97% of organizations report difficulties with identity verification

97% of organizations report difficulties with identity verification

Ping Identity released a report on the state of identity fraud, surveying 700 IT decision-makers worldwide between February and March of 2024, which found that 97% of organizations are experiences challenges with identity verification. Many respondents (49%) report that the fraud prevention strategies in place in their organization are somewhat or entirely ineffective, suggesting that many organizations do not have proper protections against identity fraud. Among those surveyed, only 45% use two-factor or multi-factor identification verification,…

Read More

Automating a more resilient supply chain

Automating a more resilient supply chain

As technology evolves, manufactures can leverage new tools to reduce costs while improving accuracy, visibility and customer satisfaction. Emerging technologies such as Internet of Things (IoT) and artificial intelligence (AI) can increase efficiencies for manufactures. At the same time, this increase in technology may create openings for cyberattacks on the supply chain as well as critical infrastructure.  Here, we talk with Scott Reynolds, the President-Elect at International Society of Automation.  Security magazine: Tell us about your title…

Read More

Security isn’t convenient, and that’s a big problem in the age of AI

Security isn’t convenient, and that’s a big problem in the age of AI

Security isn’t convenient. For most of us, traditional cybersecurity protocols like CAPTCHAs, two-factor authentication and passwords can feel like barriers that stand in the way of productivity. Whether that’s making a purchase, accessing workplace data or trying to log into an app that you were inadvertently kicked out of — we want what we want, we want it now and we often want it at the expense of our own data security and privacy. In…

Read More

Are AI data poisoning attacks the new software supply chain attack?

Are AI data poisoning attacks the new software supply chain attack?

With rapid AI adoption happening across varying business units, maintaining the integrity of those systems — and preventing AI data poisoning attacks — is a growing concern. But how do these attacks occur, and why should businesses be worried?  Much of it has to do with third-party access to business systems and data. In Venafi’s 2023 State of Cloud Native Security Report, 75% of security professionals stated their software supply chain presents their biggest security…

Read More

AI security for CISOs: A dynamic and practical framework

AI security for CISOs: A dynamic and practical framework

Few technologies have infiltrated the business world as rapidly — and with so much enthusiasm from leaders — as artificial intelligence (AI) and machine learning (ML). By some reports, two-thirds of enterprises are already using generative AI, citing benefits like productivity gains and improved customer relationship management.  But with the excitement for AI and ML comes security and privacy concerns. Leaders consistently point to security as a top concern when adopting generative AI. Even CISOs,…

Read More

ISC West product preview

ISC West product preview

To best protect organizations’ physical and cyber assets, security leaders comb through various security products to meet their needs. This month, Security magazine highlights some of the products that will be featured at ISC West. AXIS COMMUNICATIONS Record video in low light With 4K and an ultra-high light sensitive 4/3” sensor, axis q1808-le delivers low-light performance and less noise even at great distances. It is available with a choice of lenses; a wide lens for…

Read More

How to fix the growing cybersecurity skills gap

How to fix the growing cybersecurity skills gap

Cyber and ransomware threats are growing at a rapid rate, critically endangering organizations’ sensitive data. In 2023, the global average cost of a data breach reached USD 4.45 million, a 15% increase over 3 years — predicted to reach $9.5 trillion USD in 2024. What’s more, organizations are now facing highly intelligent, AI-powered threats – including advanced phishing attacks, deep fakes, and fraudulent phone calls — that are increasingly challenging to identify and respond to….

Read More

Navigating the identity security landscape

Navigating the identity security landscape

In this episode of The Security Podcasts featuring Jeff Reich, Executive Director of the Identity Defined Security Alliance, we discuss the challenges security professionals are facing in the evolving landscape of identity security threats. “Something we see often is when we were asking the question, ‘how long do account stay active or in your system after someone leaves your organization?’ And certainly there are a number of organizations that say within two days it’s been…

Read More

Understanding the importance of vendor employee training

Understanding the importance of vendor employee training

The rise of generative AI and other sophisticated cyber threats can leave unprepared organizations vulnerable. Preparing employees for potential cyberattacks via effective training is one way to secure private and company information.  Here, we talk with John Blackmon, Chief Technology Officer and Chief AI Officer of ELB Learning.  Security: Tell us about your title and background. Blackmon: I serve as ELB Learning’s Chief Technology Officer and last year, I took on the additional role of…

Read More

Diversifying the security workforce

Diversifying the security workforce

In this episode of The Security Podcasts featuring Larry Whiteside, Jr., CISO at RegScale and Co-Founder and President at Cyversity, we discusses the importance of diversity within the security workforce, the challenges security leaders face during the hiring process and how critical mentorship is when it comes developing talent. “The reality is threat actors and our adversaries that are out there, and they don’t care about what someone looks like. They don’t care about what…

Read More
1 2 3 5