article thumbnail

Story of the Year: global IT outages and supply chain attacks

SecureList

It is a critical tool in various fields, including system administration, development, and cybersecurity. However, with great user experience come great cyber-risks, and as AI becomes more widespread, the likelihood of it being chosen as an attack vector increases.

Internet 105
article thumbnail

MY TAKE: A path for SMBs to achieve security maturity: start small controlling privileged accounts

The Last Watchdog

The challenge of embracing digital transformation while also quelling the accompanying cyber risks has never been greater for small- and mid-sized businesses. Somehow SMBs must keep pace competitively, while also tamping down the rising risk of suffering a catastrophic network breach. SMBs today face a daunting balancing act.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

These were all obscure open-source components that, over time, became deeply embedded in enterprise systems across the breadth of the Internet, only to have a gaping vulnerability discovered in them late in the game. Its rather mundane function is to record events in a log for a system administrator to review and act upon, later.

Firewall 223
article thumbnail

Can smart cities be secured and trusted?

Thales Cloud Protection & Licensing

Balancing the promise against the potential of cyber risks of smart cities will be critical to realizing their potential. All these measures are considered best practices for data protection. Cities should begin by engaging all the stakeholders and entities in the broader ecosystem.

article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »

CSO 59
article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Her work centered on helping aerospace manufacturers manage the convergence of cyber risk across their increasingly complex business ecosystem, including IT, OT and connected products. Director of Cyber Risk & Security Services. Director of Cyber Risk & Security Services. Petersburg, Florida.

article thumbnail

Group-IB uncovers PerSwaysion – sophisticated phishing campaign targeting executives worldwide

Security Affairs

Cloud based corporate services, such as MS Sway, introduce new challenges to traditional cyber risk management frameworks. When adopting cloud based corporate services, it is crucial to enforce 2FA authentication to mitigate risks of login credential theft. The original post is available: [link].

Phishing 135