Author: Chad Thunberg
-
The rise of AI-driven phishing attacks: What to know and how to be secure As businesses continue learning the benefits that artificial intelligence (AI) assisted computing tools provide, we’re continuing to see rapid interest and adoption of the technology – especially within the enterprise. Most conversations up until recently have revolved around ChatGPT, but now another new AI-powered large language model tool – DeepSeek – is creating a lot […] Read more -
Remaining robust and resilient: A CISOs top recommendations for 2024 As expected, 2023 was another challenging year for information security as organizations continued looking for ways to stay ahead of hackers. We saw an increasing amount and complexity of phishing attacks overall, driven by a major trend throughout the year making a significant impact: AI-driven phishing. Phishing remains the most prevalent attack method due to […] Read more best practices CISO recommendations -
Forging ahead: A CISOs top recommendations to stay secure in 2023 Last year, we anticipated that 2022 would be challenging for cybersecurity. This was proven true with the countless number of sophisticated high-profile phishing and ransomware attacks like DropBox, Twitter, Rockstar Games and Uber (twice). With the introduction of phishing-as-a-service and other sophisticated toolkits that target weaker forms of 2FA, security teams are now prioritizing phishing […] Read more CISO compliance phishing Public Sector zero trust -
Who can CISOs trust? Sharing information is both essential and a professional hazard President Biden’s recent executive order on cybersecurity calls on the public sector to work with private companies to create more secure environments and emphasizes the importance of sharing information as a best practice. Many of us may see “information sharing” as a synonym for risk or liability as information sharing requires a lot of caution. […] Read more CISO cybersecurity government leadership -
Yubico’s top information security recommendations for 2022 Last week, we shared a look back at 2021, which experienced an increase in the number of high profile security breaches, many involving devastating ransomware attacks. Attackers preyed on traditionally softer targets like hospitals, schools, and local governments, in addition to the continued focus on the supply chain. Although the root cause for many of […] Read more authentication government MFA phishing privacy zero trust -
People matter: How to solve security skills shortage challenges The skills shortage in the security industry stretches as far back as we can remember having an industry. Everyone knows it’s a challenge with no easy short-term solutions. The root of the security skills shortage gap remains murky, and some observers say the pandemic and reallocations of security resources could be widening that gap. The […] Read more cybersecurity security -
Responding to the rising wave of social engineering attacks against remote workers By now, it’s clear the pandemic has provided perfect conditions for many types of social engineering attacks. We’ve seen plenty of reports and warnings from the FBI, CISA, Interpol, and other reputable organizations about the growth in coronavirus-related attacks, from spear-phishing to vishing, ransomware, and more, as the world adapts to remote working and its associated risks. In many ways, social […] Read more data breach enterprise security phishing remote workers -
A CISO’s best advice for protecting a rapidly evolving remote workforce As Yubico’s Chief Information Security Officer (CISO), I am responsible for the company’s security, risk management, and compliance programs. I have more than 20 years of experience solving complex security scenarios, but I have yet to encounter the unique landscape that we are collectively facing as IT leaders. Many of my peers and businesses across […] Read more account takeovers multifactor authentication remote workers