article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Dunham Ken Dunham , Cyber Threat Director, Qualys Threat Research Unit Nation-state attacks and cloud compromises with long dwell times are rising as security lags behind post-Covid digital transformation. Vulnerabilities like data poisoning and prompt injection could have far-reaching impacts due to interconnected agents.

article thumbnail

Handling Pandemic-Scale Cyber Threats (preprint)

Adam Shostack

A new paper on 'Pandemic Scale Cyber Events Josiah Dykstra and I have a new pre-print at Arxiv, Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19. While the nature of these threats differs, the responses to COVID-19 illustrate valuable lessons that can guide preparation and response to cyber events.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Understanding Cyber Threats During the Holiday Season

Security Boulevard

Understanding Cyber Threats During the Holiday Season Understanding Cyber Threats During the Holiday Season The holiday season, while festive, presents heightened cybersecurity risks for businesses. Understanding these threats is crucial for effective defense.

article thumbnail

Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19

Adam Shostack

In the spirit of learning, I'm happy to share the publication of a new research paper, Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19 Threat Modeling. If you've been following my work for some time, you may not be surprised by the analysis of public health and threat modeling.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

A well-structured training program fosters true behavioral change, reducing the risk of cyber threats. explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content. Discover more on phished.io

article thumbnail

Heimdal and Interbel Partner to Secure Spanish Businesses Against Rising Cyber Threats

Heimadal Security

Together, they will deliver powerful and user-friendly cybersecurity solutions to businesses across Spain, addressing the rising challenges of sophisticated cyber threats and complex […] The post Heimdal and Interbel Partner to Secure Spanish Businesses Against Rising Cyber Threats appeared first on Heimdal Security Blog.

article thumbnail

What Is Cyber Threat Hunting? (Definition & How it Works)

Tech Republic Security

Cyber threat hunting is the proactive process of searching for and detecting potential threats or malicious activities within a network or system.