The integration security paradox: Strategies to protect data

The integration security paradox: Strategies to protect data

As the adage goes, an organization is only as secure as its weakest link. With the growing emphasis on software integration, B2B SaaS companies are adding many links to their chains, creating new access points for attackers. The Crowdstrike tech outage demonstrates just how interdependent systems are, and the SolarWinds hack in 2020 highlighted the vulnerabilities in supply chain security and the potential consequences of large-scale cyberattacks. Third-party attacks accounted for nearly 30% of all…

Read More

Balancing efficiency with security in manufacturing

Balancing efficiency with security in manufacturing

Manufacturing is an essential part of everyday life — from the cars on the road to the pens in your desk drawer, manufacturers keep the world running. When it comes to security, there are a lot of moving parts for manufacturers to consider —access management, supply chain, theft, intellectual property and more —in order to keep production on schedule. Protecting intellectual property is a top priority for security leaders in the manufacturing industry. At Whirlpool…

Read More

The value-add of security metrics

The value-add of security metrics

Enterprise security functions that collect and analyze data can identify trends to improve their teams and prove the value of security within the organization. From tracking workplace violence incidents to facility access patterns, enterprise security teams use data to forge relationships across the business and evaluate their own successes and improvements. Below, we explore how four enterprise security functions have embraced data to improve operational efficiency, enterprise-wide communication and security buy-in from organizational leadership. YAZAKI…

Read More

Balancing data privacy and security in the age of AI-powered defenses

Balancing data privacy and security in the age of AI-powered defenses

Cyber threats are always evolving. Not only has artificial intelligence (AI) lowered the bar required to launch an attack, but adversaries are also using the technology to enhance the speed and sophistication of their tactics — through methods like code generation, password cracking, social engineering, phishing attempts and more. For example, hackers can use generative AI to build convincing profiles on social media platforms, making it easier for hackers to impersonate individuals or create fake…

Read More

Should you write a security book?

Should you write a security book?

In this era of self-publishing, ebooks, gig ghostwriters and publishing on demand, it seems there are maybe 12 people in the security profession who haven’t written a book. Actually, the vast majority of us haven’t. Are we missing an opportunity? Authorship connotes power, authority, confidence, discipline, credibility and mastery — all elements of leadership. Is it time for you to publish a book? There are many factors to consider. You will not make much money,…

Read More

Thou shalt question accepted wisdom

Thou shalt question accepted wisdom

Thou shalt question accepted wisdom | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Collaboration needed to effectively expand cyber education & training

Collaboration needed to effectively expand cyber education & training

Collaboration needed to effectively expand cyber education & training | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Giving up the ghost in security job searches

Giving up the ghost in security job searches

Giving up the ghost in security job searches | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Sweating the assets: Maximizing cybersecurity investments for greater ROI

Sweating the assets: Maximizing cybersecurity investments for greater ROI

Sweating the assets: Maximizing cybersecurity investments for greater ROI | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Going back to the basics this Cybersecurity Awareness Month

Going back to the basics this Cybersecurity Awareness Month

Going back to the basics this Cybersecurity Awareness Month | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2 3