article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »

CSO 59
article thumbnail

Technology’s contributions toward safety in healthcare

CyberSecurity Insiders

Technology in healthcare has the potential to make all the difference in terms of safety outcomes. But technology isn’t always safe. However, technology ultimately is doing more good than bad in healthcare. This widespread utilization of telehealth would have been impossible without advancing technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Q&A: Here’s why robust ‘privileged access management’ has never been more vital

The Last Watchdog

However, lacking robust protection, privileged accounts, which are intended to give administrators the access they need to manage critical systems, can instead be manipulated to enable attackers to move laterally across an organization’s network. LW: As the definition of privilege expands, what areas present the greatest risk? .

article thumbnail

Top IT Areas You Need to Check to Strengthen Your Cybersecurity

CyberSecurity Insiders

Today, technological advances have seen a rise in cyber security threats globally. That is why most companies hire professional information security services to mitigate the risks arising from data breaches. That is why most companies hire professional information security services to mitigate the risks arising from data breaches.

article thumbnail

Announcing Duo’s Vision to Streamline Authentication & Enhance User Experience

Duo's Security Blog

During the workday, on the other hand, I spend a lot of time talking to systems administrators, security operations analysts, and IT professionals who do love MFA. They’ve seen it drive down incidents and help desk tickets, reduce their risks, and make compliance programs a lot easier.

article thumbnail

RSAC insights: Software tampering escalates as bad actors take advantage of ‘dependency confusion’

The Last Watchdog

Findings released this week by ReversingLabs show 87 percent of security and technology professionals view software tampering as a new breach vector of concern, yet only 37 percent say they have a way to detect it across their software supply chain. Its function is to record events in a log for a system administrator to review and act upon.

Software 255
article thumbnail

Career Choice Tip: Cybercrime is Mostly Boring

Krebs on Security

The researchers concluded that for many people involved, cybercrime amounts to little more than a boring office job sustaining the infrastructure on which these global markets rely, work that is little different in character from the activity of legitimate system administrators.