Remove CSO Remove Cyber Risk Remove Phishing
article thumbnail

Cybersecurity’s Comfort Zone Problem: Are you Guilty of it?

Jane Frankland

The hard truth is that technology alone cant fix the root causes of cyber risk. Whether its a mis-click on a phishing email, poor password management, acting on a deepfake, or a misconfiguration, human error accounts for most breaches. These are challenges that require more than just a flashy new tool to overcome.

Risk 100
article thumbnail

Skilling up the security team for the AI-dominated era

CSO Magazine

As artificial intelligence and machine learning models become more firmly woven into the enterprise IT fabric and the cyberattack infrastructure, security teams will need to level up their skills to meet a whole new generation of AI-based cyber risks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: Tenable Report Warns About Toxic Cloud Exposures, as PwC Study Urges C-Suite Collaboration for Stronger Cyber Resilience

Security Boulevard

Only 15% of surveyed organizations are able to comprehensively measure the financial impact of cyber risks. All of this points to the need for better C-suite collaboration and strategic investment to strengthen cyber resilience,” reads the report summary.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Social engineering attacks , including phishing, spam, and viruses introduced via clickable links within e-mail affected 80% of the banking institutions in 2016. VoIP phishing and impersonation also victimized millions of corporate employees across the world , contributing to an even greater cyber threat.

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 2)

The Last Watchdog

We asked two questions: •What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at my organization? Cloud-native SIEM empowers organizations to effectively protect their valuable assets and data from an ever-growing array of cyber threats. Part three to follow on Friday.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

In this blog, I’m exploring these changes, grouped under key categories that I’ve used in previous years, to help business leaders and cyber risk owners better prepare for the evolving landscape. An insider unknowingly clicking a phishing link or downloading a malicious file could leave the door wide open for attackers.