article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

For Hacking. Today, malicious actors from cybercriminal ransomware gangs to nation-state affiliated hacking groups are teeing up vulnerable operational technology (OT) environments.

CSO 59
article thumbnail

New York: Cyberattack Is Twitter's Fault, Let's Increase Regulation

SecureWorld News

From the report: "The Twitter Hack is a cautionary tale about the extraordinary damage that can be caused even by unsophisticated cybercriminals. The Hackers further escalated the Twitter Hack and changed the fraud scheme by tweeting payment requests directly from overtaken cryptocurrency companies’ accounts. and 10 a.m.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Operator: 'Start **cking Up the U.S. Public Sector'

SecureWorld News

Paul Caiazzo, the CISO at Avertium, discussed this problem on a recent SecureWorld Remote Session : "What we see a lot is attackers in this space are typically not using novel, zero-day type approaches to break into networks, they're using lack of hygiene. And then ultimately use legitimate tools against victim. For how long?

article thumbnail

Legendary Entertainment Relies on MVISION CNAPP Across Its Multicloud Environment

McAfee

Under the guidance of Dan Meacham, VP of Global Security and Corporate Operations and CSO/CISO, the multi-billion dollar organization transitioned from on-premises data centers to the cloud in 2012. MVISION CNAPP helps me keep my system administrators and developers accountable for what they are doing.

article thumbnail

Q&A on 90 Day Certificates. You asked – Sectigo Responds!

Security Boulevard

For CISOs and their teams, this step toward even shorter certificate lifespans represents a significant change in how they will approach establishing digital trust. However, the burden of system administrators carrying this out five or six times a year should not be underestimated.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Always keep your eyes open to control-rights of the senior IT managers or systems administrators with the authority to configure servers, firewalls, cloud storage, and file-sharing (or another network privilege). What are the benefits of cyber security awareness trainings?