Remove Security Awareness Remove Security Intelligence Remove Technology
article thumbnail

Artificial Intelligence meets real talk at IRISSCON 2024

BH Consulting

In her enthusiastic talk, Korucu encouraged the 400-strong audience to use the technology, get trained in it, and learn about it – and to realise its shortcomings. “We ESET’s global cybersecurity advisor Jake Moore gave an entertaining and fast-paced look at how criminals can use deepfake technology to create ‘clones’.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Today, c yber security incidents lead to significant damage, alarming organizations of all types and sizes in different geographic locations. The contemporary world has witnessed the rise of the Internet and global communication, and collaboration technologies, including mobile data use and the culture of bring your own device [BYOD].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RevengeRAT and AysncRAT target aerospace and travel sectors

SC Magazine

Microsoft Security Intelligence earlier this week tweeted out that it has been tracking a campaign of remote access trojans (RATs) targeting the aerospace and travel industries with spear-phishing emails that distribute an actively developed loader, which then delivers RevengeRAT or AysncRAT. Photo by Joe Raedle/Getty Images).

Phishing 126
article thumbnail

Why access management needs to evolve beyond passwords

CyberSecurity Insiders

Organizations can incorporate such news into their security awareness training programs to phase out passwords where they can. In an article for Security Intelligence , I said, “ the password doesn ’ t matter. SSO, MFA, and other technologies are helping access management to evolve beyond the password.

Passwords 141
article thumbnail

More Than 90 Percent of Malware in Q2 Came Via Encrypted Traffic: WatchGuard

eSecurity Planet

percent of all malware detected on networks of WatchGuard Technologies customers in the second quarter came over encrypted connections, raising the security risk for the 80 percent of such organizations that lack processes for decrypting and scanning HTTPS traffic for threats. A surprising 91.5

article thumbnail

Staying a Step Ahead of the Hack

Webroot

Social engineering and business email compromise (BEC) are two related cyberattack vectors that rely on human error to bypass the technology defenses businesses deploy to deter malware. Prepare for the inevitable – Use all the technology at your disposal to ensure a BEC attack doesn’t succeed. Social Engineering. Where to learn more.

Hacking 61
article thumbnail

7 Insights About Managing Cyber Risk You Can’t Afford To Miss

Jane Frankland

Security intelligence comes with a high pay off. When Accenture analysed 9 cutting-edge technologies that are helping to reduce cybercrime, and calculated their net savings: the total potential savings minus the required investment in each type of technology or tool, they found the figure amounted to almost USD 2.3