The deepfake dilemma: The importance of deepfake awareness training

The deepfake dilemma: The importance of deepfake awareness training

Enterprise security departments face a plethora of risks. One of the most significant threats that has emerged in recent years is that of deepfakes. These sophisticated artificial intelligence-powered manipulations of audio and video content seem rather innocuous on paper, but their creation and dissemination are exemplars of a broader large-scale organizational threat. As far as security departments are concerned, implementing a comprehensive deepfake awareness training program has become critical for forward-thinking executives managing enterprise risk…

Read More

Evolving and Reimagining Cisco Marketing Velocity – introducing Jennifer Machgan

Evolving and Reimagining Cisco Marketing Velocity – introducing Jennifer Machgan

On October 8th, Cisco will unveil an entirely new experience for Cisco partners using the Marketing Velocity Central (MVC) platform. Our team has been hard at work on reimagining Cisco Marketing Velocity – a multi-year journey. We are excited for our partners to attend the unveiling event! Before next week’s activities, I wanted to introduce you to a key member of Cisco’s Partner Demand and Acceleration team who has been instrumental over the past several…

Read More

Zero trust: The next evolution in cybersecurity

Zero trust: The next evolution in cybersecurity

As the number of connected devices continues to grow, so does the vulnerability of networks to cyber-attacks. The rise of the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) has exponentially expanded the attack surface for cybercriminals. Traditional perimeter-based security models are no longer sufficient in this environment, leading to the adoption of a more comprehensive security framework: zero trust. What is zero trust? At its core, zero trust operates on a…

Read More

Integrated security: AI is a cost-effective path to safer schools

Integrated security: AI is a cost-effective path to safer schools

Nearly 1 in 4 public school teachers say their school had a gun-related lockdown last year, according to Pew Research. For the more than 50 million children in public schools, these lockdowns exact a heavy toll on their mental health. The constant threat of violence inflicts immense harm. Schools need a solution. This is a pressing challenge for K-12 schools, which are entrusted with the education — and lives — of our children. Schools are…

Read More

Balancing Risk and Innovation – A CISO Perspective

Balancing Risk and Innovation – A CISO Perspective

In this episode of The Security Podcasts featuring Jill Knesek, CISO of Blackline, and former FBI Special Agent in the Cyber Crime Squad, we talk about balancing risk & innovation from a CISO’s perspective. “The message I like to give is we can be both innovative and secure.,” Knesek says. “They’re not mutually exclusive, and they shouldn’t be. By shifting left and embedding strong security practices and controls earlier into our development lifecycle, we can…

Read More

Ensuring security and compliance in evolving cloud environments

Ensuring security and compliance in evolving cloud environments

With the rapid pace of cloud adoption, organizations are quickly revolutionizing business operations but are having a harder time ensuring that systems are built and operated effectively and deployed with the proper cyber hygiene. Business growth experts say to move fast and break things but failing to implement appropriate cybersecurity controls simply doesn’t work because both the regulatory and threat landscape are evolving more rapidly than ever.  Even before organizations embarked on huge digital transformation…

Read More

Revolutionizing public safety and criminal justice through AI

Revolutionizing public safety and criminal justice through AI

Artificial Intelligence (AI) is rapidly transforming public safety, criminal justice and security by fundamentally changing how crimes are committed, investigated and prevented. As AI tools become increasingly sophisticated, law enforcement and corporate security professionals are utilizing these advancements to enhance their capabilities. However, integrating AI into these sectors also brings significant challenges, including ethical concerns, recruitment difficulties, and the surge in crime rates. This article examines the transformative impact of AI, the ongoing efforts to…

Read More

SaaS governance is improving, but AI presents new challenges

SaaS governance is improving, but AI presents new challenges

Despite hitting a high in 2022, apps identified as “shadow IT” dropped from 53% to 48% in 2023. This drop signals an increase in SaaS governance actions: we’re getting better within enterprises at knowing what apps employees are using, and better at enforcing policies around SaaS use. Anecdotally, I’m seeing that the creation of SaaS governance councils is becoming the norm; businesses are responding to a need for repeatable processes that allow teams to cross-functionally…

Read More

Liars in the wires: Getting the most from GenAI without getting duped

Liars in the wires: Getting the most from GenAI without getting duped

Before, artificial intelligence (AI) and machine learning (ML) required programming languages. Now, simple text interfaces enable everyone to interact with powerful models that are seemingly limitless. A University of California, San Diego study found that GPT4 has passed the TuringTest, with 54% of participants mistaking GPT4s responses as coming from a human. Many of the latest AI enabled tools can make you feel like you’ve mastered new subjects far and wide, unlocking vast riches and…

Read More

4 steps organizations can take to get started with AI-powered SecOps

4 steps organizations can take to get started with AI-powered SecOps

Cybersecurity is under siege. While 74% of security leaders recognize the growing threat of AI-powered cyberattacks, only 40% feel confident in their ability to defend against them. The latest AI tools are making highly personalized phishing attacks and the ability to change the signatures and hashes associated with malware files easier than before. Not to mention, methods to identify exactly when and where AI is being applied are scarce. This leaves CISOs racing against the…

Read More
1 6 7 8 9 10 33