A year of Security

A year of Security

As another year comes to a close, we’re taking a look back at the last 12 months of Security magazine. Looking back over the past year it is clear that the security landscape is one that is ever-evolving marked by emerging threats, technological advancements, and shifts in regulations and standards. Throughout the pages of Security magazine this year, security leaders have shared their valuable insights, best practices, and lessons learned. Here we revisit the Special…

Read More

Understanding and applying the zero trust mentality

Understanding and applying the zero trust mentality

In this episode of The Security Podcasts featuring Will Knehr, Senior Manager of Information Assurance and Data Privacy i-PRO Americas, we discuss the basics of a zero trust mentality as well as how it can be effectively implemented in the workplace. “Zero trust is a ‘never trust, always verify’ platform where we’re constantly looking at user and device activity on the network for indicators of compromise. The benefits it would have to an organization would…

Read More

Top 8 tips for implementing MFA effectively

Top 8 tips for implementing MFA effectively

Cyber threats are becoming more frequent and sophisticated. Protecting our digital assets isn’t just a priority — it’s a necessity. And, while we are observing Cybersecurity Awareness Month, the Cybersecurity and Infrastructure Security Agency (CISA) noted companies need to “turn on multifactor authentication (MFA).” However, there needs to be a more calculated approach to doing so. MFA is a powerful tool in our cybersecurity arsenal that adds extra layers of security beyond just passwords. But,…

Read More

4 essential questions to ask about a prospective SIEM

4 essential questions to ask about a prospective SIEM

The security information and event management (SIEM) market is in a state of flux, with significant consolidation and restructuring continuing to shake up the industry. This has left many security teams uncertain about the future of their critical monitoring and incident response tools. Many SIEM customers are being forced to migrate or wait out being able to make new decisions about what SIEM is really the best for their needs and their budget.  As organizations…

Read More

Using Cybersecurity Awareness Month to build a strong culture

Using Cybersecurity Awareness Month to build a strong culture

It’s hard to believe we’ve reached the 20th anniversary of Cybersecurity Awareness Month, and yet, here we are. Over the years, the cybersecurity landscape has shifted dramatically, and with it, the need for organizations to cultivate a strong cyber awareness culture. As threats continue to grow more and more sophisticated — spanning everything from phishing schemes to large-scale ransomware attacks — a robust awareness culture is not just beneficial but a critical line of defense…

Read More

Learning from leaders across sectors

Learning from leaders across sectors

From implementing effective emergency preparedness to navigating today’s cyber landscape, the role of the enterprise security leader requires a continual education to be apprised of best practices and ensure program success from the top down. In addition to networking, leaders in the security industry can benefit from lessons learned by their peers in a variety of sectors and the security field as whole. In Security magazine’s monthly Solutions by Sector live webinar series, an editorial…

Read More

The three T's of device lifecycle management

The three T's of device lifecycle management

In today’s highly technological world, devices are at the heart of organizational operations. Whether it’s a sophisticated surveillance camera with advanced features or a simple access control panel, the smooth functioning of these devices is critical for seamless operations across the enterprise. The failure of even a single device can trigger a cascade of frustration and reduced productivity. This is why effective device lifecycle management is so important; it can prevent disruptions and enhance both…

Read More

Where do CISOs stand in an era cyberattacks and intense scrutiny?

Where do CISOs stand in an era cyberattacks and intense scrutiny?

Cybersecurity has no doubt entered the national dialogue when it comes to economic or even national security issues. By nature, cyber is a deeply technical endeavor, but organizational culture surrounding security has become as important as the tech wizardry itself. This is evidenced by Microsoft’s recent testimony before the House Homeland Security Committee around alleged security lapses (for instance, the tech giant was mired in the headline-grabbing SolarWinds breach that touched government agencies). It has…

Read More

Integrate red, blue and purple teams into cyber resilience strategy

Integrate red, blue and purple teams into cyber resilience strategy

Given the relentless pace of the security industry, prevention of cyber threats demands that organizations properly understand and implement red, blue and purple team exercises.  With increasing pressure on organizations to adopt cutting-edge technology and assemble teams to tackle evolving threats, it is crucial to pause and reflect before integrating red, blue or purple teams. It is essential to grasp their current significance, evolution and the responsible incorporation of these teams into a security resilience…

Read More

Liars in the wires: Getting the most from GenAI without getting duped

Liars in the wires: Getting the most from GenAI without getting duped

Before, artificial intelligence (AI) and machine learning (ML) required programming languages. Now, simple text interfaces enable everyone to interact with powerful models that are seemingly limitless. A University of California, San Diego study found that GPT4 has passed the TuringTest, with 54% of participants mistaking GPT4s responses as coming from a human. Many of the latest AI enabled tools can make you feel like you’ve mastered new subjects far and wide, unlocking vast riches and…

Read More
1 2 3 5