Remove CSO Remove Cyber Attacks Remove Cyber threats Remove Cybersecurity
article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. For Hacking.

CSO 52
article thumbnail

Australian electric grid vulnerable to Cyber Attacks via Solar Panels

CyberSecurity Insiders

Because of some vulnerabilities in solar panels and smart devices, security experts state that the Australian Electricity Grid is becoming super vulnerable to cyber attacks. And unless these devices are secure enough, their usage can invite more troubles,” said Alistair MacGibbon, the CSO of CyberCX.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The High Stakes of Personal Cyber Attacks: Impact on Business, Data, and Reputation

Security Boulevard

Our lives, personal and professional, are intertwined with technology in a way that renders us vulnerable to cyber threats. The consequences of these threats are not limited to our personal realm. The post The High Stakes of Personal Cyber Attacks: Impact on Business, Data, and Reputation appeared first on Security Boulevard.

article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

” Also read: Cybersecurity Employment in 2022: Solving the Skills Gap. My advice for anybody that asks me which certifications they should get is this: find a certification in a subject that you wish to learn about,” Palo Alto Networks CSO Rick Howard said. “If Also read: How to Get Started in a Cybersecurity Career.

article thumbnail

BrandPost: Remediate Insecure Configurations to Improve Cybersecurity

CSO Magazine

Ensuring that your IT environment is safe from cyber threats can be a real challenge. The CIS Controls are a prioritized set of actions that mitigate the most common cyber-attacks. They translate cyber threat information into action.

article thumbnail

Our Top 10 Cybersecurity Podcast Episodes

SecureWorld News

Top 10 cybersecurity podcast episodes from the past year. Nation-State Cyber Threats. Details: We discuss the "Big Four" nation-state bad actors and the cyber attacks they are capable of. Also, we cover the top 10 cyber attack methods used by Iran and its hacking groups. From Bombs to Cybersecurity!

article thumbnail

BrandPost: Security Leaders Share 5 Steps to Strengthening Cyber Resilience

CSO Magazine

With new threat actors emerging every day and a growing number of cyber attacks making headlines, cybersecurity has become a critical business imperative.