Remove CISO Remove Social Engineering Remove VPN
article thumbnail

Top 5 Cyber Predictions for 2024: A CISO Perspective

Security Boulevard

This past year set a profound stage, from the advent of stringent cyber regulations to the convergence of generative AI, social engineering, and ransomware. Last year, we witnessed the fast-evolving nature of social engineering attacks, and this evolution poses greater challenges for detection and defense.

CISO 104
article thumbnail

GUEST ESSAY: The shock waves of mental illness have begun exacerbating cybersecurity exposures

The Last Watchdog

Another example that has become more prominent in a remote work-from-home world is an individual forgetting to use the company VPN or logging into unsecured WIFI. Socially engineered incidents have also been on the rise. A key takeaway is that the increase in cybersecurity threats is now not just a CISO’s responsibility.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The challenges of being a CISO during the COVID-19 pandemic

IT Security Guru

The pre-COVID-19 CISO. The global COVID-19 pandemic has been a tumultuous time for Chief information security officers (CISOs) who on any given day have a long and complicated list of responsibilities. It first is isolated and vetted in a “vetting zone.” Budget and resource constraints.

CISO 69
article thumbnail

Addressing Remote Desktop Attacks and Security

eSecurity Planet

In November 2021, an unauthorized third party called a Robinhood customer support employee and, through social engineering , gained access to the company’s customer support systems. On a Sunday in February 2018, the Colorado CISO’s office set up a temporary server to test a new cloud-based business process.

VPN 120
article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

Threat actors have dramatically escalated their attacks – targeting security controls like multi-factor authentication (MFA), conducting wily social engineering attacks and extorting businesses large and small with ransomware. Since then, teams have had years to adjust to this new reality, yet the attackers have as well.

article thumbnail

Preventing Critical Email Attacks: Brian Krebs and Mike Britton Discuss

SecureWorld News

That was the case for a broadcast SecureWorld recently hosted with Mike Britton, CISO of Abnormal Security , and legendary investigative journalist Brian Krebs. Key takeaway #3: Social engineering is the most powerful attack vector against InfoSec protocols. And you know, that can cause a potential loss for that organization.".

InfoSec 97
article thumbnail

The Biggest Lessons about Vulnerabilities at RSAC 2021

eSecurity Planet

While CIOs, CISOs, and purchasing managers often make a faith-based decision on software, greater accountability in software development starting below the OS can lead to more data and risk-driven decisions. Whether it’s a VPN , firewall , or remote access server, unauthorized entry via network gateways is a problem.

Software 119