Remove CSO Remove Internet Remove Social Engineering Remove Technology
article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »

CSO 52
article thumbnail

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

As an enterprise security team, you could restrict internet access at your egress points, but this doesn’t do much when the workforce is remote. In short, anything accessible from the internet should be given extra attention. This disables peer-to-peer access, enabling internet-only access. Food for thought, eh!

Risk 247
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Interview with Dr. Arun Vishwanath on the Latest Cybersecurity Attacks

CyberSecurity Insiders

We need to take user protection seriously, change the security paradigm, by studying and building protections around people and processes, rather than solely focusing on technology. How are social networks like Facebook, Instagram and TikTok contributing to the “people problem” of cybsersecurity? What more can be done?

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Brian Levine is senior director of product security at Axway, a global security engineering organization delivering training, tools, processes and DevSecOps practices for secure applications and cloud services to the enterprise market. John Bruggeman is chief technology officer at Hebrew Union College – Jewish Institute of Religion.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Social engineering attacks , including phishing, spam, and viruses introduced via clickable links within e-mail affected 80% of the banking institutions in 2016. Today, c yber security incidents lead to significant damage, alarming organizations of all types and sizes in different geographic locations.

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 2)

The Last Watchdog

Or Shoshani , CEO and founder, Stream Security Shoshani As 2023 ends, we’re already seeing businesses adopting technology to diagnose and detect threats to their cloud infrastructure before they occur. Michiel Prins , Co-Founder, HackerOne Prins Ethical hackers are consistently first to pressure-test emerging technology.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Even if footage isn’t widely released, facial recognition technology is well advanced enough to identify specific individuals within obtained footage, which can lead to whole host of issues for those people,” Smith continued.