Do you know who is calling you? In many cases, employees rely on caller ID or a familiar name to allow callers to build trust and potentially exploit them. Vishing (or social engineering) is a practice where verbal communication is used to deceive a potential victim.
New technologies, including cloud computing, the Internet of Things and artificial intelligence, are constantly bringing new opportunities and challenges to attackers and defenders alike. This is not just the age of machines but of machine-scale. As such, IT security analysts need new tools to defend the network.
Nearly half (47 percent) of security professionals are already using, planning or exploring deployment of PAM solutions in the cloud, according to the Thycotic 2019 RSA Conference Survey.
In Australia, data loss/theft of confidential information incidents rose by 78.7 percent in 2018 compared to 2017 and data breaches experienced through third party providers and suppliers rose by 74.3 percent, according to the BDO and AusCERT 2018/19 Cyber Security Survey.
Forty-two percent of British consumers expect to lose money to online fraud, according to the National Cyber Security Centre's new UK Cyber Survey analysis.
Hackers are tapping into a growing consumer trend: the use of illicit devices and apps to access pirated content to spread malware and exploit unsuspecting users, a Digital Citizens Alliance report found.
First, the good news: the U.S. economy added a solid 196,000 jobs in March and unemployment is at 3.8 percent. The bad news: it is harder than ever to find and retain talented professionals.
As I travel the U.S. and the world, I am frequently asked what the proper reporting structure is for the Chief Information Security Officer (CISO). While it sounds cliché, the real answer is “it depends.”