You've successfully subscribed to The CISO's Brief
Great! Next, complete checkout for full access to The CISO's Brief
Welcome back! You've successfully signed in.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info is updated.
Billing info update failed.

Analysts team

Responding to phishing attacks requires acceleration with both automation and human readiness [45.4.4]

Responding to phishing attacks requires acceleration with both automation and human readiness [45.4.4]
Members Public

Reports results about phishing and human error.

Analysts team
phishing
What security costs to consider in a business plan [45.4.5]

What security costs to consider in a business plan [45.4.5]
Members Public

According to Theresa Lanowitz, a global influencer on trends and emerging technology, for Dark Reading, companies that add cybersecurity into their strategic plan can better resist against unexpected attacks.

Analysts team
strategy
Radar: 4 cybersecurity threats you cannot miss today [45.4.3]

Radar: 4 cybersecurity threats you cannot miss today [45.4.3]
Members Public

4 cybersecurity threats you cannot miss today

Analysts team
vulnerabilities
Two landmark data spills: a leading Scandinavian insurer & a dam of leaked passwords [45.4.2]

Two landmark data spills: a leading Scandinavian insurer & a dam of leaked passwords [45.4.2]
Members Public

On Tuesday, November 3, Swedish insurance company Folksam revealed that the data of 1 million customers had been inadvertently shared with third parties.

Analysts team
data leak
Cyber Radar: active attacks and critical vulnerabilities you cannot miss today [45.3.1]

Cyber Radar: active attacks and critical vulnerabilities you cannot miss today [45.3.1]
Members Public

Recent active attacks and vulnerabilities reported these past 3 days.

Analysts team
vulnerabilities
Authority: highlights from UK NCSC annual report [45.3.2]

Authority: highlights from UK NCSC annual report [45.3.2]
Members Public

The UK National Cyber ​​Security Center (NCSC) Annual Report looks back on key developments and work between September 1, 2019 and August 31, 2020.

Analysts team
UK
On the remote again: video conferencing attacks and security best practices [45.3.3]

On the remote again: video conferencing attacks and security best practices [45.3.3]
Members Public

According to CSO Online sponsored by CIS on November 2nd, the use of video conferencing has become a common solution for business continuity due to the health crisis.

Analysts team
remote
Cyber trends: (CS)2AI & KPMG ICS security survey: maturity pays off, but some loss of life reported and over 12% of ICS Security Incidents Attributed to Nation-State Hackers [45.3.4]

Cyber trends: (CS)2AI & KPMG ICS security survey: maturity pays off, but some loss of life reported and over 12% of ICS Security Incidents Attributed to Nation-State Hackers [45.3.4]
Members Public

On Monday November 2, the Control System Cyber ​​Security Association International (CS) 2AI and KPMG released their first annual cybersecurity report focusing on Industrial Control Systems (ICS) and Operational Technology (OT).

Analysts team
ICS