Cybersecurity needs more than strong tech, it needs strong messaging

Cybersecurity needs more than strong tech, it needs strong messaging

The most advanced security technology can’t protect an organization if employees click on phishing links or use weak passwords. While companies invest millions in cybersecurity tools and infrastructure, many overlook a critical component of defense: clear, consistent messaging that builds a security-minded culture. According to Verizon’s 2023 Data Breach Investigations Report, 74% of breaches stem from human elements, highlighting how technical controls alone fall short. Organizations need strategic communication to create awareness, drive behavioral change,…

Read More

Unpacking data breaches: Insights from security experts

Unpacking data breaches: Insights from security experts

Robert S. Mueller, III, former Director of the FBI, is quoted as saying, “There are only two types of companies: Those that have been hacked and those that will be hacked.” As technology expands, devices diversify and systems become interconnected, the threat of a data breach grows all the more serious for an organization. Here, Security magazine talks with two cyber experts about mitigating the risks of data breaches and mobile data breaches. Data breaches…

Read More

Priorities and misconceptions: Improving security posture in 2025

Priorities and misconceptions: Improving security posture in 2025

Protecting enterprises from data breaches, patching vulnerabilities, and addressing phishing or zero day attacks is no easy feat. Chief Information Security Officers (CISOs) and their security teams must work 24/7/365 to ensure their organization’s networks and sensitive corporate data remain secure and out of the hands of nefarious actors. CISOs’ priorities vary depending on the size of their organization and whether it operates in a highly regulated industry such as healthcare or finance, and the…

Read More

Reducing the lifespan of digital certificates

Reducing the lifespan of digital certificates

In this episode of The Security Podcasts featuring Tim Callan, Co-Chair at CA/Browser Forum and Chief Compliance Officer at Sectigo, we discuss the current state of digital certificate lifespans as well as the support for reducing them. “If you look at SSL certificates, for example, once upon a time, there was no limit at all. You could get a 10 year certificate. That was first capped, and it was capped at three, and then it…

Read More

Looking Ahead to 2025

Looking Ahead to 2025

With each New Year comes new challenges and concerns. This year is no different as security professionals prepare to respond to those challenges as well as the opportunities brought on by technological advancements and an ever-evolving threat landscape. I asked some security leaders to share their thoughts on trends and concerns they see becoming a top priority for security teams in the coming year.  “Ongoing concerns that ‘core’ U.S. values relating to social norms and…

Read More

Report: Software security awareness training is at an all-time low

Report: Software security awareness training is at an all-time low

Black Duck has released its annual Building Security In Maturity Model (BSIMM) report, investigating how different sectors (including financial services, healthcare, IoT and technology) are addressing modern software security challenges. This report considers software security practices from more than 120 organizations and represents the work of 11,100 security professionals, who are supporting a total of 270,000 developers and protecting 96,000 applications.  100% of the organizations in the 2008 BSIMM report conducted training for software security awareness….

Read More

Beginning the AI Conversation

Beginning the AI Conversation

Artificial Intelligence (AI) has catapulted further into the corporate conversation with the introduction of ChatGPT and other large language, generative AI models now in the mainstream and accessible to the general public. In February 2024, a Canadian court ordered Air Canada to pay damages to a customer after the company’s virtual AI assistant gave the customer incorrect information regarding bereavement pricing for tickets. A current criminal case in a Maryland court brought charges against a…

Read More

A year of Security

A year of Security

As another year comes to a close, we’re taking a look back at the last 12 months of Security magazine. Looking back over the past year it is clear that the security landscape is one that is ever-evolving marked by emerging threats, technological advancements, and shifts in regulations and standards. Throughout the pages of Security magazine this year, security leaders have shared their valuable insights, best practices, and lessons learned. Here we revisit the Special…

Read More

A year of Security

A year of Security

As another year comes to a close, we’re taking a look back at the last 12 months of Security magazine. Looking back over the past year it is clear that the security landscape is one that is ever-evolving marked by emerging threats, technological advancements, and shifts in regulations and standards. Throughout the pages of Security magazine this year, security leaders have shared their valuable insights, best practices, and lessons learned. Here we revisit the Special…

Read More

Understanding and applying the zero trust mentality

Understanding and applying the zero trust mentality

In this episode of The Security Podcasts featuring Will Knehr, Senior Manager of Information Assurance and Data Privacy i-PRO Americas, we discuss the basics of a zero trust mentality as well as how it can be effectively implemented in the workplace. “Zero trust is a ‘never trust, always verify’ platform where we’re constantly looking at user and device activity on the network for indicators of compromise. The benefits it would have to an organization would…

Read More
1 2 3 6