Understanding the value and practicality of cyber insurance

Understanding the value and practicality of cyber insurance

As the cyber threat landscape expands, enacting defensive measures against malicious actors is only one part of the solution — in the event of a cyber incident, organizations must also have a recovery plan. For many organizations, cyber insurance is an essential part of that plan.  Here, Security magazine talks with Nick Kathmann, CISO at LogicGate, about the value and practicalities of implementing cyber insurance.  Security magazine: Tell us about your career and background.  Kathmann:…

Read More

A critical challenge: Understanding and addressing insider threats

A critical challenge: Understanding and addressing insider threats

In today’s hyper-connected world, insider threats have become one of the most pressing challenges for organizations. While external attacks like ransomware and hacking often dominate the headlines, insider threats posed by employees, contractors, or others with internal access are equally, if not more, dangerous. Whether arising from malice, negligence or coercion, insiders have unparalleled access to sensitive systems and data, making their actions potentially catastrophic. The critical insider security issues organizations face and the actionable…

Read More

Top 8 tips for implementing MFA effectively

Top 8 tips for implementing MFA effectively

Cyber threats are becoming more frequent and sophisticated. Protecting our digital assets isn’t just a priority — it’s a necessity. And, while we are observing Cybersecurity Awareness Month, the Cybersecurity and Infrastructure Security Agency (CISA) noted companies need to “turn on multifactor authentication (MFA).” However, there needs to be a more calculated approach to doing so. MFA is a powerful tool in our cybersecurity arsenal that adds extra layers of security beyond just passwords. But,…

Read More

47% of Organizations Have Dealt With Deepfake Attacks

47% of Organizations Have Dealt With Deepfake Attacks

According to a recent iProov report, the risk of deepfakes is rising with almost half of organizations (47%) having encountered a deepfake and three-quarters of them (70%) believing deepfake attacks which are created using generative AI tools, will have a high impact on their organizations. Sixty-eight percent believe that while it’s impactful at creating cybersecurity threats, more (84%) find it’s instrumental in protecting against them.  While organizations recognize the increased efficiencies that AI can bring,…

Read More

Where do CISOs stand in an era cyberattacks and intense scrutiny?

Where do CISOs stand in an era cyberattacks and intense scrutiny?

Cybersecurity has no doubt entered the national dialogue when it comes to economic or even national security issues. By nature, cyber is a deeply technical endeavor, but organizational culture surrounding security has become as important as the tech wizardry itself. This is evidenced by Microsoft’s recent testimony before the House Homeland Security Committee around alleged security lapses (for instance, the tech giant was mired in the headline-grabbing SolarWinds breach that touched government agencies). It has…

Read More

The value of security: building the foundation for modern enterprises

The value of security: building the foundation for modern enterprises

Physical security isn’t an afterthought for organizations: it is critical infrastructure. Retailers, healthcare providers, municipalities, schools and all kinds of other organizations rely on security systems to keep their people and places safe.  As the capabilities of security technology have evolved, many organizations are taking a broader view of their investments and understanding how they can deliver more value across their operations. From opportunities to modernize the workplace with tools like touchless door access to…

Read More

Liars in the wires: Getting the most from GenAI without getting duped

Liars in the wires: Getting the most from GenAI without getting duped

Before, artificial intelligence (AI) and machine learning (ML) required programming languages. Now, simple text interfaces enable everyone to interact with powerful models that are seemingly limitless. A University of California, San Diego study found that GPT4 has passed the TuringTest, with 54% of participants mistaking GPT4s responses as coming from a human. Many of the latest AI enabled tools can make you feel like you’ve mastered new subjects far and wide, unlocking vast riches and…

Read More

Only 5% of business leaders report seamless connectivity

Only 5% of business leaders report seamless connectivity

A survey of 500 enterprise leaders across six countries (United States, United Kingdom, Germany, Japan, Canada and Australia) highlights the relationship between connectivity and cybersecurity. The research asserts that better connectivity improves an organization’s chances of defending against cyberattacks, as 38% of organizations with excellent connectivity are among industry leaders for cybersecurity performance. When an organization has good connectivity, only 22% are considered industry leaders.  However, only 5% of business leaders report seamless connectivity across…

Read More

Only 25% of organizations are prepared to manage a DDoS attack

Only 25% of organizations are prepared to manage a DDoS attack

OPSWAT and Dark Survey collaborated on a survey revealing IT and corporate leadership concerns about organizational preparedness. Survey responses indicate a lack of preparedness for evolving cybersecurity threats, as only 25% of respondents feel their organization is fully equipped to manage DDoS attacks. For threats such as botnets, Advanced Persistent Threats (APTs), API security issues and zero-day malware, the expressed preparedness level is even lower.  Many respondents report experiencing attacks as well. These include:  24%…

Read More

Why insider attacks are indicative of a need for security convergence

Why insider attacks are indicative of a need for security convergence

What is security convergence? Security convergence is the merging of the two previously distinct practices of physical and cyber security to create a more cohesive and effective security defense against all types of crime. Only 20% of all businesses have fully converged physical and cyber security measures together. This is despite a rapidly growing rate of breaches within businesses, including insider attacks. Many are relying purely on one or the other without considering how they…

Read More
1 2 3