article thumbnail

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The Last Watchdog

Daniel Lakier , Field CSO, Myriad360 Lakier Cyber professionals represent the companies they work for and are meant to protect them. Richard Bird , CSO, Traceable Bird These penalties are hollow.The SEC fixates on time-to-report metrics and vague “materiality” without defining it.

CISO 263
article thumbnail

How deepfakes enhance social engineering and authentication threats, and what to do about it

CSO Magazine

Learn what makes these 6 social engineering techniques so effective. | Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CSO on AppSec at the Speed of Devops

Adam Shostack

“ 20 Ways to Make AppSec Move at the Speed of DevOps ” is in CSO. It’s a good collection, and I’m quoted.

CSO 100
article thumbnail

Social engineering: Definition, examples, and techniques

CSO Magazine

What is social engineering? Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data. Learn what makes these 6 social engineering techniques so effective. | Get the latest from CSO by signing up for our newsletters. ]

article thumbnail

Social engineering explained: How criminals exploit human behavior

CSO Magazine

Social engineering definition. Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems or data. To read this article in full, please click here

article thumbnail

7 new social engineering tactics threat actors are using now

CSO Magazine

It’s been a boom time for social engineering. Social engineering, of course, means attacking the user rather than the computing system itself, trying to extract information or incite an action that will lead to compromise. Learn what makes these 6 social engineering techniques so effective. |

article thumbnail

Strangest social engineering attacks of 2021

CSO Magazine

New research has highlighted the creative and occasionally unusual lengths fraudsters take to carry out social engineering attacks. As organizations continue to struggle to defend information, devices, and systems against socially engineered attacks, experts say the most successful social engineering groups are usually the most imaginative.