Insider risk: Don't ignore the community context

Insider risk: Don't ignore the community context

Just a few months ago, many security professionals confessed concern about a potential economic downturn and how that would impact the security environment around them. Some were troubled about possible layoffs at their company, and others mentioned rising crime rates. All of them discussed how either could affect insider risk within their organization. Yet, as this is being written, things are a bit sunnier — inflation and crime are down significantly. Understanding the local context…

Read More

AI Deepfakes Rising as Risk for APAC Organisations

AI Deepfakes Rising as Risk for APAC Organisations

AI deepfakes were not on the risk radar of organisations just a short time ago, but in 2024, they are rising up the ranks. With AI deepfakes’ potential to cause anything from a share price tumble to a loss of brand trust through misinformation, they are likely to feature as a risk for some time. Robert Huber, chief security officer and head of research at cyber security firm Tenable, argued in an interview with TechRepublic…

Read More

From gates, guns & guards to encryption, endpoints & erasure

From gates, guns & guards to encryption, endpoints & erasure

Protecting intellectual property remains a concern for all organizations, even as new threats continue to emerge. Whether it’s a military unit establishing a base of operations in denied territory or a business undergoing a considerable liquidity event, the first order of protection is typically establishing “gates.” These walls and physical barriers help protect individuals and their teammates/employees in locations where they lay their heads at night. Most businesses open to the public have Wi-Fi available…

Read More

NIST Cybersecurity Framework: A Cheat Sheet for Professionals

NIST Cybersecurity Framework: A Cheat Sheet for Professionals

The National Institute of Standards and Technology has updated its Cybersecurity Framework for 2024. Version 2.0 of the NIST CSF, the first major update since the framework was released a decade ago, was created with the goal of expanding the primary audience from critical infrastructure to all organizations. In general, the NIST CSF aims to standardize practices to ensure uniform protection of all U.S. cyber assets. TechRepublic’s cheat sheet about the NIST CSF is an…

Read More

Security's Top Cybersecurity Leaders 2024

Security's Top Cybersecurity Leaders 2024

Security magazine presents the honorees of our fourth annual Top Cybersecurity Leaders program, which recognizes enterprise information security executives and professionals and their industry accomplishments. This year’s nominees represent the wide range of cybersecurity professionals making a difference across the field and in their organizations. Our 2024 awardees lead by example and improve security through innovative approaches to risk and technology. The goal of the Top Cybersecurity Leaders program is to spotlight cybersecurity professionals who…

Read More

Holding Steady in Unstable Times: 4 Ways to Build Resilience in a Rocky Geopolitical Climate

Holding Steady in Unstable Times: 4 Ways to Build Resilience in a Rocky Geopolitical Climate

Geopolitical instability is everywhere—from the war in Ukraine to the Israel-Hamas war to mounting pre-election tensions in the U.S. And it’s affecting everything. From unpredictable international supply chains to spikes in local gas prices, organizational leaders are battling the consequences of global conflict daily. If it feels like you’re holding your breath for the next unprecedented upset, you’re not alone. In 2023, the escalation of geopolitical risk was identified as one of the top three…

Read More

Investing in Your Company’s Physical Risk Resilience

Investing in Your Company’s Physical Risk Resilience

While cyber incidents are already a top concern for most business leaders, organizations are simultaneously facing a dramatic uptick in physical incidents that have the potential to impact their people and operations. Leaders in risk, security, and business continuity know all too well that these threats, such as extreme weather events and infrastructure failures, continue to become more frequent and interconnected. Recent research shows that C-level leaders are also beginning to understand these risks, but…

Read More

3 steps to a comprehensive security threat assessment

3 steps to a comprehensive security threat assessment

When there’s an internal or external event on the horizon, physical security is crucial. The best strategy is to conduct a comprehensive physical security threat assessment well before the event to evaluate the threats that face the enterprise and develop contingency plans to secure the organization before, during and after events. “It’s better to have a plan in place that has been created in a non-stressful situation,” says Jack Leskovar, Director of Security and Risk…

Read More

Ensure service account security is top priority this holiday season

Ensure service account security is top priority this holiday season

Security teams have long been aware of the risks associated with service accounts and how they can constitute a major threat to businesses. Although businesses are aware of the risks associated with service accounts, protecting them from malicious actors has not been a priority until recently. As we know from years past, the holiday season is a popular time of year for threat actors to try new tricks to break into an organization’s network. Now…

Read More

Today’s SIEM data challenges require data decoupling

Today’s SIEM data challenges require data decoupling

Today’s SIEM data challenges require data decoupling | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 2 3 166