This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Key findings: the cyberthreat landscape in 2025 1. AI, a double-edged sword AI-driven cybersecurity tools enhance threat detection but also empower attackers with sophisticated socialengineering, deepfake campaigns, and automated exploits. Joint Cyber Defense Collaborative (JCDC).
Infosec’s Choose Your Own Adventure training game “Deep Space Danger” tests employees on their knowledge of socialengineering. One of our jobs is to make sure the brand stays true to its zeitgeist, its character, and [Infosec] really had it down right from the beginning.”. What do you do?
Since 2007 the InfoSec industry has been talking about TheBigOne™—the event that would change cyberthreats from annoyances to existential concerns. They called it Cyber Pearl Harbor. This doesn’t mean it can’t still happen. Nowhere near fast enough.
Threat Intelligence (TI) representation across different levels There is a lot of information on cyberattacks on the internet, and, as a rule, the most helpful information is contained in cyberthreat reports ( Threat Intelligence Reports ). Highlighting the AI advantages in ITSM and InfoSec, you can use ChatGPT.
Nation-states and geopolitical tensions are increasingly fuelling modern cyberthreats. According to Microsoft’s Digital Dfense Report 2024 , 37% of the 600 million attacks they face daily can be attributed to nation-state threat actors.
Phishing attacks are one of the main cyberthreats involving mistakes by workers. InfosecInfosec offers more than 700 training resources to help your organization to prepare for phishing and other cyberthreats. Also, Infosec provides a free risk test.
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyberthreats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »
Enter Project 2030, a collaboration between Oxford Visiting Researcher Victoria Baines and Trend Micro Vice President of Security Research Rik Ferguson, which uses a mixture of survey data and forward-thinking understanding of technology to predict the infosec concerns a decade from now. AI could impact more than just socialengineering.
All of this makes it more difficult for organizations to protect themselves from new and emerging cyberthreats. Economic effects, including inflationary pressures, have had a broad impact across the InfoSec landscape," Smeaton said. It is a figure that has decreased from 11.1% Many are facing multifaceted challenges.
Say it again, I double dare you Anyone familiar with phishing and socialengineering will know scammers often use psychological tricks to get victims to divulge personal data. MORE Threat Prompt newsletter covers the intersection between AI and infosec. MORE Working in the transportation sector?
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover how PlexTrac addresses these issues by integrating various data sources, providing customized risk scoring, and enhancing remediation workflows.
As we look forward into 2017 cyber attacks , information security teams have to think like hackers in order to stay ahead of the challenges to come. Regulators, too, will struggle to keep up with the evolving threats. We encourage you to download the free full report on these trends and what they could mean for your organization.
She is an impressive force within the infosec world. And they also try to specifically devise campaigns that mimic trends that we see in the mobile cyberthreat landscape. A lot of red teams were simulating that within their own networks because it was a new growing threat, it was the hot new thing to worry about.
She is an impressive force within the infosec world. And they also try to specifically devise campaigns that mimic trends that we see in the mobile cyberthreat landscape. A lot of red teams were simulating that within their own networks because it was a new growing threat, it was the hot new thing to worry about.
Threat actors have developed socialengineering approaches that leverage the uncertainty and chaos of the pandemic in order to deliver their malicious software. I’ve been in infosec for over 30 years and have had the great privilege of evolving and learning as a cybersecurity executive in a space I love.
In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and Dan DeCloss, CTO and founder of PlexTrac.
“As organizations quickly adopt technologies like Okta Fastpass which uses biometrics for authentication instead of passwords, … we expect an increase in two areas: breaches caused by socialengineering (already on the rise), and breaches caused by Insiders (already over 40% of all breaches).
But in spite of it all, the cybersecurity industry and the professionals within it continue to step up and tirelessly work to protect organizations against cyberthreats. For every attack we hear about on the news, there are a hundred more that were prevented or detected and responded to by the cyber heroes behind the scenes.
In the final episode of the Shared Security Podcast for 2024, join us as we recap our predictions for the year, discuss what we got right and wrong, and highlight our top episodes on YouTube. We also extend a heartfelt thank you to our Patreon supporters and special guests.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content