Remove Cyber threats Remove InfoSec Remove Social Engineering
article thumbnail

State of Cybersecurity in Canada 2025: Key Insights for InfoSec Leaders

SecureWorld News

Key findings: the cyber threat landscape in 2025 1. AI, a double-edged sword AI-driven cybersecurity tools enhance threat detection but also empower attackers with sophisticated social engineering, deepfake campaigns, and automated exploits. Joint Cyber Defense Collaborative (JCDC).

InfoSec 74
article thumbnail

Choose Your Own Adventure game animates security awareness training

SC Magazine

Infosec’s Choose Your Own Adventure training game “Deep Space Danger” tests employees on their knowledge of social engineering. One of our jobs is to make sure the brand stays true to its zeitgeist, its character, and [Infosec] really had it down right from the beginning.”. What do you do?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Pearl Harbor Is Happening Right Now — It’s Ransomware

Daniel Miessler

Since 2007 the InfoSec industry has been talking about TheBigOne™—the event that would change cyber threats from annoyances to existential concerns. They called it Cyber Pearl Harbor. This doesn’t mean it can’t still happen. Nowhere near fast enough.

article thumbnail

Embracing Automation in Cyber Threat Intelligence: The Key to Timely Protection

SecureWorld News

Threat Intelligence (TI) representation across different levels There is a lot of information on cyberattacks on the internet, and, as a rule, the most helpful information is contained in cyber threat reports ( Threat Intelligence Reports ). Highlighting the AI advantages in ITSM and InfoSec, you can use ChatGPT.

article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

Nation-states and geopolitical tensions are increasingly fuelling modern cyber threats. According to Microsoft’s Digital Dfense Report 2024 , 37% of the 600 million attacks they face daily can be attributed to nation-state threat actors.

article thumbnail

Phishing Awareness Training: Best Providers 2020

Spinone

Phishing attacks are one of the main cyber threats involving mistakes by workers. Infosec Infosec offers more than 700 training resources to help your organization to prepare for phishing and other cyber threats. Also, Infosec provides a free risk test.

article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »

CSO 59