article thumbnail

Hi-5 With A CISO Dmitriy Sokolovskiy, Avid Technology

Security Boulevard

The post Hi-5 With A CISO <br><br> Dmitriy Sokolovskiy, Avid Technology appeared first on CybeReady. The post Hi-5 With A CISO Dmitriy Sokolovskiy, Avid Technology appeared first on Security Boulevard. He held information security positions in CyberArk for 11 years, and 3 […].

CISO 59
article thumbnail

Next-Gen Protection Essential to Prevent Evolving Phishing Attacks 

Security Boulevard

In early February, SlashNext debuted “Phish Stories,” a?videocast?and phishing attacks challenging businesses today.??? phishing attacks?— their latest strategies, attack vectors, and technologies used?to CISOs, CSOs and cybersecurity professionals.?? and podcast series?designed the latest, most innovative?phishing

Phishing 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Three cybercrime technology trends to watch in 2023

CyberSecurity Insiders

Spy”-type cyberspace race as both criminals and defenders vie to gain the upper hand using new and emerging technologies. Every technology that enables our cyber teams to pinpoint and resolve threats and prevent attacks more quickly and accurately also benefits cybercriminals. We call these threat actors “ Quasi-APTs.”.

article thumbnail

What Is the NIST Phish Scale?

SecureWorld News

The National Institute of Standards and Technology (NIST) recently developed a new method that will help prevent organizations and their employees from falling victim to phishing cyberattacks, which it calls the Phish Scale. A tool like the Phish Scale could be very useful for organizations in the fight against phishing.

article thumbnail

Defending Against Credential Phishing Starts by Protecting Your Users

SecureWorld News

As the global pandemic continues to run rampant, CISOs are not only struggling to solve traditional cybersecurity challenges, but are faced with a new surge of pandemic themed phishing scams intended to deceive users and infiltrate organizations. How do I make my users more resilient to phishing scams?

article thumbnail

CIO in the Age of AI: A Title Under Threat?

SecureWorld News

The role of the Chief Information Officer has undergone significant transformations over the past few decades, driven by the rapid advancements in technology. Chief should mean something," said Patrick Benoit , Global CISO for Brinks and member of the SecureWorld Houston Advisory Council. "I That is a huge conflict of interest.

CISO 102
article thumbnail

NIST and No-notice: Finding the Goldilocks zone for phishing simulation difficulty

Webroot

Earlier this year, the National Institute for Standards and Technology (NIST) published updated recommendations for phishing simulations in security awareness training programs. The thinking obviously being that letting users in on the phishing simulation game will heighten suspicion of their inbox and skew baseline results.

Phishing 109