The role of artificial intelligence in cyber resilience

The role of artificial intelligence in cyber resilience

Cyber resilience — or a lack thereof — is at the forefront of many security professionals’ minds. As the cyber threat landscape continues to evolve, many have looked to artificial intelligence (AI) as the answer. But how can leaders begin implementing AI in their organizations?  Here, we talk with Anneka Gupta, Chief Product Officer of Rubrik, about how AI can impact cyber resilience strategies.  Security magazine: Tell us about your title and background. Anneka Gupta:…

Read More

Product spotlight on analytics

Product spotlight on analytics

The development of artificial intelligence (AI) has led to a shift in analytics platforms, helping users sort through data faster than before. Security magazine showcases analytics platforms focused on monitoring and organizing data from a variety of sources. Cisco Monitor Virtual Treats to Protect Assets Cisco’s platform allows users to detect attacks in real time across the network with high-fidelity alerts enriched with context, including user, device, location, timestamp, and application. Users can validate the efficacy…

Read More

Red teaming large language models: Enterprise security in the AI era

Red teaming large language models: Enterprise security in the AI era

In the security world, we’re always trying to stay ahead of attackers. And with AI becoming increasingly prevalent across the enterprise, we’re facing new challenges — but many fundamental security principles still apply. Red teaming AI models is about understanding how LLMs work to identify new types of vulnerabilities — looking at everything from prompt injection, to toxic output generation, to misuse of AI systems. It’s not just about the model itself, but also how…

Read More

Multi-Site Mastery: Strategies for Effective Risk Assessments

Multi-Site Mastery: Strategies for Effective Risk Assessments

In this episode of The Security Podcasts we sit down with Mark Landry, National Accounts Director at AMAROK, to discuss navigating multi-site risk assessment effectively. “In order to approach your risk assessment, especially when you’ve got vast or disparate geographies – meaning you’ve got a location in Portland, Maine and location in Portland, Oregon – you have to be able to accurately convey the risk across both of those locations that have very different risk…

Read More

67% of organizations say employees lack basic security awareness

67% of organizations say employees lack basic security awareness

Fortinet’s 2024 Security Awareness and Training Global Research Report reveals 67% of organizations are concerned that employees lack fundamental security awareness. This percentage has increased since 2023, when 56% expressed concerns with employee security awareness. Perhaps as a result, 94% of organizations want to implement more stringent cybersecurity policies for high-risk employees.  Key findings from the report include: Amit Zimerman, Co-Founder and Chief Product Officer at Oasis Security, offers the following advice for organizations seeking…

Read More

Proving physical security value across an organization

Proving physical security value across an organization

In this episode of The Security Podcasts we sit down with Thomasina Martin, a Key Account Manager specializing in Energy and Utilities at Genetec, Inc., to talk about proving the value of physical security across an organization. “One of the primary challenges I think a lot of us see, I think it’s universal in the security industry when trying to secure a budget, is that physical security often competes with other critical business units or…

Read More

The deepfake dilemma: The importance of deepfake awareness training

The deepfake dilemma: The importance of deepfake awareness training

Enterprise security departments face a plethora of risks. One of the most significant threats that has emerged in recent years is that of deepfakes. These sophisticated artificial intelligence-powered manipulations of audio and video content seem rather innocuous on paper, but their creation and dissemination are exemplars of a broader large-scale organizational threat. As far as security departments are concerned, implementing a comprehensive deepfake awareness training program has become critical for forward-thinking executives managing enterprise risk…

Read More

Zero trust: The next evolution in cybersecurity

Zero trust: The next evolution in cybersecurity

As the number of connected devices continues to grow, so does the vulnerability of networks to cyber-attacks. The rise of the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) has exponentially expanded the attack surface for cybercriminals. Traditional perimeter-based security models are no longer sufficient in this environment, leading to the adoption of a more comprehensive security framework: zero trust. What is zero trust? At its core, zero trust operates on a…

Read More

Integrated security: AI is a cost-effective path to safer schools

Integrated security: AI is a cost-effective path to safer schools

Nearly 1 in 4 public school teachers say their school had a gun-related lockdown last year, according to Pew Research. For the more than 50 million children in public schools, these lockdowns exact a heavy toll on their mental health. The constant threat of violence inflicts immense harm. Schools need a solution. This is a pressing challenge for K-12 schools, which are entrusted with the education — and lives — of our children. Schools are…

Read More

Balancing Risk and Innovation – A CISO Perspective

Balancing Risk and Innovation – A CISO Perspective

In this episode of The Security Podcasts featuring Jill Knesek, CISO of Blackline, and former FBI Special Agent in the Cyber Crime Squad, we talk about balancing risk & innovation from a CISO’s perspective. “The message I like to give is we can be both innovative and secure.,” Knesek says. “They’re not mutually exclusive, and they shouldn’t be. By shifting left and embedding strong security practices and controls earlier into our development lifecycle, we can…

Read More
1 2 3 7