Multi-Site Mastery: Strategies for Effective Risk Assessments

Multi-Site Mastery: Strategies for Effective Risk Assessments

In this episode of The Security Podcasts we sit down with Mark Landry, National Accounts Director at AMAROK, to discuss navigating multi-site risk assessment effectively. “In order to approach your risk assessment, especially when you’ve got vast or disparate geographies – meaning you’ve got a location in Portland, Maine and location in Portland, Oregon – you have to be able to accurately convey the risk across both of those locations that have very different risk…

Read More

Proving physical security value across an organization

Proving physical security value across an organization

In this episode of The Security Podcasts we sit down with Thomasina Martin, a Key Account Manager specializing in Energy and Utilities at Genetec, Inc., to talk about proving the value of physical security across an organization. “One of the primary challenges I think a lot of us see, I think it’s universal in the security industry when trying to secure a budget, is that physical security often competes with other critical business units or…

Read More

Deepfakes Can Fool Facial Recognition on Crypto Exchanges

Deepfakes Can Fool Facial Recognition on Crypto Exchanges

Generative AI deepfakes can stoke misinformation or manipulate images of real people for unsavory purposes. They can also help threat actors pass two-factor authentication, according to an Oct. 9 research report from Cato Networks’ CTRL Threat Research. AI generates videos of fake people looking into a camera The threat actor profiled by CTRL Threat Research — known by the handle ProKYC — uses deepfakes to forge government IDs and spoof facial recognition systems. The attacker…

Read More

47% of Organizations Have Dealt With Deepfake Attacks

47% of Organizations Have Dealt With Deepfake Attacks

According to a recent iProov report, the risk of deepfakes is rising with almost half of organizations (47%) having encountered a deepfake and three-quarters of them (70%) believing deepfake attacks which are created using generative AI tools, will have a high impact on their organizations. Sixty-eight percent believe that while it’s impactful at creating cybersecurity threats, more (84%) find it’s instrumental in protecting against them.  While organizations recognize the increased efficiencies that AI can bring,…

Read More

The deepfake dilemma: The importance of deepfake awareness training

The deepfake dilemma: The importance of deepfake awareness training

Enterprise security departments face a plethora of risks. One of the most significant threats that has emerged in recent years is that of deepfakes. These sophisticated artificial intelligence-powered manipulations of audio and video content seem rather innocuous on paper, but their creation and dissemination are exemplars of a broader large-scale organizational threat. As far as security departments are concerned, implementing a comprehensive deepfake awareness training program has become critical for forward-thinking executives managing enterprise risk…

Read More

Balancing Risk and Innovation – A CISO Perspective

Balancing Risk and Innovation – A CISO Perspective

In this episode of The Security Podcasts featuring Jill Knesek, CISO of Blackline, and former FBI Special Agent in the Cyber Crime Squad, we talk about balancing risk & innovation from a CISO’s perspective. “The message I like to give is we can be both innovative and secure.,” Knesek says. “They’re not mutually exclusive, and they shouldn’t be. By shifting left and embedding strong security practices and controls earlier into our development lifecycle, we can…

Read More

Generative AI poses several security risks

Generative AI poses several security risks

Generative artificial intelligence (GenAI) was analyzed in a recent report by Transmit. The report includes screenshots of dark web forums, marketplaces and subscription-based services.  According to the report, Blackhat Gen-AI tools make it easier to create and automate fraud campaigns, resulting in an increased volume, velocity and variety of attacks. GenAI tools automate pentesting to find enterprise vulnerabilities and circumvent security used by specific targets. Configuration (config) files, generated with the assistance of GenAI, are used for…

Read More

IBM on Future Cybersecurity: Passkeys, Deepfakes, Quantum Computing

IBM on Future Cybersecurity: Passkeys, Deepfakes, Quantum Computing

“The internet will be a lot safer in five years than it is today, thanks to technological advances that address common problems at scale.” This prediction by Chris Hockings, CTO of IBM Asia Pacific, might seem a bit ambitious given that AI-powered cybercrime is growing at an exponential rate, deepfake technology is enhancing social engineering attacks, and the power of quantum computing is on the horizon. But Hockings spoke with TechRepublic about how he believes…

Read More

Low Media Literacy: A Risk to Australia's Cybersecurity Landscape

Low Media Literacy: A Risk to Australia's Cybersecurity Landscape

A recent study by Western Sydney University, Adult Media Literacy in 2024, revealed worryingly low levels of media literacy among Australians, particularly given the deepfake capabilities posted by newer AI technologies. This deficiency poses an IT security risk, given that human error remains the leading cause of security breaches. As disinformation and deepfakes become increasingly sophisticated, the need for a cohesive national response is more urgent than ever, the report noted. Because AI can produce…

Read More

Navigating political polarization in the workplace

Navigating political polarization in the workplace

In this episode of The Security Podcasts featuring Scott McHugh, retired CSO at LyondellBasell Chemical Company and Faculty at Rice University, we discuss the challenges security leaders face when navigating political polarization in the workplace. “This is actually not a new phenomenon,” Scott McHugh says. “It really started in the late ’90s, in the Clinton administration, and it’s just been manifesting itself through the years ever since then. And it’s become much more of a…

Read More
1 2 3 4