Remove CSO Remove Cyber Attacks Remove Cyber threats Remove Technology
article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments.

CSO 52
article thumbnail

Australian electric grid vulnerable to Cyber Attacks via Solar Panels

CyberSecurity Insiders

Because of some vulnerabilities in solar panels and smart devices, security experts state that the Australian Electricity Grid is becoming super vulnerable to cyber attacks. Nowadays, companies are showing a lot of interest in offering products loaded with connected technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The High Stakes of Personal Cyber Attacks: Impact on Business, Data, and Reputation

Security Boulevard

Our lives, personal and professional, are intertwined with technology in a way that renders us vulnerable to cyber threats. The consequences of these threats are not limited to our personal realm.

article thumbnail

Our Top 10 Cybersecurity Podcast Episodes

SecureWorld News

Nation-State Cyber Threats. Details: We discuss the "Big Four" nation-state bad actors and the cyber attacks they are capable of. Also, we cover the top 10 cyber attack methods used by Iran and its hacking groups. Plus, what hackers are doing in successful attacks and cybercrime warning signs.

article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

My advice for anybody that asks me which certifications they should get is this: find a certification in a subject that you wish to learn about,” Palo Alto Networks CSO Rick Howard said. “If Introduction to Cybersecurity Tools & Cyber Attacks. Also read: How to Get Started in a Cybersecurity Career.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

VoIP phishing and impersonation also victimized millions of corporate employees across the world , contributing to an even greater cyber threat. For enterprise digital health, it is imperative to prevent illegitimate access attempts and to deter inside and outside attackers from causing serious damage.

article thumbnail

Cybersecurity Awareness Month: Security Experts Reflect on Safety

CyberSecurity Insiders

Since last October, we have seen enterprises such as SolarWinds, Colonial Pipeline, JBS USA Holdings, Kesaya, Olympus and more become victims of large-scale cyber attacks, causing ripple effects for the companies and their customers. digital infrastructure against frequent and sophisticated attacks. Tyler Farrar ,CISO, Exabeam.