Remove InfoSec Remove Internet Remove Social Engineering
article thumbnail

Top 8 Cybersecurity Podcasts of 2021

eSecurity Planet

Since 2017, host Jack Rhysider has investigated some of the most noteworthy stories related to the darkside of the internet, specifically hacking, data breaches, and cybercrime. It requires some baseline industry knowledge, but it’s a great way to stay on top of InfoSec current events. Malicious Life. 5 stars, 670 ratings.

article thumbnail

Personal Cybersecurity Concerns for 2023

Security Through Education

The Internet of Things. IBM describes the internet of things (IoT) as the “the concept of connecting any device … to the Internet and to other connected devices.” Most if not, all social engineering attacks will attempt to trigger some emotion such as urgency, fear, greed, or curiosity. Rosa Rowles.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber CEO – Cyber Hygiene is More Critical for Your Business Now Than Ever Before – Here’s Why

Herjavec Group

In light of the ever-evolving threat landscape, the interconnectivity driven by the Internet of Things (IoT), and rising remote work scenarios, one thing is clear – the strength of an organization’s cyber hygiene relies on the internal practices implemented.

article thumbnail

From a tech explosion to accidental cyberattacks, researchers offer a glimpse into 2030

SC Magazine

Enter Project 2030, a collaboration between Oxford Visiting Researcher Victoria Baines and Trend Micro Vice President of Security Research Rik Ferguson, which uses a mixture of survey data and forward-thinking understanding of technology to predict the infosec concerns a decade from now. AI could impact more than just social engineering.

article thumbnail

The pros and cons of SOAR explained

SC Magazine

Today’s columnist, Perry Carpenter of KnowBe4, writes that with the FBI reporting an increase of 300,000 in internet crime complaints in 2020, SOAR tools can strike a nice balance between automation and human analysis. Bear in mind that SOAR requires a mix of technologies and tools that deliver the capabilities the infosec team requires.

article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

Chris’s Cybersecurity Journey Starting his career on a help desk for a Fortune 200 energy firm, Christopher’s path to infosec is a testament to the many unexpected routes leading to cybersecurity expertise. ” As Chris and I discuss, social engineering attacks are the first step in many sophisticated attacks.

CSO 59
article thumbnail

OSINT in 60 seconds. Mind reading on TV

Pen Test Partners

These are common con techniques and used by social engineers. Targets who were UK based, had been in one area for a while, or were quite open in their approach to social media were easier to find. He has been a speaker on the infosec circuit and was one of the keynotes at the inaugural 44CON London security event in 2011.

Scams 81