Navigating the identity security landscape

Navigating the identity security landscape

In this episode of The Security Podcasts featuring Jeff Reich, Executive Director of the Identity Defined Security Alliance, we discuss the challenges security professionals are facing in the evolving landscape of identity security threats. “Something we see often is when we were asking the question, ‘how long do account stay active or in your system after someone leaves your organization?’ And certainly there are a number of organizations that say within two days it’s been…

Read More

Cisco and Nvidia: Redefining Workload Security

Cisco and Nvidia: Redefining Workload Security

There has been an exponential increase in breaches within enterprises despite the carefully constructed and controlled perimeters that exist around applications and data. Once an attacker can access the network, it becomes an “all you can eat” buffet as they move laterally around the environment, taking control, and either exfiltrating sensitive data, or locking it up with ransomware. Enterprises traditionally use two approaches to mitigate these risks: implementing intrusion detection solutions and defining micro-perimeters around…

Read More

Diversifying the security workforce

Diversifying the security workforce

In this episode of The Security Podcasts featuring Larry Whiteside, Jr., CISO at RegScale and Co-Founder and President at Cyversity, we discusses the importance of diversity within the security workforce, the challenges security leaders face during the hiring process and how critical mentorship is when it comes developing talent. “The reality is threat actors and our adversaries that are out there, and they don’t care about what someone looks like. They don’t care about what…

Read More

Avoiding offboarding red flags

Avoiding offboarding red flags

In this episode of The Security Podcasts featuring Yoav Kalati, VP Product at Software as a Service Security Posture Management company Wing Security, we discuss the security challenges and red flags organizations face when it comes to offboarding employees. Or check it out on our Apple Podcasts or Spotify channels. Don’t forget to like, follow, and rate and review our podcasts! Source link

Read More

Challenges of deep fakes in cybersecurity

Challenges of deep fakes in cybersecurity

Deepfakes have been making the headlines with the technology being utilized in social engineering attacks and phishing schemes. In this episode of The Security Podcasts featuring Brent Arnold, a partner practicing in Gowling WLG’s Advocacy department, we discuss the challenges the security industry faces with more and more convincing deepfakes making the rounds. Or check it out on our Apple Podcasts or Spotify channels. Don’t forget to like, follow, and rate and review our podcasts!…

Read More

Strong security posture means building effective partnerships

Strong security posture means building effective partnerships

Strong security posture means building effective partnerships | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

How CBA Is Managing Cyber Security in an Age of ‘Infinite Signals’

How CBA Is Managing Cyber Security in an Age of ‘Infinite Signals’

Commonwealth Bank of Australia cyber defence operations leader Andrew Pade is building an AI legacy that will protect customers from cyber attacks and security professionals from career burnout. Image: Timon/Adobe Stock Andrew Pade took on the role of general manager of cyber defence operations and security integration at CBA just over three years ago. Yet in that time, according to Pade, the number of signals coming into its cyber practice has grown from 80 million…

Read More

Rogue AI risks and how to mitigate them

Rogue AI risks and how to mitigate them

Rogue AI risks and how to mitigate them | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Explorations in the spam folder: A sum greater than the parts

Explorations in the spam folder: A sum greater than the parts

Phishing is a problem that affects everyone, from the untrained to the highly skilled. It’s a problem that happens everywhere, from the office to the home. It comes through email, text, phone calls, etc. The location or means of delivery doesn’t matter—these criminals are going to target you where you are. If the location is one that you’re less likely to suspect, that’s all the better for them. The longer they can mask the scam—revealing…

Read More

Roles of AI, automation and humans in security

Roles of AI, automation and humans in security

Roles of AI, automation and humans in security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2 3 4 18