Governance & Risk Management , Next-Generation Technologies & Secure Development , Threat Intelligence

Cyberattack Trends and Essential Hack-Repelling Defenses

Chet Wisniewski of Sophos Discusses Attacker Behavior, Attempts to Remain Undetected
Chet Wisniewski, principal research scientist, Sophos

The human element is a fundamental component of some of the newest cyberattacks that Sophos has been tracking, says the firm's principal research scientist, Chet Wisniewski, who advises organizations to adapt their security and protection plans accordingly.

See Also: Demystifying Managed Detection and Response Services

In a video interview with Information Security Media Group at RSA 2020, Wisniewski also discusses:

  • The latest cyberattack findings from ongoing SophosLabs studies of attackers' behavior and attempts to go undetected;
  • How the latest types of attacks differ from traditional attacks seen in past years;
  • What technologies show the greatest promise in mitigating these threats;
  • His advice to CISOs, based on the types of attacks Sophos researchers are seeing firsthand.

Wisniewski is principal research scientist at Sophos, where he has worked for the last 16 years. His role includes research, public speaking and writing on computer security trends and threats.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.