article thumbnail

Fortinet CISO Details ‘Phish-Free’ Phishing Scheme Using PayPal

Security Boulevard

A bad actor is using a Microsoft 365 test domain and a self-created distribution list to bypass traditional email protections and entice victims to hand over their PayPal account information in what Fortinet's CISO is calling a "phish-free" phishing campaign.

CISO 113
article thumbnail

Black Hat insights: JupiterOne’s whodunnit puts CISOs on the trail of solving a devastating breach

The Last Watchdog

Related: A call to regulate facial recognition That said, a few dozen CISOs attending Black Hat USA 2023 will get to experience, hands-on, what it must have been like to be in the crucible of milestone hacks like Capital One, SolarWinds and Colonial Pipeline. San Diego or New York City , feel free to skip ahead.

CISO 245
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 5 Key Takeaways 2021 CISO Survival Guide

Cisco Security

We spend a great deal of time working to understand the evolving nature of current and future security threats, while fostering mutually beneficial relationships with the people and organizations that seek to counter those threats. We conducted a survey of over 100 security professionals for their opinions on a wide range of topics.

CISO 145
article thumbnail

3 Cybersecurity Goals for CISOs

Security Boulevard

The post 3 Cybersecurity Goals for CISOs appeared first on Security Boulevard. Honestly, how many of us had, “I will do my best to avoid a global pandemic,” as a New Year’s resolution for 2020? That said, the chances that 2021 will be even more unpredictable are slim. So, we might as well indulge in setting.

CISO 145
article thumbnail

Should the CISO Report to the CIO?

Cisco Security

The Chief Information Security Officer (CISO) is the organization’s senior executive in charge of the cybersecurity and the information technology risk management posture of the enterprise. federal government in particular, the CISO reports to the Chief Information Officer (CIO). In many organizations, and in the U.S.

CISO 144
article thumbnail

There is no substitute for a CISO…or is there?

Cisco Security

These are all very real situations for today’s CISO. With the shortage of resources, it has never been harder to resource all the functions of an effective security team. One CISO cannot be everywhere all the time and engage meaningfully with all these groups. A Deputy can be invaluable for addressing your own weaknesses.

CISO 145
article thumbnail

The Network Security Business System of Low-altitude Economy

Security Boulevard

Previous post on security risks of low-altitude Economy: [link] How to construct a comprehensive network security business system in the field of low-altitude economy? The purpose of network data security is to prevent leakage, resist attack and protect system and privacy.