Inside The 2024 Security Benchmark Report

Inside The 2024 Security Benchmark Report

With The 2024 Security Benchmark Report, Security magazine builds upon the analysis of self-reported data from enterprise physical security leaders we have collected via the Security Benchmark Survey. In each report, we present data across the security industry as a whole in the main report, and we break the data down by sector in our sector reports. By collecting data on security budget, technology, new initiatives, training and threats with these surveys each year, security…

Read More

The 2024 Security Benchmark Report

The 2024 Security Benchmark Report

Security magazine is excited to present The 2024 Security Benchmark Report, an editorial initiative that collects self-reported data from enterprise security programs across the globe and a wide range of market sectors to determine trends in security roles, responsibilities, technology, training and budget. Our goal with The Security Benchmark Report is to provide a comparison of enterprise security programs across the security field and within market sectors. Each year we release the report, we aim to…

Read More

Generative AI poses several security risks

Generative AI poses several security risks

Generative artificial intelligence (GenAI) was analyzed in a recent report by Transmit. The report includes screenshots of dark web forums, marketplaces and subscription-based services.  According to the report, Blackhat Gen-AI tools make it easier to create and automate fraud campaigns, resulting in an increased volume, velocity and variety of attacks. GenAI tools automate pentesting to find enterprise vulnerabilities and circumvent security used by specific targets. Configuration (config) files, generated with the assistance of GenAI, are used for…

Read More

IT leaders stress the need for stronger risk management

IT leaders stress the need for stronger risk management

Risk management was analyzed in a recent report by AuditBoard. The study revealed that expanding expectations are coming at a time when internal audit has limited bandwidth for advisory-related services — and increasing risk demand and insufficient risk management capacity are creating a risk coverage gap for the business. The report looks at where internal audit teams are currently spending the majority of their time, and where adjustments could be made to help shift focus to value-added, risk-related activities. Key…

Read More

Unlocking digital trust: The power of collaboration in a data-driven world

Unlocking digital trust: The power of collaboration in a data-driven world

Digital trust has become the cornerstone of successful organizations in today’s data-driven and artificial intelligence-influenced world. Customers, partners and employees alike are increasingly basing their decisions on how much they trust an organization to oversee their information securely and responsibly. ISACA’s 2024 State of Digital Trust report underscores this reality, highlighting both the critical role of security and the need for enhanced collaboration across digital trust functions. The survey, which polled more than 5,870 ISACA…

Read More

Security's Women in Security 2024

Security's Women in Security 2024

Security magazine unveils the honorees of our 2024 Women in Security program which represents the highest caliber of security leadership, dedication and skill within the industry. This year, we celebrate nine extraordinary Women in Security who have shaped their organizations, the security field and the lives of their communities in numerous ways. Each year, we are honored and humbled by the number of security leaders who are accomplishing great things within their organizations and the…

Read More

Will decentralized identity unlock the future of identity protection?

Will decentralized identity unlock the future of identity protection?

All eyes have been on AI over the last few years and how it has impacted businesses’ daily operations — both positively and negatively. It goes without saying that it’s a challenging moment for those working in digital identity and security as technology is evolving at an unprecedented pace. AI-powered cyber threats and identity attacks are about to explode at rates never seen before. According to results from a recent survey, over 40% of businesses…

Read More

Risk management and mobile devices

Risk management and mobile devices

In this episode of The Security Podcasts featuring Jim Coyle, U.S. Public Sector Chief Technology Officer at Lookout, we discuss what organizations can do to manage mobile device risks. “A lot of the conversations that we have, most people are under the assumption that having a mobile device management — or some kind of management software on their mobile device — will stop all of these various different threats that we see today. Whether it’s…

Read More

Thriving in 2030: The future of compliance and risk management

Thriving in 2030: The future of compliance and risk management

In 2030, organizations of all sizes must expect the technology landscape to be dramatically different. As cloud-native applications take over, ephemeral technology will be a larger component of infrastructure, regulatory demands will increase and there will be a critical need for speed that many organizations are not currently prepared to meet. Understanding the future of compliance and risk management is essential for any organization aiming to thrive in the hyper-speed era ahead.  Prepare for evolving…

Read More

Security leaders are facing a new wave of identity risks

Security leaders are facing a new wave of identity risks

A study has found that increased technological and organizational complexity is contributing to new identity risks that security leaders must manage. The study, done by ConductorOne, surveyed more than 500 IT security leaders in the United States and found that increased complexity is driving new identity risks.  On the subject of technology complexity, the report found that hybrid IT environments are common. 76% of respondents reported that their company has a hybrid IT environment. 18%…

Read More
1 2 3 167