article thumbnail

Cybersecurity Snapshot: Salary Trends, Ransomware Summit, Next-gen MFA

Tenable

For more information: “ Executive Recruiters Scrambling to Find Cybersecurity Leaders ” (Hunt Scanlon Media). “ How can hiring managers improve their recruitment of cybersecurity pros? Securing your organization by recruiting, hiring, and retaining cybersecurity talent ” (McKinsey). “ 3 – CISA bangs on the next-gen MFA drum.

Trends 103
article thumbnail

Cybersecurity Snapshot: CISA Says Midnight Blizzard Swiped U.S. Gov’t Emails During Microsoft Hack, Tells Fed Agencies To Take Immediate Action

Tenable

The attack against Microsoft began in November 2023, when Midnight Blizzard – also known as Nobelium, Cozy Bear and APT29 – compromised a legacy, non-production test account that lacked multi-factor authentication protection. Implement strong data governance by, for example, validating what data and systems can be used with your AI tools.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

A hiring manager’s guide to hiring the right developer

Hacker Earth Developers Blog

While you may be an expert, it is always wise to bring more technical expertise and resources into recruiting. Virtual job fairs: This is not exactly a cost-free way of sourcing talent but it is comparatively cheaper (average of $8,000 for one virtual event) than the conventional way of recruitment. are our top picks.

article thumbnail

Social Media for CEOs

N2Growth Blog

How can you ask members of your team to be innovative, engaged, proactive, creative, authentic, transparent, and communicative if you are none of those things? Magazine : “More effective than any marketing budget for getting our name out there.&#. This may hit a little close to home for some, but the message needs to be heard.

Media 138
article thumbnail

Cybersecurity Snapshot: For Strong Cloud Security, Focus on Configuration

Tenable

The LockBit operation uses a ransomware-as-a-service (RaaS) model, with affiliates recruited to carry out attacks using its tools and infrastructure. Cybersecurity and Infrastructure Security Agency (CISA) and the full guide , as well as coverage from The Record , Infosecurity Magazine , The Register and Computer Weekly.

Cloud 52
article thumbnail

Cybersecurity Snapshot: 6 Things That Matter Right Now

Tenable

The usage of passwords has dropped, but they remain the number one authentication mechanism, dwarfing arguably more secure and convenient methods. So says a report from the FIDO Alliance, a tech industry consortium that aims to promote the usage of alternative login technologies and the creation of authentication standards.

article thumbnail

Have You Earned the Right to Lead? Ten Deeply Destructive Mistakes That Suggest the Answer Is No (and How to Stop Making Them)

Strategy Driven

The author’s Harvard Business Review articles are among the most highly read in the magazine’s history. Below, excerpted from Unusually Excellent, are ten of the most common, deeply destructive mistakes organizational leaders make: MISTAKE #1: “Role playing” authenticity rather than living it.