Multi-Site Mastery: Strategies for Effective Risk Assessments

Multi-Site Mastery: Strategies for Effective Risk Assessments

In this episode of The Security Podcasts we sit down with Mark Landry, National Accounts Director at AMAROK, to discuss navigating multi-site risk assessment effectively. “In order to approach your risk assessment, especially when you’ve got vast or disparate geographies – meaning you’ve got a location in Portland, Maine and location in Portland, Oregon – you have to be able to accurately convey the risk across both of those locations that have very different risk…

Read More

67% of organizations say employees lack basic security awareness

67% of organizations say employees lack basic security awareness

Fortinet’s 2024 Security Awareness and Training Global Research Report reveals 67% of organizations are concerned that employees lack fundamental security awareness. This percentage has increased since 2023, when 56% expressed concerns with employee security awareness. Perhaps as a result, 94% of organizations want to implement more stringent cybersecurity policies for high-risk employees.  Key findings from the report include: Amit Zimerman, Co-Founder and Chief Product Officer at Oasis Security, offers the following advice for organizations seeking…

Read More

Proving physical security value across an organization

Proving physical security value across an organization

In this episode of The Security Podcasts we sit down with Thomasina Martin, a Key Account Manager specializing in Energy and Utilities at Genetec, Inc., to talk about proving the value of physical security across an organization. “One of the primary challenges I think a lot of us see, I think it’s universal in the security industry when trying to secure a budget, is that physical security often competes with other critical business units or…

Read More

The deepfake dilemma: The importance of deepfake awareness training

The deepfake dilemma: The importance of deepfake awareness training

Enterprise security departments face a plethora of risks. One of the most significant threats that has emerged in recent years is that of deepfakes. These sophisticated artificial intelligence-powered manipulations of audio and video content seem rather innocuous on paper, but their creation and dissemination are exemplars of a broader large-scale organizational threat. As far as security departments are concerned, implementing a comprehensive deepfake awareness training program has become critical for forward-thinking executives managing enterprise risk…

Read More

Zero trust: The next evolution in cybersecurity

Zero trust: The next evolution in cybersecurity

As the number of connected devices continues to grow, so does the vulnerability of networks to cyber-attacks. The rise of the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) has exponentially expanded the attack surface for cybercriminals. Traditional perimeter-based security models are no longer sufficient in this environment, leading to the adoption of a more comprehensive security framework: zero trust. What is zero trust? At its core, zero trust operates on a…

Read More

Integrated security: AI is a cost-effective path to safer schools

Integrated security: AI is a cost-effective path to safer schools

Nearly 1 in 4 public school teachers say their school had a gun-related lockdown last year, according to Pew Research. For the more than 50 million children in public schools, these lockdowns exact a heavy toll on their mental health. The constant threat of violence inflicts immense harm. Schools need a solution. This is a pressing challenge for K-12 schools, which are entrusted with the education — and lives — of our children. Schools are…

Read More

Balancing Risk and Innovation – A CISO Perspective

Balancing Risk and Innovation – A CISO Perspective

In this episode of The Security Podcasts featuring Jill Knesek, CISO of Blackline, and former FBI Special Agent in the Cyber Crime Squad, we talk about balancing risk & innovation from a CISO’s perspective. “The message I like to give is we can be both innovative and secure.,” Knesek says. “They’re not mutually exclusive, and they shouldn’t be. By shifting left and embedding strong security practices and controls earlier into our development lifecycle, we can…

Read More

Transform what video intelligence can become with AI

Transform what video intelligence can become with AI

AI-powered video analytics are turning security cameras into robust sensors that can improve how you monitor security at your sites. With artificial intelligence (AI), cameras can detect threats independently and accurately, without the need for a human to constantly watch video feeds. No surprise there — this has been a key part of several megatrends from the Security Industry Association (SIA) for the past few years. But thanks to technology advancements and network convergence, they…

Read More

Generative AI poses several security risks

Generative AI poses several security risks

Generative artificial intelligence (GenAI) was analyzed in a recent report by Transmit. The report includes screenshots of dark web forums, marketplaces and subscription-based services.  According to the report, Blackhat Gen-AI tools make it easier to create and automate fraud campaigns, resulting in an increased volume, velocity and variety of attacks. GenAI tools automate pentesting to find enterprise vulnerabilities and circumvent security used by specific targets. Configuration (config) files, generated with the assistance of GenAI, are used for…

Read More

Protecting financial institutions in the era of AI-driven threats

Protecting financial institutions in the era of AI-driven threats

As open-source AI tools become more accessible, ransomware attacks are growing increasingly sophisticated. Scammers are now using AI in targeted spear phishing attacks, where highly personalized information is used to gain access to medical or financial information.  Financial service organizations are particularly at risk when it comes to these kinds of attacks — not only do they hold and exchange large sums of money, they also store and process highly sensitive information of their customers. …

Read More
1 2 3 4 8