Upskilling security teams: Breaking down silos and elevating expertise

Upskilling security teams: Breaking down silos and elevating expertise

Cybersecurity isn’t just about technology — it’s about people. Security teams are made up of professionals with diverse backgrounds and skill sets, all working toward the same objective: stopping threats. Yet, too often, these teams remain isolated within rigid structures, creating gaps that attackers readily exploit. The reality is that threats don’t respect silos, and defenders can’t afford to be confined by them. Even before today’s pressures, recruiting and retaining cybersecurity talent was a persistent…

Read More

Frontline lessons: What cybersecurity leaders can learn from attacks

Frontline lessons: What cybersecurity leaders can learn from attacks

In cybersecurity, confidence can be a liability. I’ve seen organizations of all sizes assume they’re safe — until an attack proves otherwise. As threats grow more sophisticated, companies pour time and money into defending their systems. But too often, they focus on the wrong things, like fixing vulnerabilities that are not critical to operations, and reality catches them off guard. Cyber resilience isn’t about checking boxes — it’s about whether your business can survive, recover,…

Read More

Recognizing cybersecurity as a revenue growth strategy

Recognizing cybersecurity as a revenue growth strategy

Cybersecurity protocols are a necessity for every digital enterprise. However, as business leaders navigate a variety of tools on the market, they’re realizing just how imperative choosing the right solution is. The global average cost of a data breach reached $4.88 million in 2024, marking a 10% increase from the previous year — the largest yearly jump since the pandemic. Not only are enterprises losing money from the breach itself, but its impact on customer…

Read More

The new security model: A blueprint for successful SASE deployment

The new security model: A blueprint for successful SASE deployment

Greg Rosenke via Unsplash A decade ago, managing network and security architecture was far simpler. Employees worked primarily from corporate offices, and applications resided within on-premises data centers. The security perimeter was well-defined, making traditional security models effective in protecting enterprise assets. Fast forward to today, and the landscape has changed dramatically. Digital transformation initiatives, cloud adoption and the exponential rise in remote work have diminished the traditional security perimeter. Many enterprise applications have migrated…

Read More

State of ransomware: Evolving threats and strategies to stay safe

State of ransomware: Evolving threats and strategies to stay safe

Ransomware in 2025 is no longer just a cybersecurity challenge — it has escalated into a global crisis affecting economies, governments, and essential services. From multinational corporations to hospitals and schools, no organization is immune to these increasingly sophisticated attacks. According to Cohesity’s Global Cyber Resilience Report, 69% of organizations paid a ransom in the past year, emphasizing the urgent need for stronger defenses against cybercriminals. Recent and notable attacks Over the past year, ransomware…

Read More

78% of CISOs are experiencing impact from from AI cyber threats

78% of CISOs are experiencing impact from from AI cyber threats

The 2025 State of AI Cybersecurity report from Darktrace discusses the shifting role of artificial intelligence (AI) in cybersecurity, featuring insights from more than 1,500 security professionals globally. According to the report, 78% of Chief Information Security Officers (CISOs) are seeing impacts from AI-driven cyber threats. This represents a 5% increase from 2024.  Although AI-fueled threats are impacting more CISOs, more than 60% of them feel sufficiently prepared to defend against such threats (nearly a…

Read More

Cybersecurity needs more than strong tech, it needs strong messaging

Cybersecurity needs more than strong tech, it needs strong messaging

The most advanced security technology can’t protect an organization if employees click on phishing links or use weak passwords. While companies invest millions in cybersecurity tools and infrastructure, many overlook a critical component of defense: clear, consistent messaging that builds a security-minded culture. According to Verizon’s 2023 Data Breach Investigations Report, 74% of breaches stem from human elements, highlighting how technical controls alone fall short. Organizations need strategic communication to create awareness, drive behavioral change,…

Read More

Unpacking data breaches: Insights from security experts

Unpacking data breaches: Insights from security experts

Robert S. Mueller, III, former Director of the FBI, is quoted as saying, “There are only two types of companies: Those that have been hacked and those that will be hacked.” As technology expands, devices diversify and systems become interconnected, the threat of a data breach grows all the more serious for an organization. Here, Security magazine talks with two cyber experts about mitigating the risks of data breaches and mobile data breaches. Data breaches…

Read More

Priorities and misconceptions: Improving security posture in 2025

Priorities and misconceptions: Improving security posture in 2025

Protecting enterprises from data breaches, patching vulnerabilities, and addressing phishing or zero day attacks is no easy feat. Chief Information Security Officers (CISOs) and their security teams must work 24/7/365 to ensure their organization’s networks and sensitive corporate data remain secure and out of the hands of nefarious actors. CISOs’ priorities vary depending on the size of their organization and whether it operates in a highly regulated industry such as healthcare or finance, and the…

Read More

Reducing the lifespan of digital certificates

Reducing the lifespan of digital certificates

In this episode of The Security Podcasts featuring Tim Callan, Co-Chair at CA/Browser Forum and Chief Compliance Officer at Sectigo, we discuss the current state of digital certificate lifespans as well as the support for reducing them. “If you look at SSL certificates, for example, once upon a time, there was no limit at all. You could get a 10 year certificate. That was first capped, and it was capped at three, and then it…

Read More
1 2 3 6