88% of security teams are reaching or exceeding performance goals

88% of security teams are reaching or exceeding performance goals

A survey from Tines reveals that 88% of security teams are reaching or exceeding performance goals. This is despite limited staff and greater workloads, as 60% of security teams contain less than 10 people and 72% of workers report increased workloads from the previous year. Furthermore, 72% of security leaders can perform their role without working extended hours, and 83% report having a healthy work-life balance. This survey consulted more than 900 security decision makers…

Read More

Automation alone isn’t enough to patch vulnerabilities — Here’s why

Automation alone isn’t enough to patch vulnerabilities — Here’s why

While the future is hard to predict, we can count on two things about the cybersecurity landscape in 2025. First: cyberattacks are growing in volume as bad actors continue to diversify their methodologies. Second: the cost of exploits is increasing.  Impacts of cyberattacks are expanding beyond financial losses, impacting the daily operations of critical services including healthcare and travel. Organizations need to consider how they approach patching as vulnerabilities increase in volume and complexity and…

Read More

Automation and a “back to basics” approach will shape cybersecurity

Automation and a “back to basics” approach will shape cybersecurity

Security teams are overwhelmed. That’s not an exaggeration — it’s just a statement of fact. Talk to security professionals at any organization, from small businesses to Fortune 500 companies, and you’ll hear the same story. SecOps and security engineering teams are stretched thin, with their attention divided across cloud, automation, AI, containers, scalable environments, and dozens of other “urgent” priorities. What’s more, the number of security controls in place has increased dramatically over the past…

Read More

Multi-Site Mastery: Strategies for Effective Risk Assessments

Multi-Site Mastery: Strategies for Effective Risk Assessments

In this episode of The Security Podcasts we sit down with Mark Landry, National Accounts Director at AMAROK, to discuss navigating multi-site risk assessment effectively. “In order to approach your risk assessment, especially when you’ve got vast or disparate geographies – meaning you’ve got a location in Portland, Maine and location in Portland, Oregon – you have to be able to accurately convey the risk across both of those locations that have very different risk…

Read More

It's time to embrace OSCAL automation for effective risk management

It's time to embrace OSCAL automation for effective risk management

The National Institute of Standards and Technology (NIST) put forward the Open Security Controls Assessment Language (OSCAL) standard in 2021, creating a standardized machine readable language. The goal of the standard is to enable automation and facilitate interoperability between different security assessment tools. It also aims to enable real-time machine to machine data exchange, improving automation and interoperability across various compliance frameworks. There are a multitude of regulatory standards and frameworks that organizations must adhere…

Read More

Proving physical security value across an organization

Proving physical security value across an organization

In this episode of The Security Podcasts we sit down with Thomasina Martin, a Key Account Manager specializing in Energy and Utilities at Genetec, Inc., to talk about proving the value of physical security across an organization. “One of the primary challenges I think a lot of us see, I think it’s universal in the security industry when trying to secure a budget, is that physical security often competes with other critical business units or…

Read More

Balancing Risk and Innovation – A CISO Perspective

Balancing Risk and Innovation – A CISO Perspective

In this episode of The Security Podcasts featuring Jill Knesek, CISO of Blackline, and former FBI Special Agent in the Cyber Crime Squad, we talk about balancing risk & innovation from a CISO’s perspective. “The message I like to give is we can be both innovative and secure.,” Knesek says. “They’re not mutually exclusive, and they shouldn’t be. By shifting left and embedding strong security practices and controls earlier into our development lifecycle, we can…

Read More

Protecting financial institutions in the era of AI-driven threats

Protecting financial institutions in the era of AI-driven threats

As open-source AI tools become more accessible, ransomware attacks are growing increasingly sophisticated. Scammers are now using AI in targeted spear phishing attacks, where highly personalized information is used to gain access to medical or financial information.  Financial service organizations are particularly at risk when it comes to these kinds of attacks — not only do they hold and exchange large sums of money, they also store and process highly sensitive information of their customers. …

Read More

How to tackle burnout at the source in the security operations center

How to tackle burnout at the source in the security operations center

Frontline security teams play an invaluable role in their organization’s health and success. But as cyberattacks increase and organizations face a mountain of internal and external pressures, burnout among security professionals has hit worrying levels — leaving many heading for the door. Tines’s 2023 Voice of the SOC report recently shone a spotlight on the scale of this issue. This survey of 900 security professionals across the United States, the United Kingdom and Europe found…

Read More

Navigating political polarization in the workplace

Navigating political polarization in the workplace

In this episode of The Security Podcasts featuring Scott McHugh, retired CSO at LyondellBasell Chemical Company and Faculty at Rice University, we discuss the challenges security leaders face when navigating political polarization in the workplace. “This is actually not a new phenomenon,” Scott McHugh says. “It really started in the late ’90s, in the Clinton administration, and it’s just been manifesting itself through the years ever since then. And it’s become much more of a…

Read More
1 2 3