article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »

CSO 59
article thumbnail

Navigating the Dual Impact of AI in Cybersecurity

Approachable Cyber Threats

As we navigate this dynamic landscape, AI emerges as both the guardian of digital fortresses and the stealthy architect of cyber threats. The enigmatic spectrum of AI-based cyber attacks is growing rapidly. Movie Fantasy Meets Reality: Researchers at HYAS Infosec, Inc. How are the bad guys using AI?”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Navigating the Dual Impact of AI in Cybersecurity

Approachable Cyber Threats

As we navigate this dynamic landscape, AI emerges as both the guardian of digital fortresses and the stealthy architect of cyber threats. The enigmatic spectrum of AI-based cyber attacks is growing rapidly. Movie Fantasy Meets Reality: Researchers at HYAS Infosec, Inc. How are the bad guys using AI?”

article thumbnail

The 7 Biggest Cybersecurity Scoops from February 2015

SiteLock

Fast forward to 2015, and we’ve had several trending cyber security issues appear in just these first few weeks. Below are 7 trending cyber security stories that you should read for February 2015. Anthem Cyber Attack. The Infosec Institute recently wrote a topic on the subject, which can be read here.

article thumbnail

Spotlight: When Ransomware Comes Calling

The Security Ledger

Related Stories Spotlight: Is There A Cure For InfoSec’s Headcount Headache? Himes on Congress’s About-face on Cybersecurity Episode 226: The Cyber Consequences Of Our Throw Away Culture. Ransomware attacks have become a mainstay of the cyber threat landscape -and among the most dreaded forms of cyber crime.

article thumbnail

Thrive today with not just being smart but being cyber smart

CyberSecurity Insiders

Security experts are responsible for the cyber health of their organizations, and therefore must constantly grow and expand their expertise to face tomorrow’s newest cyber attack. Develop a ‘security champions’ program.

article thumbnail

Achieving PCI DSS Compliant Firewalls within a Small Business

Security Boulevard

Firewalls are used to segment or isolate networks and are an essential component to limit cyber threats and protect internal networks from the internet and untrusted networks. VISTA InfoSec has been instrumental in helping top multinational companies achieve compliance and secure their IT infrastructure.