Looking Ahead to 2025

Looking Ahead to 2025

With each New Year comes new challenges and concerns. This year is no different as security professionals prepare to respond to those challenges as well as the opportunities brought on by technological advancements and an ever-evolving threat landscape. I asked some security leaders to share their thoughts on trends and concerns they see becoming a top priority for security teams in the coming year.  “Ongoing concerns that ‘core’ U.S. values relating to social norms and…

Read More

Report: Software security awareness training is at an all-time low

Report: Software security awareness training is at an all-time low

Black Duck has released its annual Building Security In Maturity Model (BSIMM) report, investigating how different sectors (including financial services, healthcare, IoT and technology) are addressing modern software security challenges. This report considers software security practices from more than 120 organizations and represents the work of 11,100 security professionals, who are supporting a total of 270,000 developers and protecting 96,000 applications.  100% of the organizations in the 2008 BSIMM report conducted training for software security awareness….

Read More

Beginning the AI Conversation

Beginning the AI Conversation

Artificial Intelligence (AI) has catapulted further into the corporate conversation with the introduction of ChatGPT and other large language, generative AI models now in the mainstream and accessible to the general public. In February 2024, a Canadian court ordered Air Canada to pay damages to a customer after the company’s virtual AI assistant gave the customer incorrect information regarding bereavement pricing for tickets. A current criminal case in a Maryland court brought charges against a…

Read More

A year of Security

A year of Security

As another year comes to a close, we’re taking a look back at the last 12 months of Security magazine. Looking back over the past year it is clear that the security landscape is one that is ever-evolving marked by emerging threats, technological advancements, and shifts in regulations and standards. Throughout the pages of Security magazine this year, security leaders have shared their valuable insights, best practices, and lessons learned. Here we revisit the Special…

Read More

A year of Security

A year of Security

As another year comes to a close, we’re taking a look back at the last 12 months of Security magazine. Looking back over the past year it is clear that the security landscape is one that is ever-evolving marked by emerging threats, technological advancements, and shifts in regulations and standards. Throughout the pages of Security magazine this year, security leaders have shared their valuable insights, best practices, and lessons learned. Here we revisit the Special…

Read More

Understanding and applying the zero trust mentality

Understanding and applying the zero trust mentality

In this episode of The Security Podcasts featuring Will Knehr, Senior Manager of Information Assurance and Data Privacy i-PRO Americas, we discuss the basics of a zero trust mentality as well as how it can be effectively implemented in the workplace. “Zero trust is a ‘never trust, always verify’ platform where we’re constantly looking at user and device activity on the network for indicators of compromise. The benefits it would have to an organization would…

Read More

Top 8 tips for implementing MFA effectively

Top 8 tips for implementing MFA effectively

Cyber threats are becoming more frequent and sophisticated. Protecting our digital assets isn’t just a priority — it’s a necessity. And, while we are observing Cybersecurity Awareness Month, the Cybersecurity and Infrastructure Security Agency (CISA) noted companies need to “turn on multifactor authentication (MFA).” However, there needs to be a more calculated approach to doing so. MFA is a powerful tool in our cybersecurity arsenal that adds extra layers of security beyond just passwords. But,…

Read More

4 essential questions to ask about a prospective SIEM

4 essential questions to ask about a prospective SIEM

The security information and event management (SIEM) market is in a state of flux, with significant consolidation and restructuring continuing to shake up the industry. This has left many security teams uncertain about the future of their critical monitoring and incident response tools. Many SIEM customers are being forced to migrate or wait out being able to make new decisions about what SIEM is really the best for their needs and their budget.  As organizations…

Read More

Using Cybersecurity Awareness Month to build a strong culture

Using Cybersecurity Awareness Month to build a strong culture

It’s hard to believe we’ve reached the 20th anniversary of Cybersecurity Awareness Month, and yet, here we are. Over the years, the cybersecurity landscape has shifted dramatically, and with it, the need for organizations to cultivate a strong cyber awareness culture. As threats continue to grow more and more sophisticated — spanning everything from phishing schemes to large-scale ransomware attacks — a robust awareness culture is not just beneficial but a critical line of defense…

Read More

Learning from leaders across sectors

Learning from leaders across sectors

From implementing effective emergency preparedness to navigating today’s cyber landscape, the role of the enterprise security leader requires a continual education to be apprised of best practices and ensure program success from the top down. In addition to networking, leaders in the security industry can benefit from lessons learned by their peers in a variety of sectors and the security field as whole. In Security magazine’s monthly Solutions by Sector live webinar series, an editorial…

Read More
1 2 3 5