoS attacks, ransomware, fraudulent purchases, [and] phishing campaigns impersonating retailers.”. The post Fashion brand Guess hacked, DarkSide ransomware group the likely culprit appeared first on SC Media.

Retail 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Too Much Holiday Cheer? Here’s Something to Fear: Cybersecurity Predictions for 2020

Adam Levin

At times it can seem like a war of attrition, which brings us to the first series of predictions for 2020: CISOs will get worse at their jobs. Social media will no longer need to be private. Okay, simmer down all you cybersecurity people. I just mean there will be a shortage of experts–i.e., But it totally could.).

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Hackers can spread malware via IoT networks, disrupt supply chains in development, and use a fleet of routers as an IoT botnet to launch a DDoS attack. Also Read: Cloudflare Fended Off Mirai Botnet DDoS Attack. This instance can result in NFV data breaches, resource exhaustion, or DDoS attacks. Network Slice Compromise.

Risk 136
article thumbnail

My 2020 Predictions Revisited: What Worked, What Didn't

Duo's Security Blog

The classic distributed denial-of-service (DDoS) tactic is still in use. Hacktivism also moved up the stack in 2020, disrupting events through social media. As one CISO shared with me, “Our crisis response and subsequent focus on securing productivity pushed new initiatives to 2021.” Well, it was. But then it wasn’t.

article thumbnail

Think of remote access as a business continuity issue

SC Magazine

A little more than a year ago I had the opportunity to interview 40 CISOs about their enterprise access challenges. The post Think of remote access as a business continuity issue appeared first on SC Media. FBI CreativeCommons (Credit: CC PDM 1.0). It’s that simple. Dor Knafo, co-founder and CEO, Axis Security.

article thumbnail

Top 8 Cyber Insurance Companies for 2022

eSecurity Planet

“Where we might have previously relied on what was provided in a short, written application, today we regularly have hour-long underwriting calls with clients, often speaking with their CISOs and security teams, to understand their risk and what security protocols they have in place.”. Also see: Best Third-Party Risk Management (TPRM) Tools.