Remove Cyber threats Remove Cybersecurity Remove Event
article thumbnail

Handling Pandemic-Scale Cyber Threats (preprint)

Adam Shostack

A new paper on 'Pandemic Scale Cyber Events Josiah Dykstra and I have a new pre-print at Arxiv, Handling Pandemic-Scale Cyber Threats: Lessons from COVID-19. While the nature of these threats differs, the responses to COVID-19 illustrate valuable lessons that can guide preparation and response to cyber events.

article thumbnail

Cybersecurity Lessons from Covid19

Adam Shostack

What can Cybersecurity learn from the covid pandemic? Josiah Dykstra and I will be speaking at the Ostrom Workshop Cyber Public Health Working Group, tomorrow, Thursday the 28th at 3 Eastern. The COVID-19 pandemic forced us all to confront a widespread, deadly, and rapidly spreading biological threat.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The Last Watchdog

Security and Exchange Commission (SEC) recently laid down the hammer charging and fining four prominent cybersecurity vendors for making misleading claims in connection with the SolarWinds hack. Joe Nicastro , Field CTO, Legit Security Nicastro Transparency in cybersecurity remains a complex balancing act.

CISO 263
article thumbnail

News alert: INE receives a dozen G2 badges highlighting its cybersecurity training leadership

The Last Watchdog

Warn “Were incredibly proud to once again be at the forefront of the training industry, recognized by G2 users in a time when cyber threats are escalating in both frequency and complexity, said Dara Warn, CEO of INE. INE is solving the hiring issues most HR people have when they are hiring cybersecurity workers, adds Batuhan A.,

article thumbnail

The March Madness Cyber Threat

Adam Levin

Phishing emails are the most common vector for attacks on corporate networks, especially in ransomware and business email compromise (BEC) campaigns; anything that involves large groups of employees to continuously send updated file attachments or links to a reply-all list or an individual, creates cybersecurity issues.

article thumbnail

From Pest Control to Cybersecurity: What CISOs Can Learn from Pestie

SecureWorld News

Keeping pests out of your home and keeping cyber threats out of your organization might seem worlds apart, but there are surprising parallels between the two. Let's explore the correlation and what cybersecurity professionals can learn from a simple act like spraying for pests.

CISO 110
article thumbnail

2025 SecureWorld Theme: Once Upon a Time in Cybersecurity

SecureWorld News

Cybersecurity in today's world is akin to the enchanted realms of fairy tales, where threats lurk in dark digital forests and heroes wield keyboards instead of swords. Welcome to SecureWorld's theme for 2025: Once Upon a Time in Cybersecurity. Welcome to SecureWorld's theme for 2025: Once Upon a Time in Cybersecurity.