Remove Cyber Risk Remove Media Remove Technology
article thumbnail

News alert: Living Security report reveals that just 10% of employees drive 73% of cyber risk

The Last Watchdog

Austin, TX, July 21, 2025, CyberNewswire — Living Security, the global leader in Human Risk Management (HRM), today released the 2025 State of Human Cyber Risk Report , an independent study conducted by leading research firm Cyentia Institute. The views and claims expressed belong to the issuing organization.

article thumbnail

Cisco Contributes to Cyber Hard Problems Report

Cisco Security

Last updated in 2005, this latest edition of Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future focuses on the massive evolution that has occurred in cybersecurity, digital systems and society as a whole over the last several years. Cloud computing was nascent and was still without online storage and elastic compute.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Ponemon study warns: AI-enhanced deepfake attacks taking aim at senior execs

The Last Watchdog

As AI technology advances, attackers are shifting their focus from technical exploits to human emotions using deeply personal and well-orchestrated social engineering tactics. Typically, the attacker collects authentic media samples of their target, including still images, videos, and audio clips, to train the deep learning model.

article thumbnail

Tech Show London: Making Dating Scams Less Attractive

IT Security Guru

Technology has transformed so many areas of our lives and relatively quickly in the grand scheme of things. One area where technology has reshaped experience is online dating. One area where technology has reshaped experience is online dating. In fact, youre more likely to be targeted on social media. The biggest shift?

Scams 96
article thumbnail

Story of the Year: global IT outages and supply chain attacks

SecureList

Recent incidents in the Middle East involving pagers have illustrated the risks associated with hardware supply chain attacks. Media sources reported that explosives had been concealed within the devices. As our reliance on satellite-based technologies increases, these systems are becoming attractive targets for threat actors.

Internet 104
article thumbnail

News Alert: INE Security outlines top 5 training priorities emerging from RSAC 2025

The Last Watchdog

AI Risk Management Becomes Business-Critical AI security solutions dominated RSAC this year, signaling that as organizations adopt advanced response technologies, comprehensive training must keep pace. ” About INE Security: INE Security is the premier provider of online networking and cybersecurity training and certification.

article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

When data breaches escalate, cyber-attacks grow more sophisticated, nation states ramp up their digital warfare, and regulations tighten the noose, staying ahead isnt just an optionits your only line of defence. Nation-states and geopolitical tensions are increasingly fuelling modern cyber threats. Its not just hypothetical anymore.