article thumbnail

10 Cybersecurity Trends That Emerged in 2023

Security Boulevard

It’s a thrilling time to work in cybersecurity, but new technology and unprecedented opportunities also present us with extraordinary challenges. One such variety, ransomware, is a “trend” that has provoked cybersecurity teams for years. Apparently, an employee at Company X used an LLM to help them finish a whitepaper.

article thumbnail

What’s Your Fail-Safe Posture? Before You Learn How to Fly, Learn How to Fall

CyberSecurity Insiders

Way back in 1975, two members of the Institute of Electrical and Electronics Engineers (IEEE) authored a report about how to protect computer systems. To discover more about CISSP read our whitepaper, 9 Traits You Need to Succeed as a Cybersecurity Leader. To learn more about this compelling topic, read our latest article.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NIST Updates: What You Need to Know

SecureWorld News

It regularly releases new cybersecurity guidance. Addressing attack resilience from an engineer's perspective. In early 2022, NIST updated its document titled "Engineering Trustworthy Secure Systems." It advised engineers to look for evidence showing that a system was sufficiently protected against data loss and intrusions.

article thumbnail

Can 5G Cybersecurity Be a Market Differentiator? Verizon Is Betting on It

SecureWorld News

Verizon tries to stand out on 5G network cybersecurity. The company rolled out a new whitepaper on its 5G network security and how the company claims to be a standout in the space. To solve for this, Verizon engineers have virtualized many of these functions and moved them to the cloud.".

article thumbnail

Safety and Security in Automated Driving

Adam Shostack

“ Safety First For Automated Driving ” is a big, over-arching whitepaper from a dozen automotive manufacturers and suppliers. One way to read it is that those disciplines have strongly developed safety cultures, which generally do not consider cybersecurity problems.

Risk 140
article thumbnail

Information Stealing Malware on the Rise, Uptycs Study Shows

SecureWorld News

According to the new Uptycs whitepaper, Detecting the Silent Threat: 'Stealers are Organization Killers' (gated link), a variety of new info stealers have emerged this year, preying on Windows, Linux, and macOS systems. A new study from Uptycs has uncovered an increase in the distribution of information stealing malware.

Malware 64
article thumbnail

Cybersecurity Awareness Month Blog Series: Using Technology to Safeguard the Nation’s Critical Infrastructure

Thales Cloud Protection & Licensing

Much of today’s cybersecurity focuses on maintaining a perimeter defense — not letting malicious actors into the security boundary. Some of these include: Advanced persistent threats (APTs); Insider threats; Social engineering; and, Human error. Perimeter Defense.