With the exponential growth of data, new SEC rules need a new approach

With the exponential growth of data, new SEC rules need a new approach

The latest estimates show 328.77 million terabytes of data are created each day, roughly 120 zettabytes per year, compared to just 2 zettabytes in all of 2010. This growth isn’t expected to slow in the coming years, and organizations increasingly rely on this data to make informed business decisions, conduct research and analysis and much more. But managing and securing that growth in data volume poses a challenge for security teams, leading to more breaches…

Read More

An intelligent application future hinges on using responsible AI

An intelligent application future hinges on using responsible AI

As enthusiasm for AI builds and regulation gains momentum, investing in “doing generative AI” responsibly and ethically is not just the right thing to do — it will give companies a competitive advantage. Responsible AI helps mitigate operational, financial and competitive risks. Plus, data shows that companies leveraging responsible AI practices may be better positioned to attract and retain talent.  Unfortunately, there’s no industry standard for what responsible AI should look like. Stanford researchers found…

Read More

90% of organizations experienced an identity incident this past year

90% of organizations experienced an identity incident this past year

A report by the Identity Defined Security Alliance (IDSA) examined the identity security systems within large organizations. The study revealed trends in common identity incident vectors and direct organizational influence. It also analyzed the impact of trends such as cyber insurance, artificial intelligence (AI) and the shifting regulatory landscape. Among the studied organizations, 90% claimed to experience an identity-related event in the last year. This percentage remains consistent with the percentage from 2023.  More key…

Read More

Financial consequences of ignoring security debt in 2024

Financial consequences of ignoring security debt in 2024

For years, large organizations have leaned on the assurances provided by their software suppliers’ certifications such as SOC 2 and ISO27001, assuming certifications meant that vendors’ security measures were up to par. However, due to a recent shift in hackers focus the spotlight is now turned towards the software supply chain. If it wasn’t crystal clear, then it is now: vendors’ vulnerabilities aren’t just theirs — they’re yours too. What might have once seemed like…

Read More

Consolidation is coming to corporate security technology

Consolidation is coming to corporate security technology

Those old enough to remember the software industry in the 1980s might recall some names from days gone by: Lotus 1-2-3, Harvard Graphics, :ccMail and WordPerfect. At its peak, Lotus 1-2-3 had an overwhelming market share and had won the spreadsheet wars. WordPerfect was the enterprise standard for word processing and :ccMail was one of the dominant email systems of the decade. And Harvard Graphics? As the first presentation software to gain widespread acceptance in…

Read More

To pay or not to pay? Negotiating in the age of ransomware

To pay or not to pay? Negotiating in the age of ransomware

In 2023, more than 2,200 networks across United States hospitals, schools and government organizations, as well as thousands of private businesses, were breached by cybercriminals. With another record-breaking year for ransomware and data extortion in the rearview mirror, organizations of all sizes are preparing for when they’ll need to make their big payout in 2024. But what if paying the ransom wasn’t the only way out?  There’s often room to negotiate with threat actors or,…

Read More

Unveiling common ransomware attack methods to secure your organization

Unveiling common ransomware attack methods to secure your organization

With ransomware payments hitting a record $1.1 billion last year, it’s no wonder why it’s top of mind for most business leaders. Instead of wondering whether or not they’ll be hit with a ransomware attack, leaders need to be building a strategy for what to do when an attack is attempted on their business. The question isn’t “Will I get hit with ransomware?” it is “What will I do when it happens?” For years, the…

Read More

Building digital trust with ISACA's framework

Building digital trust with ISACA's framework

In today’s digital landscape, organizations must navigate a complex web of challenges, from cybersecurity threats and data privacy concerns to the integration of emerging technologies. Establishing trust in their digital ecosystems is paramount for success, but achieving this can be daunting. Frameworks are the cornerstones of organizational effectiveness, providing standardized approaches to tackle challenges, achieve objectives and streamline processes. They offer pre-defined structures, methodologies, and tools that facilitate collaboration, promote efficiency and empower robust risk…

Read More

The power of partnerships

The power of partnerships

Throughout the day to day operations of a business or organization, it can be easy for different departments to work independently; however, when it comes to developing an effective security strategy, working cooperatively is indispensable. Whether it is collaborating with other departments or with outside organizations, building and maintaining partnerships is mission critical. “It’s impossible to do everything yourself,” says Jay Gruber, Associate Vice-President for Public Safety and Chief Public Safety Officer at Georgetown University….

Read More

Stay a step ahead with the missing link in cybercrime defense: OSINT

Stay a step ahead with the missing link in cybercrime defense: OSINT

Chief Information Security Officers (CISOs) require a comprehensive set of tools, services and skilled people to succeed in the never-ending battle against cybercrime. They stand as the last line of defense to protect their organizations from losing data, money, reputation and, in extreme cases, the business itself. Adding OSINT-driven threat intelligence to the CISO toolkit can be a game-changer, delivering insights that enable a more proactive rather than reactive approach to cybercrime defenses. Whether launched…

Read More
1 3 4 5 6