article thumbnail

Protecting Customer Accounts: The Defining Domain of Digital CISOs

CIO Business Intelligence

Chief Information Security Officers (CISOs) and other cybersecurity leaders have long struggled to protect corporate systems against both internal and external threats. Consumers increasingly demand security from their online services. Enforcement authority: CISOs can enforce security policies and best practices internally.

article thumbnail

Your Guide to Hacker Summer Camp 2021

ForAllSecure

Black Hat Briefings USA ( Jul 31, 2021 through Thu, Aug 5, 2021). BsidesLV (July 31 and August 1, 2021). BSidesLV will be entirely virtual in 2021. For example, FuzzCON 2021 will be hybrid, in person and virtual, the Thursday night between Black Hat and DEF CON. Two Factor Authentication is a must.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Your Guide to Hacker Summer Camp 2021

ForAllSecure

Black Hat Briefings USA ( Jul 31, 2021 through Thu, Aug 5, 2021). BsidesLV (July 31 and August 1, 2021). BSidesLV will be entirely virtual in 2021. For example, FuzzCON 2021 will be hybrid, in person and virtual, the Thursday night between Black Hat and DEF CON. Two Factor Authentication is a must.

article thumbnail

Moving beyond usernames and passwords

CIO Business Intelligence

In recent months, you may have noticed an uptick in two-factor and multi-factor authentication prompts, which are being used to verify consumer and business accounts. This “unknown” amount was 40% higher than the “unknown” data breach causes for all of 2021. Implementing multi-factor authentication.

article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO Business Intelligence

Over 100,00 organizations are expected to be impacted by Network and Information Security Directive (NIS2) cybersecurity standards that European Union (EU) member states must implement by October 2024. [i] Are you enforcing security policies consistently everywhere throughout the network? 2, 223–231 (2021). Cybersecur.

article thumbnail

Bad Actor Using New Method to Avert Detection, Google Discovers

SecureWorld News

In a blog post, Neel Mehta, Information Security lead for Google, explains how a hacker has managed to break certificate code parsing to invade email inboxes and infect users with malware. According to Google, this actor began using this method in the summer of 2021. Faking legitimate code signatures: how does it work?

Google 59
article thumbnail

10 Security Quotes: Microsoft, CrowdStrike, SolarWinds, and FireEye Talk to Congress

SecureWorld News

However, SecureWorld has picked off 10 quotes that speak to the state of information security and the mindset of these leaders from corporate America. Basic cyber hygiene and security best practices were not in place with the regularity and discipline we would expect of federal customers with the agencies’ security profiles.