article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »

CSO 59
article thumbnail

NIST Unveils Groundbreaking Post-Quantum Cryptography Standards

SecureWorld News

"The challenges for IT and security teams are significant, from ensuring compatibility with existing systems to managing the transition of cryptographic keys," Everspaugh said. NIST encourages system administrators to begin integrating these new standards immediately, recognizing that full implementation will take time.

CSO 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is Traffic Light Protocol? Here's how it supports CISOs in sharing threat data

CSO Magazine

Traffic Light Protocol (TLP) was created to facilitate greater sharing of potentially sensitive threat information within an organization or business and to enable more effective collaboration among security defenders, system administrators, security managers, and researchers.

CISO 89
article thumbnail

Critical flaw in ManageEngine Desktop Central MSP tool exploited in the wild

CSO Magazine

The division maintains a portfolio of over 90 products and free tools that are used by millions of system administrators in more than 180,000 companies around the world. ManageEngine is a division of business software developer Zoho that's focused on IT management software.

article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

My advice for anybody that asks me which certifications they should get is this: find a certification in a subject that you wish to learn about,” Palo Alto Networks CSO Rick Howard said. “If It’s designed for incident handlers, incident handling team leads, system administrators, security practitioners, and security architects.

article thumbnail

Here is why you should have Cobalt Strike detection in place

CSO Magazine

The abuse by attackers of system administration, forensic, or security tools that are either already installed on systems or can be easily deployed without raising suspicion has become extremely common. Living off the land is a common tactic.

article thumbnail

NEW TECH: Votiro takes ‘white-listing’ approach to defusing weaponized documents

The Last Watchdog

The work duties call for them to open and deal with business documents, “and at the same time the CSO actually may be directing them to think twice before they open any document,” Grafi says. “So, Employees today receive mixed messages. So, the challenge becomes productivity versus security.”.

Malware 100