Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
The Last Watchdog
Page 8
The Last Watchdog
The Last Watchdog
GUEST ESSAY: A roadmap to achieve a better balance of network security and performance
GUEST ESSAY: A roadmap to achieve a better balance of network security and performance Here’s a...
The Last Watchdog
GUEST ESSAY: These advanced phishing tactics should put all businesses on high alert
GUEST ESSAY: These advanced phishing tactics should put all businesses on high alert Phishing attacks are...
The Last Watchdog
GUEST ESSAY: Restore Us Institute (RUI) aims to protect Americans from online harms and crimes
GUEST ESSAY: Restore Us Institute (RUI) aims to protect Americans from online harms and crimes How...
The Last Watchdog
GUEST ESSAY: Privacy risks introduced by the ‘metaverse’ — and how to combat them
GUEST ESSAY: Privacy risks introduced by the ‘metaverse’ — and how to combat them As digital...
The Last Watchdog
GUEST ESSAY: A breakout of how Google, Facebook, Instagram enable third-party snooping
GUEST ESSAY: A breakout of how Google, Facebook, Instagram enable third-party snooping More and more consumers...
The Last Watchdog
MY TAKE: Why the Matter smart home standard portends the coming of the Internet of Everything
MY TAKE: Why the Matter smart home standard portends the coming of the Internet of Everything...
The Last Watchdog
GUEST ESSAY: Sure steps to achieve a robust employee cybersecurity awareness training regimen
GUEST ESSAY: Sure steps to achieve a robust employee cybersecurity awareness training regimen Employee security awareness...
The Last Watchdog
FIRESIDE CHAT: Timely employee training, targeted testing needed to quell non-stop phishing
FIRESIDE CHAT: Timely employee training, targeted testing needed to quell non-stop phishing Humans are rather easily...
The Last Watchdog
GUEST ESSAY: The case for an identity-first approach ‘Zero Trust’ privileged access management
GUEST ESSAY: The case for an identity-first approach ‘Zero Trust’ privileged access management Today’s enterprises are...
The Last Watchdog
FIRESIDE CHAT: Why ‘digital resiliency’ has arisen as the Holy Grail of IT infrastructure
FIRESIDE CHAT: Why ‘digital resiliency’ has arisen as the Holy Grail of IT infrastructure Digital resiliency...
The Last Watchdog
GUEST ESSAY: The rise of ‘PhaaS’ — and a roadmap to mitigate ‘Phishing-as-a-Service’
GUEST ESSAY: The rise of ‘PhaaS’ — and a roadmap to mitigate ‘Phishing-as-a-Service’ Cybersecurity is a...
The Last Watchdog
SHARED INTEL: Poll highlights the urgency to balance digital resiliency, cybersecurity
SHARED INTEL: Poll highlights the urgency to balance digital resiliency, cybersecurity The pace and extent of...
The Last Watchdog
NEW TECH SNAPSHOT: The role of ‘MSSPs’ in helping businesses manage cybersecurity
NEW TECH SNAPSHOT: The role of ‘MSSPs’ in helping businesses manage cybersecurity Network security has been...
The Last Watchdog
SHARED INTEL: The cybersecurity sea change coming with the implementation of ‘CMMC’
SHARED INTEL: The cybersecurity sea change coming with the implementation of ‘CMMC’ Finally, Uncle Sam is...
The Last Watchdog
GUEST ESSAY: The drivers behind persistent ransomware — and defense tactics to deploy
GUEST ESSAY: The drivers behind persistent ransomware — and defense tactics to deploy The internet has...
The Last Watchdog
GUEST ESSAY: Stolen logons, brute force hacking get used the most to breach web, email servers
GUEST ESSAY: Stolen logons, brute force hacking get used the most to breach web, email servers...
The Last Watchdog
Black Hat Fireside Chat: Taking the fight to the adversaries — with continuous, proactive ‘pen tests’
Black Hat Fireside Chat: Taking the fight to the adversaries — with continuous, proactive ‘pen tests’...
The Last Watchdog
Black Hat Fireside Chat: Doing deep-dive API security — as software gets developed and deployed
Black Hat Fireside Chat: Doing deep-dive API security — as software gets developed and deployed APIs...
The Last Watchdog
Black Hat Fireside Chat: Deploying ‘AI’ as a weapon to win the ‘attack surface management’ war
Black Hat Fireside Chat: Deploying ‘AI’ as a weapon to win the ‘attack surface management’ war...
The Last Watchdog
GUEST ESSAY: A breakdown of the cyber risks intrinsic to ubiquitous social media apps
GUEST ESSAY: A breakdown of the cyber risks intrinsic to ubiquitous social media apps More than...
The Last Watchdog
Black Hat insights: Getting bombarded by multiple ransomware attacks has become commonplace
Black Hat insights: Getting bombarded by multiple ransomware attacks has become commonplace The top ransomware gangs...
The Last Watchdog
GUEST ESSAY: The key to a successful cloud migration – embrace a security-first strategy
GUEST ESSAY: The key to a successful cloud migration – embrace a security-first strategy Migrating to...
The Last Watchdog
Black Hat Fireside Chat: MSSPs are well-positioned to help companies achieve cyber resiliency
Black Hat Fireside Chat: MSSPs are well-positioned to help companies achieve cyber resiliency Network security is...
The Last Watchdog
Black Hat Fireside Chat: Replacing VPNs with ZTNA that leverages WWII battlefield tactics
Black Hat Fireside Chat: Replacing VPNs with ZTNA that leverages WWII battlefield tactics The sunsetting of...
The Last Watchdog
GUEST ESSAY: The key to a successful cloud migration – embrace a security-first strategy
GUEST ESSAY: The key to a successful cloud migration – embrace a security-first strategy Migrating to...
The Last Watchdog
GUEST ESSAY: How to detect if a remote job applicant is legit — or a ‘Deepfake’ candidate
GUEST ESSAY: How to detect if a remote job applicant is legit — or a ‘Deepfake’...
The Last Watchdog
GUEST ESSAY: How to secure ‘Digital Twins’ to optimize asset use, while reducing exposures
GUEST ESSAY: How to secure ‘Digital Twins’ to optimize asset use, while reducing exposures Our technological...
The Last Watchdog
GUEST ESSAY: How amplified DDoS attacks on Ukraine leverage Apple’s Remote Desktop protocol
GUEST ESSAY: How amplified DDoS attacks on Ukraine leverage Apple’s Remote Desktop protocol Cyber-attacks continue to...
The Last Watchdog
FIRESIDE CHAT: ‘Attack surface management’ has become the centerpiece of cybersecurity
FIRESIDE CHAT: ‘Attack surface management’ has become the centerpiece of cybersecurity Post Covid 19, attack surface...
The Last Watchdog
GUEST ESSAY: Advanced tools, tactics required to defend latest attack variant — ‘DeepSea phishing’
GUEST ESSAY: Advanced tools, tactics required to defend latest attack variant — ‘DeepSea phishing’ Phishing itself...
Posts navigation
1
…
7
8
9
Latest News
The Register Security
REvil ransomware scum sentenced to almost 14 years inside, ordered to pay $16 million – Source: go.theregister.com
02/05/2024
The Register Security
A million Australian pubgoers wake up to find personal info listed on leak site – Source: go.theregister.com
02/05/2024
The Register Security
Dropbox dropped the ball on security, haemorrhaging customer and third-party info – Source: go.theregister.com
02/05/2024
The Register Security
Block accused of mass compliance failures that saw digi-dollars reach terrorists – Source: go.theregister.com
02/05/2024
The Register Security
Microsoft cannot keep its own security in order, so what hope for its add-ons customers? – Source: go.theregister.com
02/05/2024
The Register Security
Management company settles for $18.4M after nuclear weapons plant staff fudged their timesheets – Source: go.theregister.com
02/05/2024