Wednesday, 11 Jun 2025
Subscribe
logo logo
  • Global
  • Technology
  • Business
  • AI
  • Cloud
  • Edge Computing
  • Security
  • Investment
  • More
    • Sustainability
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
  • 🔥
  • data
  • Secures
  • Funding
  • Investment
  • revolutionizing
  • Center
  • cloud
  • Series
  • Power
  • Future
  • Centers
  • million
Font ResizerAa
Silicon FlashSilicon Flash
Search
  • Global
  • Technology
  • Business
  • AI
  • Cloud
  • Edge Computing
  • Security
  • Investment
  • More
    • Sustainability
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Silicon Flash > Blog > Business > CDW Executive SummIT: Leaders Can Leverage Adversary Intelligence to Thwart Attacks
Business

CDW Executive SummIT: Leaders Can Leverage Adversary Intelligence to Thwart Attacks

Published April 20, 2025 By Juwan Chacko
Share
4 Min Read
CDW Executive SummIT: Leaders Can Leverage Adversary Intelligence to Thwart Attacks
SHARE

As cyber threats continue to evolve and become more sophisticated, adversaries are not only advancing their tactics but also collaborating with each other. Social engineering attacks, such as vishing, saw a significant increase of 442% between the first and second half of 2024, according to a report by CrowdStrike. This surge in social engineering attacks has led threat actors to shift away from traditional cyberattacks like deploying malware via malicious documents, opting instead to target help desks. CrowdStrike’s 2025 Global Threat Report reveals that a hacker can achieve lateral movement across a network in just 51 seconds.

Todd Felker, executive healthcare strategist at CrowdStrike, emphasizes that the rise in social engineering attacks highlights the exploitation of human psychology by adversaries. In a recent session at the CDW Executive SummIT in Chicago, Felker stated that organizations face more of an adversary problem than a vulnerability problem.

To combat these evolving threats, IT leaders must adopt a proactive and sophisticated defense strategy that focuses on data resilience, understanding adversary behavior, and leveraging artificial intelligence to counter social engineering tactics. Building a strong defense against cyber threats requires a deep understanding of the adversary landscape and implementing proactive measures to mitigate risks.

Shifting the security mindset from prevention to preparation is crucial in today’s threat landscape. Rex Washburn, data solutions architect at CDW, highlights the importance of cyber resiliency over the illusion of total prevention. With threat actors evolving rapidly, organizations must prioritize bouncing back from breaches and reducing downtime rather than solely focusing on preventing attacks.

Data resiliency plays a vital role in cyber resiliency, as it determines how quickly a team can recover lost data and respond to incidents. A multistep approach that includes immutable storage, continuous data validation, and an isolated recovery environment is key to achieving data resiliency. Building a modern cyber recovery environment, with features like immutable storage and regular data validation, can help organizations restore operations quickly after an attack.

See also  Revolutionizing The Kingdom: A Showcase of Digital Transformation at Smart Data & AI Summit

Understanding the adversary landscape is essential for effective defense strategies. Security teams must be aware of the different types of threat actors, such as nation-state, e-crime, and hacktivists, and tailor their defenses accordingly. By implementing solutions that enhance identity and access management, secure cloud environments, and eliminate visibility gaps, organizations can strengthen their defenses against cyber threats.

Using AI to combat social engineering attacks is becoming increasingly important. Insurity CIO and CISO Jay Wilson suggests leveraging AI to simulate the tactics of cybercriminals and identify potential vulnerabilities in the system. Red-teaming exercises can help security teams understand the tactics of adversaries in social engineering attacks and improve their overall security posture.

In conclusion, staying ahead of cyber threats requires a proactive and adaptable approach to cybersecurity. By focusing on data resilience, understanding adversary behavior, and leveraging AI technologies, organizations can enhance their defense strategies and effectively combat evolving cyber threats. Stay informed and prepared to defend against the ever-evolving threat landscape.

TAGGED: Adversary, attacks, CDW, Executive, Intelligence, Leaders, Leverage, SummIT, Thwart
Share This Article
Twitter Email Copy Link Print
Previous Article Withings ScanWatch Nova Brilliant Review: Beauty and the Heartbeat Withings ScanWatch Nova Brilliant Review: Beauty and the Heartbeat
Next Article LambdaTest Unveils AI-Powered HyperExecute MCP for Automated Testing Setups LambdaTest Unveils AI-Powered HyperExecute MCP for Automated Testing Setups
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
LinkedInFollow

Popular Posts

R1 Secures Funding from Prominent Investor Khosla Ventures

Summary: R1, a company specializing in healthcare revenue management, received an investment from Khosla Ventures.…

May 30, 2025

Empowering Women in Digital Infrastructure: Driving Innovation at Kao Data

Summary: Kao Data launched a campaign called Critical Careers to celebrate women in the digital…

June 7, 2025

Enhanced Cost Monitoring: AWS Introduces New Metrics to Budgets Finance Management Tool

AWS Dimensions Tool: A Detailed Overview When it comes to managing costs and usage of…

May 5, 2025

Setting the Standard: iMasons and GRESB Partner to Establish Data Center Sustainability Benchmark

Infrastructure Masons (iMasons) and GRESB have joined forces to develop a global sustainability benchmark tailored…

June 10, 2025

Electronic Arts Closes Cliffhanger Games Studio and Cancels Highly Anticipated ‘Black Panther’ Game

Summary: 1. Electronic Arts is shutting down Cliffhanger Games and canceling development on a Black…

May 29, 2025

You Might Also Like

YouTube’s Ecosystem Boosts US Economy with 490k Jobs and B GDP Growth in 2024
Business

YouTube’s Ecosystem Boosts US Economy with 490k Jobs and $55B GDP Growth in 2024

Juwan Chacko
LevelTen Partners with Starbucks and Workday for Texas Solar Project
Business

LevelTen Partners with Starbucks and Workday for Texas Solar Project

Juwan Chacko
Edge of Innovation: Nota AI and Wind River Revolutionize On-Device Intelligence
Edge Computing

Edge of Innovation: Nota AI and Wind River Revolutionize On-Device Intelligence

Juwan Chacko
Apple’s Siri: The Personalized Assistant Upgrade
Business

Apple’s Siri: The Personalized Assistant Upgrade

Juwan Chacko
logo logo
Facebook Twitter Youtube Rss

About US

Silicon Flash: Stay informed with the latest Tech News, Innovations, Gadgets, AI, Data Center, and Industry trends from around the world—all in one place.

Top Categories
  • Technology
  • Business
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – siliconflash.com – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?