Remove CSO Remove Healthcare Remove Social Engineering
article thumbnail

NEW TECH: Data Theorem helps inventory sprawling APIs — as the first step to securing them

The Last Watchdog

If I go to a CSO and say, ‘We can secure your APIs,’ he’ll say, ‘Great, can you also find them for me?’ ” observed Dwivedi, Data Theorem’s founder. This is essential in industries that are heavily regulated and store very sensitive data, like healthcare and finance. And that’s just one phone. Velocity without security.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

His expertise is in social engineering, technology, security algorithms and business. Army officer, Sachs served as deputy director of SRI International’s Computer Science laboratory, vice president of national security policy at Verizon Communications, and SVP and CSO of the North American Electric Reliability Corporation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources

Security Boulevard

Unraveling the True Security Risks ” (SecurityWeek) “ How deepfakes threaten biometric security controls ” (TechTarget) “ Deepfakes break through as business threat ” (CSO) 3 - Fake update variants dominate list of top malware in Q3 Hackers are doubling down on fake software-update attacks.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Social engineering attacks , including phishing, spam, and viruses introduced via clickable links within e-mail affected 80% of the banking institutions in 2016. Encourage your key cyber professionals to develop first-rate security awareness training materials for employees and executive staff.

article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

She has 15 years of experience, and yet she's not a CSO at any large organization, rather than curse her fate, she decided to help others, so that maybe they can become the CSOs, and just maybe start to address the diversity problem in InfoSec. Next week we're doing social engineering. Consider Tennisha Martin.

Hacking 40
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

She has 15 years of experience, and yet she's not a CSO at any large organization, rather than curse her fate, she decided to help others, so that maybe they can become the CSOs, and just maybe start to address the diversity problem in InfoSec. Next week we're doing social engineering. Consider Tennisha Martin.

Hacking 40
article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

Sectors like energy, healthcare, transportation, utilities, and financial systems are increasingly at risk because they are integral to national security and daily life. These groups are also shifting toward more human-centric exploits , like social engineering and insider assistance. But it doesnt stop there.