article thumbnail

Top 5 Cyber Predictions for 2024: A CISO Perspective

Security Boulevard

This adoption brings us to the flip side of the generative AI coin: attackers are leveraging AI tools to elevate and automate phishing campaigns, craft extremely evasive malware, and reduce the development time of threats across the board. Let’s explore five predictions that should be top of mind for security leaders and organizations.

CISO 104
article thumbnail

The challenges of being a CISO during the COVID-19 pandemic

IT Security Guru

The pre-COVID-19 CISO. The global COVID-19 pandemic has been a tumultuous time for Chief information security officers (CISOs) who on any given day have a long and complicated list of responsibilities. This pandemic has given the CISO role and security industry an opportunity to redefine its role and value proposition.

CISO 55
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco’s CISO of the Month – Esmond Kane

Cisco Security

This month, we interviewed Esmond Kane, CISO of Steward Health Care. Across Healthcare, infosec had to help IT rapidly improve endpoint hygiene, VPN posture assessment, handle all the COVID-related Phishing, increase and mitigate cloud exposure, and more. Esmond Kane is Cisco’s CISO of the month.

CISO 74
article thumbnail

News Alert: CybeReady issues a summer saeson guide outlining 5 workforce security strategies

The Last Watchdog

Produced by the company’s security experts, the guide is part of the CISO Toolkit, which is designed to help cybersecurity managers to communicate tips and best practices and help employees in maintaining a higher level of security – easily and effectively.

article thumbnail

Enabling Secure Remote Working in Times of Crisis: Plan Ahead

Thales Cloud Protection & Licensing

VPN access to the network, when most apps are still delivered on-premises. Unfortunately, businesses still rely on simple usernames and passwords, making phishing campaigns serious security issues. Remote desktop or virtual environments.

VPN 131
article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 2)

The Last Watchdog

Instead of arguing about MFA strength, VPN vendor, or nation-state treat actors, let’s finish our conversation about using dedicated administrator accounts and unique passwords. Meanwhile QR-code phishing arose as a popular form of attack. In 2024 we’ll see more of the same.

article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

In other words, it’s not just about implementing MFA to verify user trust, it’s about using phishing-resistant MFA with risk-based authentication , device posture checks and other security controls. To achieve more resilience in this heightened risk environment, stepping up zero trust maturity is essential. What does that journey look like?