article thumbnail

5 Cyber Trends to Expect in 2024

NetSpi Executives

From the emergence of the MOVEit vulnerability to the wide adoption of ChatGPT and its associated security risks, nearly every industry was impacted by cyber threats. Teams must keep pace with digital transformation to ensure cloud security. The past year certainly had no shortage of cybersecurity firsts.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Alexandra Heckler is Chief Information Security Officer at Collins Aerospace, where she leads a diverse team of cyber strategy and defense experts to protect against cyber threats and ensure regulatory compliance. Director/CISO of IT Risk Management. Collins Aerospace. government clients. Diane Brown. Ulta Beauty.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Centrify Research Reveals 90% of Cyberattacks on Cloud Environments Involve Compromised Privileged Credentials

CyberSecurity Insiders

found that 65% of respondents saw attempted attacks on their cloud environments, and 80% of those participants’ cloud environments were successfully compromised. . . In addition, 19% cited maintaining compliance in the cloud as an ongoing issue. . The new study, which surveyed 150 IT decision makers across the U.S.,

article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

The Last Watchdog

Cyber threats have steadily intensified each year since I began writing about privacy and cybersecurity for USA TODAY in 2004. Collectively, enterprises spend a king’s ransom many times over on cyber defense. And as a result, many still do not practice essential cyber hygiene.

article thumbnail

How to shift into a new approach to cybersecurity asset management

CyberSecurity Insiders

A new approach to asset management is required to address the lack of visibility and security risks therein. Containerized applications are often used during a cloud migration to ensure the safety of the assets involved. They also come in handy with shared virtual machines and movement within the cloud.

article thumbnail

Own Your Cloud Security

Thales Cloud Protection & Licensing

theme will help to encourage personal accountability and proactive behavior in digital privacy, security best practices, common cyber threats and cybersecurity careers. As part of their digital transformation process, more and more businesses are moving to the cloud. Driven through mass public engagement, the ‘Own IT.

article thumbnail

SHARED INTEL Q&A: Everything the Cisco-Splunk merger tells us about the rise of SIEMs

The Last Watchdog

Cisco’s recent move to acquire SIEM stalwart Splunk for a cool $28 billion aligns with the rising urgency among companies in all sectors to better protect data — even as cyber threats intensify and disruptive advancements in AI add a wild card to this challenge. Related: Will Cisco flub Splunk?

Marketing 306