Remove CISO Remove Cyber Attacks Remove Technology
article thumbnail

GUEST ESSAY: The role advanced ‘VM’ is ideally suited to play in combating modern cyber attacks

The Last Watchdog

Modern cyber attacks are ingenious — and traditional vulnerability management, or VM, simply is no longer very effective. The consequences of a cyber attack can be devastating; from a rapid drop in brand reputation to loss of business and sensitive data. Cyber attacks can also invite lawsuits and can even be fatal.

article thumbnail

GUEST ESSAY: 6 steps any healthcare organization can take to help mitigate inevitable cyber attacks

The Last Watchdog

Knowing what Information Technology (IT) hardware exists is a good place to start (servers, laptops, desktops, tablets, etc.). As technology and threats evolve, so must the security organization. which supplies ultra-sensitive, portable marijuana breathalyzer technology. •Create an asset inventory.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LinkedIn being targeted by fake CISO Profile Positions in Large Companies

CyberSecurity Insiders

LinkedIn has publicly announced that for some reasons, its servers are being targeted by fake CISO Profiles that disclose vacant positions at large multinational companies. A LinkedIn source based on the condition of anonymity is viewing this activity as a part of a larger cyber attack campaign.

CISO 133
article thumbnail

Introducing our new CISO Advisor, Pam Lindemeon

Cisco Security

I’m delighted to announce the latest member of our growing CISO Advisor team, Pam Lindemeon. At Anthem Pam was considered a bold and strategic thinker who envisioned and delivered a world class Enterprise Information Security strategy, including leading the Steering Committee with cross functional business and technology membership.

CISO 144
article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

When data breaches escalate, cyber-attacks grow more sophisticated, nation states ramp up their digital warfare, and regulations tighten the noose, staying ahead isnt just an optionits your only line of defence. Nation-states and geopolitical tensions are increasingly fuelling modern cyber threats.

article thumbnail

Shifting from Business Continuity to Continuous Business in Cyber

Jane Frankland

A scenario where you could face any looming cyber crisis knowing that you’d emerge unscathed. As ITDMs, CISOs and cyber risk owners this is our dream scenario, and he got me thinking. It means ensuring that you’re future ready and better equipped than your competitors to meet the demands of new technologies and threats.

article thumbnail

Port of Seattle, Including Sea-Tac Airport, Disrupted by Cyber Attack

SecureWorld News

"Attacks like what the Seattle-Tacoma International Airport experienced represent a serious shift in what cybersecurity professionals should be focusing on. In the past, the primary emphasis in the cybersecurity community has been on data protection—especially personal information," said William Lidster , CISO of AAA Washington.