Remove CSO Remove Engineering Remove Technology
article thumbnail

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The Last Watchdog

Related: Technology and justice systems The U.S. Avaya Holdings , Check Point Software Technologies , and Mimecast Limited each minimized or obscured the extent of security breaches linked to the SolarWinds Orion hack, impacting investor trust and highlighting the critical importance of clear, truthful communication.

CISO 263
article thumbnail

How deepfakes enhance social engineering and authentication threats, and what to do about it

CSO Magazine

Deepfake technology is an escalating cybersecurity threat to organizations. Learn what makes these 6 social engineering techniques so effective. | Get the latest from CSO by signing up for our newsletters. ] Learn what makes these 6 social engineering techniques so effective. |

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Engineering workstation attacks on industrial control systems double: Report

CSO Magazine

Engineering workstation compromises were the initial attack vector in 35% of all operational technology (OT) and industrial control system breaches in companies surveyed globally this year, doubling from the year earlier, according to research conducted by the SANS Institute and sponsored by Nozomi Networks.

article thumbnail

MY TAKE: RSAC 2025’s big takeaway — GenAI is growing up fast, but still needs human direction

The Last Watchdog

Jay” Abdullah , Mastercards Deputy CSO who gave a keynote address at The CSA Summit from Cloud Security Alliance at RSAC 2025. He told me he takes his responsibility to vet every GenAI output vigorously especially when deploying it to come up with information relayed back to customers with engineering backgrounds. The payoff?

article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »

CSO 59
article thumbnail

ICYMI: A Look Back at Exposure Management Academy Highlights

Security Boulevard

In this post, we look at a few of the highlights, focusing on the work of three Tenable thought leaders: information security engineer Arnie Cabral, CSO Robert Huber and CIO Patricia Grant. Ultimately, you cant do exposure management the right way without a strong relationship between the CIO and the CSO, she wrote.

CSO 52
article thumbnail

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

Fun fact: 80% of these breaches occur at the endpoint , often via phishing or social engineering. About the essayist: Den Jones, CSO at Banyan Security , which supplies s imple, least-privilege, multi-cloud application access technologies. It’s quick to deploy and simple to operate. Let’s talk VPNs. Food for thought, eh!