Remove tag
article thumbnail

Apple AirTag and other tagging devices add to CISO worries

CSO Magazine

We tag content, devices and our belongings. Tagging is ubiquitous today, in early 2022, but it wasn’t always the case.

CISO 86
article thumbnail

Why Predator is the ultimate CISO movie

Javvad Malik

The movie starts on the outskirts of a jungle and the CISO (Arnie) with his team land in their helicopters. This is a perfect metaphor for how a CISO operates in day to day situations. But hold on, Dillon is tagging along. It represents a struggle many CISO’s around the world face. Don’t believe me?

CISO 246
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

TL;DR of TAG Cyber and Sonrai Security?

Security Boulevard

TAG Cyber, world-class cyber security research and advisory, delivers an expert overview of enterprise risk. TAG Cyber worked with Sonrai Security to better understand how cloud […]. The post TL;DR of TAG Cyber and Sonrai Security? appeared first on Security Boulevard.

article thumbnail

Remote Working One Year On: What the Future Holds for Cybersecurity

Security Boulevard

tag=Inbound Threats'>Inbound Threats</a> <a href='/blog?tag=File tag=File Transfers'>File Transfers</a> <a href='/blog?tag=Email Almost half the CISOs in the HelpSystems’ research admitted that they had already increased their investment in secure collaboration tools. <a href='/blog?tag=Inbound

article thumbnail

How to Enhance Data Loss Prevention in Office 365

Security Boulevard

tag=Cybersecurity'>Cybersecurity</a> <a href='/blog?tag=Data tag=Data Loss Prevention'>Data Loss Prevention</a> <a href='/blog?tag=IT tag=IT Security'>IT Security</a> Protecting customer data from loss and leakage has become a top priority for enterprises over the past decade.

article thumbnail

Attackers create phishing lures with standard tools in Google Docs to steal credentials

SC Magazine

According to Avanan blog, once the attacker publishes the lure, “Google provides a link with embed tags that are meant to be used on forums to render custom content. The attacker does not need the iframe tags and only needs to copy the part with the Google Docs link.

Phishing 110
article thumbnail

The Bridge to Zero Trust

CyberSecurity Insiders

John Masserini, of Tag Cyber, will explore practical approaches to advancing zero trust along with his fellow panelists: Kevin Dana, VP of Information Technology for World Wide Technology; Marcos Christodonte II, Global CISO for CDW; and Allen Jeter, Director of IT for Chainalysis.