article thumbnail

Black Hat 2021: Better Than Ever (As Always)

Duo's Security Blog

Matt will provide an Intelligence Director’s take on the lessons learned from facing some of the most notorious cyber attacks to help answer the question: what makes a world-class incident response program? Wendy will give the CISO perspective on how to build a sustainable, ongoing program using evidence-based practices.

CISO 83
article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

My advice for anybody that asks me which certifications they should get is this: find a certification in a subject that you wish to learn about,” Palo Alto Networks CSO Rick Howard said. “If Introduction to Cybersecurity Tools & Cyber Attacks. Also read: How to Get Started in a Cybersecurity Career.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Machine Identities Can Imperil Enterprise Security

eSecurity Planet

Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO of Cloudentity. High-profile cyber attacks have brought more attention to the issue, driving organizations to consider their machine identity management. How Enterprise Security Can Adapt to Machine Identity Risks.

IoT 120
article thumbnail

Interview with Dr. Arun Vishwanath on the Latest Cybersecurity Attacks

CyberSecurity Insiders

They had super weak, easily guessable passwords, which was visible to anyone who looked. The worst is yet to come and 2021 might, unfortunately, see even bigger attacks realized. What is the “people problem” of cyber security? . Arun Vishwanath from Buffalo, New York, studies the “people problem” of cyber security.

article thumbnail

Pulse Secure: New Deadline for Government to Patch

SecureWorld News

We strongly recommend that customers review the advisories and follow the recommended guidance, including changing all passwords in the environment if impacted. One additional note here: FireEye says it does not believe, at this point, that this is a supply chain attack.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

How to Defend: Empowerment Through Cyber-Threat Intelligence Executive boards and departments face a greater frequency of cyber-attacks and an increased number of vulnerability types across enterprise operations. Place tight controls around the use of all admin rights, including the ability to grant administrative privileges.

article thumbnail

Cybersecurity Awareness Month: Security Experts Reflect on Safety

CyberSecurity Insiders

Since last October, we have seen enterprises such as SolarWinds, Colonial Pipeline, JBS USA Holdings, Kesaya, Olympus and more become victims of large-scale cyber attacks, causing ripple effects for the companies and their customers. digital infrastructure against frequent and sophisticated attacks.