Remove CISO Remove Cyber Attacks Remove Ransomware
article thumbnail

GUEST ESSAY: The role advanced ‘VM’ is ideally suited to play in combating modern cyber attacks

The Last Watchdog

Modern cyber attacks are ingenious — and traditional vulnerability management, or VM, simply is no longer very effective. The consequences of a cyber attack can be devastating; from a rapid drop in brand reputation to loss of business and sensitive data. Cyber attacks can also invite lawsuits and can even be fatal.

article thumbnail

GUEST ESSAY: Why the arrests of cyber criminals in 2021 will incentize attackers in 2022

The Last Watchdog

In 2021, law enforcement continued making a tremendous effort to track down, capture and arrest ransomware operators, to take down ransomware infrastructure, and to claw back ransomware payments. These transformations for ransomware groups will become the source of new attacks. The ascendency of CISOs.

CISO 262
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: 6 steps any healthcare organization can take to help mitigate inevitable cyber attacks

The Last Watchdog

The headlines are disturbing: Breach of patient records ; Surgeries and appointments cancelled due to IT outage ; and even, Death attributed to ransomware attack on hospital. One example of this is isolating or quarantining systems with malware (virus or ransomware) from the remainder of the network.

article thumbnail

Shifting from Business Continuity to Continuous Business in Cyber

Jane Frankland

A scenario where you could face any looming cyber crisis knowing that you’d emerge unscathed. As ITDMs, CISOs and cyber risk owners this is our dream scenario, and he got me thinking. This is a common misconception that has caught many ITDMs, CISOs and cyber risk owners out.

article thumbnail

Episode 227: What’s Fueling Cyber Attacks on Agriculture ?

The Security Ledger

Related Stories Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson Spotlight: When Ransomware Comes Calling. Then, September brought news of still more attacks on critical food supply chain partners. Read the whole entry. »

article thumbnail

Top Tips for Ransomware Defense

Cisco Security

Ransomware is wreaking havoc. Ransomware is making its way outside the cybersecurity space. Most people probably know what ransomware is (if not, go here ). Ransomware is now everyone’s problem – from governments to corporations and even individuals. Why is ransomware so dangerous, especially now? What can we do?

article thumbnail

LW ROUNDTABLE: CrowdStrike outage reveals long road ahead to achieve digital resiliency

The Last Watchdog

The new attack vectors that spin out of this chase entice cyber adversaries to continually iterate and improve upon tried-and-true cyber attack tools and techniques, with the goal of gaining unauthorized network access. Will we also see a wave of ransomware attacks that follow? Time will tell.