Countering ransomware: Ransomware gang disruptions do work

Countering ransomware: Ransomware gang disruptions do work

Countering ransomware remains one of the top priorities for nations and their law enforcement and intelligence agencies. The persistence of ransomware, which can largely be attributed to its high profits combined with the safe harbor given to ransomware actors in Russia, has evolved into a cybercrime battle with no perfect solution. In many cases, it is not possible to arrest, prosecute or even indict the perpetrators.  In the face of these challenges, governments are increasingly…

Read More

Recognizing National Cybersecurity Awareness Month in 2024

Recognizing National Cybersecurity Awareness Month in 2024

October is National Cybersecurity Awareness Month. Throughout this month, cyber issue awareness is promoted to educate individuals and organizations on the importance of cybersecurity.  This year has seen notable cyber threats, making cyber awareness and preparedness essential. Here, cyber leaders share their thoughts on cybersecurity and the threat landscape.  National Cybersecurity Awareness Month: Security leaders discuss  Karl Holmqvist, Founder and CEO at Lastwall:  “We stand at a pivotal moment in cybersecurity, where we must confront…

Read More

Key considerations for securing major events

Key considerations for securing major events

Organizing major events and large-scale public activities requires a careful balance between mobility, safety and security. One of the compounding factors becomes the ability to address various security needs while maintaining flow and efficiency before, during, and after the event. Creating an atmosphere where people feel secure but can still move freely and efficiently is paramount to the experience. For many large-scale events, preparations for securing venues require years of planning. In addition to finding the physical…

Read More

Engineering the human out of cybersecurity

Engineering the human out of cybersecurity

Human error can play a large role in how a malicious actor gains access into a system. Current cybersecurity frameworks rely on employees being able to thwart cyber risks with basic training, but as cyber threats become more elaborate, it has become increasingly difficult for employees to successfully identify and avoid cyber risks. Human error is a highly sought out result that cybercriminals depend on. According to Verizon’s 2024 Data Breach Investigations Report, 68% of…

Read More

Reclaim the information advantage from cyber criminals

Reclaim the information advantage from cyber criminals

Attackers have the information advantage From SOC analysts to threat actors, everyone benefits from understanding the exposures existing in an organization’s external risks. While the SOC analysts’ benefits are more … wholesome, it is often found that adversaries have a more comprehensive understanding of an organization’s vulnerabilities. Leaked credentials, exposed documents, vulnerable hosts and hard-coded secrets frequently go unnoticed by organizations for months or years. Cyber adversaries consistently demonstrate their information advantage when it comes…

Read More

How to transform the defender’s dilemma into the defender’s advantage

How to transform the defender’s dilemma into the defender’s advantage

The notion that cybersecurity defenders are at an inherent disadvantage — the so-called defender’s dilemma — is incorrect and counterproductive. Instead of focusing solely on how we respond to attackers’ tactics, we can identify and use the advantages inherent in our position as defenders. This article explains what a defender-oriented mindset entails and how it can help you strengthen your security program. What’s the defender’s dilemma? For many years, security professionals have used the “defender’s…

Read More

Unleashing the potential of investigative techniques

Unleashing the potential of investigative techniques

In the realm of executive protection, the necessity to expect and defuse potential threats is paramount. Whether tasked with safeguarding high-profile individuals, corporate leaders or dignitaries, professionals in this field must possess a versatile skill set that transcends mere physical security measures. Among the array of skills they carry, the skill to conduct thorough investigations emerges as a cornerstone in optimizing executive protection. Drawing inspiration from the realm of investigative work and armed with resources…

Read More

2024: The year of upticks in cyber warfare

2024: The year of upticks in cyber warfare

Historical trends over the past decade prove that when global conflicts arise, it’s inevitable that we’ll begin to see widespread cyberattacks shortly thereafter. This has been the case during the recent happenings between Russia and Ukraine, and Israel and Gaza. At the beginning of each crisis, we witnessed an immediate uptick in cyberattacks worldwide in areas such as DDoS, API and DNS attacks. Following the Iranian missile strike in April, we have already seen and…

Read More

AI hits prime time for physical security

AI hits prime time for physical security

Artificial intelligence (AI) is many things to many people. For some, it’s the hyped-up future of everything. To others, it’s just big data and analytics in a shiny new box. But regardless of where one falls on the AI spectrum, there’s no denying one thing: AI is causing big changes, and it’s already changing how organizations secure their physical infrastructure. AI does this by sensing when something is outside the normal state-of-affairs, which enables it to…

Read More

Mastering the first step in security management: Get your facts right

Mastering the first step in security management: Get your facts right

Mastering the first step in security management: Get your facts right | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More
1 2