Cyber incident response in 2025: Rising risks and dynamic challenges

Cyber incident response in 2025: Rising risks and dynamic challenges

For organizations affected by cyber incidents, effective response strategies have become essential for reducing potential damage and restoring operations. An analysis of data breaches in 2024 revealed that while the number of data breaches only increased incrementally, the breaches were more severe in terms of the quantity of personally identifiable information (PII) that was exposed.  Incident response (IR) teams play a crucial role in identifying the scope of an incident, determining what data was compromised,…

Read More

6 tips to ace security posture in higher education

6 tips to ace security posture in higher education

Following the recent PowerSchool breach, it’s never been clearer that education institutions, just like any business or organization, need to pay careful attention to their cybersecurity posture and that of the third parties they work with. But PowerSchool isn’t the only major incident that has brought this issue to the forefront. In fact, just this past year, institutions like Texas Tech, New Mexico Highlands University, and New Jersey City University have all fallen victim to…

Read More

Application security and risk management in financial organizations

Application security and risk management in financial organizations

Financial services companies (finservs) are under pressure to deliver secure software faster like never before. Customer expectations are at an all-time high and consumers are hungry for new capabilities and experiences. In many cases, startups are outpacing large financial institutions in this area due to their ability to innovate rapidly using cutting-edge technologies. Additionally, the challenge of keeping up with security and compliance is intensifying. The regulatory landscape is ever-evolving, with new requirements popping up…

Read More

What Boards Need To Know On Digital And Cybersecurity Governance In 2025

What Boards Need To Know On Digital And Cybersecurity Governance In 2025

Will digital governance move backwards in 2025? Photo by Hulton Archive/Getty Images. Getty Images The year 2024 was a relatively big year in digital, cybersecurity and systemic risk governance, if you knew where to look. While the growing pains of implementing new SEC cybersecurity disclosure rules and U.S. Senator Ron Wyden calling out the UnitedHealth Group (NYSE:UNH) CEO and board for their colossal cybersecurity failure made headlines, there was not a singular event that can…

Read More

Inside The 2024 Security Benchmark Report

Inside The 2024 Security Benchmark Report

With The 2024 Security Benchmark Report, Security magazine builds upon the analysis of self-reported data from enterprise physical security leaders we have collected via the Security Benchmark Survey. In each report, we present data across the security industry as a whole in the main report, and we break the data down by sector in our sector reports. By collecting data on security budget, technology, new initiatives, training and threats with these surveys each year, security…

Read More

The 2024 Security Benchmark Report

The 2024 Security Benchmark Report

Security magazine is excited to present The 2024 Security Benchmark Report, an editorial initiative that collects self-reported data from enterprise security programs across the globe and a wide range of market sectors to determine trends in security roles, responsibilities, technology, training and budget. Our goal with The Security Benchmark Report is to provide a comparison of enterprise security programs across the security field and within market sectors. Each year we release the report, we aim to…

Read More

Generative AI poses several security risks

Generative AI poses several security risks

Generative artificial intelligence (GenAI) was analyzed in a recent report by Transmit. The report includes screenshots of dark web forums, marketplaces and subscription-based services.  According to the report, Blackhat Gen-AI tools make it easier to create and automate fraud campaigns, resulting in an increased volume, velocity and variety of attacks. GenAI tools automate pentesting to find enterprise vulnerabilities and circumvent security used by specific targets. Configuration (config) files, generated with the assistance of GenAI, are used for…

Read More

IT leaders stress the need for stronger risk management

IT leaders stress the need for stronger risk management

Risk management was analyzed in a recent report by AuditBoard. The study revealed that expanding expectations are coming at a time when internal audit has limited bandwidth for advisory-related services — and increasing risk demand and insufficient risk management capacity are creating a risk coverage gap for the business. The report looks at where internal audit teams are currently spending the majority of their time, and where adjustments could be made to help shift focus to value-added, risk-related activities. Key…

Read More

Unlocking digital trust: The power of collaboration in a data-driven world

Unlocking digital trust: The power of collaboration in a data-driven world

Digital trust has become the cornerstone of successful organizations in today’s data-driven and artificial intelligence-influenced world. Customers, partners and employees alike are increasingly basing their decisions on how much they trust an organization to oversee their information securely and responsibly. ISACA’s 2024 State of Digital Trust report underscores this reality, highlighting both the critical role of security and the need for enhanced collaboration across digital trust functions. The survey, which polled more than 5,870 ISACA…

Read More

Security's Women in Security 2024

Security's Women in Security 2024

Security magazine unveils the honorees of our 2024 Women in Security program which represents the highest caliber of security leadership, dedication and skill within the industry. This year, we celebrate nine extraordinary Women in Security who have shaped their organizations, the security field and the lives of their communities in numerous ways. Each year, we are honored and humbled by the number of security leaders who are accomplishing great things within their organizations and the…

Read More
1 2 3 168