Unveiling the Scam: The Rising Threat of Cyber Pro Swindlers and Their Impact on Valuation

Welcome to CISO Corner, Dark Reading’s weekly digest tailored specifically for security operations readers and security leaders. Each week, we curate articles from across our news operation, including The Edge, DR Technology, DR Global, and our Commentary section. Our goal is to provide a diverse range of perspectives to help operationalize cybersecurity strategies for leaders at organizations of all sizes.

In this issue of CISO Corner:

  • Corporations With Cyber Governance Create Almost 4X More Value

  • Even Cyber Pros Get Swindled: Inside a Real-Life Vishing Attack

  • Mitigating Third-Party Risk Requires a Collaborative, Thorough Approach

  • Global: Australian Government Doubles Down on Cybersecurity in Wake of Major Attacks

  • A CISO’s Guide to Materiality & Risk Determination

  • Zero-Day Bonanza Drives More Exploits Against Enterprises

  • Getting Security Remediation on the Boardroom Agenda

Corporations With Cyber Governance Create Almost 4X More Value

By David Strom, Contributing Writer, Dark Reading

Companies that prioritize cybersecurity governance create nearly four times the shareholder value compared to those that don’t, according to a recent survey by Bitsight and the Diligent Institute.

Specialized board committees with a cyber expert member are more effective at improving security postures and financial performance.

Read more: Corporations With Cyber Governance Create Almost 4X More Value

Related: With TikTok Bans, the Time for Operational Governance Is Now

Even Cyber Pros Get Swindled: Inside a Real-Life Vishing Attack

By Elizabeth Montalbano, Contributing Writer, Dark Reading

No one is immune to vishing attacks, as demonstrated by a real-life incident that duped even a tech-savvy individual. Understanding the psychological manipulation tactics used by attackers is crucial for everyone.

Read more: Don’t Answer the Phone: Inside a Real-Life Vishing Attack

Related: North Korean Hackers Target Security Researchers — Again

Share This Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *