article thumbnail

Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape

The Security Ledger

Host Paul Roberts speaks with Jim Broome, the CTO and President of MSSP DirectDefense about the evolution of cybersecurity threats and how technologies like AI are reshaping the cybersecurity landscape and the work of defenders and Managed Security Service Providers (MSSP). Read the whole entry. » » Click the icon below to listen.

article thumbnail

Soaring ransomware payments, consistent infections, deceptive URLs and more in this year’s 2022 BrightCloud® Threat Report

Webroot

Cyber threats are becoming increasingly difficult to detect. Our threat research analysts have complied the latest threat intelligence data to bring you the most cutting-edge and insightful information about the most recent cyber threats and what they mean for you. What does this mean for your business?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Ongoing Cyber Threat to Critical Infrastructure

Thales Cloud Protection & Licensing

The Ongoing Cyber Threat to Critical Infrastructure. With that in mind, Thales has launched the 2022 Thales Data Threat Report Critical Infrastructure Edition, which includes responses from 300 security leaders and practitioners within critical infrastructure organizations. The Threat of Ransomware.

article thumbnail

Manufacturing needs to adopt a Zero Trust approach to mitigate increased cyber threats

Thales Cloud Protection & Licensing

Manufacturing needs to adopt a Zero Trust approach to mitigate increased cyber threats. Today, at the dawn of the 4th industrial revolution, manufacturers of all kinds are a tempting and vulnerable high-value target for threat actors because of their high intrinsic worth and the dangers of economic harm from supply chain disruptions.

article thumbnail

Insider Threat: The Real Risk to Your Organization

Approachable Cyber Threats

Category Cybersecurity Fundamentals Risk Level. We call this insider threat and it can be devastating to organizations from any industry. Let’s break down the major characters of insider threat as outlined in the Verizon Insider Threat Report , and be prepared, because not all of them are intentionally malicious.

Risk 98
article thumbnail

Securing Public Sector Against IoT Malware in 2024

Security Boulevard

However, as IoT innovation and adoption grows, so do the associated security risks. In this blog post, we’ll explore the potential impact of IoT malware on the public sector — a story of innovation, risk, and the need for resilience. government and build resilience in the face of evolving cyber threats. and East Asia.

IoT 73
article thumbnail

Sophisticated Attacks Against Mobile Devices Surge 187%

SecureWorld News

However, as reliance on mobile technology grows, so does the risk of cyber threats targeting these devices. Cybersecurity firm Zimperium recently released its 2023 Global Mobile Threat Report 2023 , revealing a concerning increase in sophisticated attacks targeting mobile devices.

Mobile 78