Thriving in 2030: The future of compliance and risk management

Thriving in 2030: The future of compliance and risk management

In 2030, organizations of all sizes must expect the technology landscape to be dramatically different. As cloud-native applications take over, ephemeral technology will be a larger component of infrastructure, regulatory demands will increase and there will be a critical need for speed that many organizations are not currently prepared to meet. Understanding the future of compliance and risk management is essential for any organization aiming to thrive in the hyper-speed era ahead.  Prepare for evolving…

Read More

Security leaders are facing a new wave of identity risks

Security leaders are facing a new wave of identity risks

A study has found that increased technological and organizational complexity is contributing to new identity risks that security leaders must manage. The study, done by ConductorOne, surveyed more than 500 IT security leaders in the United States and found that increased complexity is driving new identity risks.  On the subject of technology complexity, the report found that hybrid IT environments are common. 76% of respondents reported that their company has a hybrid IT environment. 18%…

Read More

Insider risk: Don't ignore the community context

Insider risk: Don't ignore the community context

Just a few months ago, many security professionals confessed concern about a potential economic downturn and how that would impact the security environment around them. Some were troubled about possible layoffs at their company, and others mentioned rising crime rates. All of them discussed how either could affect insider risk within their organization. Yet, as this is being written, things are a bit sunnier — inflation and crime are down significantly. Understanding the local context…

Read More

AI Deepfakes Rising as Risk for APAC Organisations

AI Deepfakes Rising as Risk for APAC Organisations

AI deepfakes were not on the risk radar of organisations just a short time ago, but in 2024, they are rising up the ranks. With AI deepfakes’ potential to cause anything from a share price tumble to a loss of brand trust through misinformation, they are likely to feature as a risk for some time. Robert Huber, chief security officer and head of research at cyber security firm Tenable, argued in an interview with TechRepublic…

Read More

From gates, guns & guards to encryption, endpoints & erasure

From gates, guns & guards to encryption, endpoints & erasure

Protecting intellectual property remains a concern for all organizations, even as new threats continue to emerge. Whether it’s a military unit establishing a base of operations in denied territory or a business undergoing a considerable liquidity event, the first order of protection is typically establishing “gates.” These walls and physical barriers help protect individuals and their teammates/employees in locations where they lay their heads at night. Most businesses open to the public have Wi-Fi available…

Read More

NIST Cybersecurity Framework: A Cheat Sheet for Professionals

NIST Cybersecurity Framework: A Cheat Sheet for Professionals

The National Institute of Standards and Technology has updated its Cybersecurity Framework for 2024. Version 2.0 of the NIST CSF, the first major update since the framework was released a decade ago, was created with the goal of expanding the primary audience from critical infrastructure to all organizations. In general, the NIST CSF aims to standardize practices to ensure uniform protection of all U.S. cyber assets. TechRepublic’s cheat sheet about the NIST CSF is an…

Read More

Security's Top Cybersecurity Leaders 2024

Security's Top Cybersecurity Leaders 2024

Security magazine presents the honorees of our fourth annual Top Cybersecurity Leaders program, which recognizes enterprise information security executives and professionals and their industry accomplishments. This year’s nominees represent the wide range of cybersecurity professionals making a difference across the field and in their organizations. Our 2024 awardees lead by example and improve security through innovative approaches to risk and technology. The goal of the Top Cybersecurity Leaders program is to spotlight cybersecurity professionals who…

Read More

Holding Steady in Unstable Times: 4 Ways to Build Resilience in a Rocky Geopolitical Climate

Holding Steady in Unstable Times: 4 Ways to Build Resilience in a Rocky Geopolitical Climate

Geopolitical instability is everywhere—from the war in Ukraine to the Israel-Hamas war to mounting pre-election tensions in the U.S. And it’s affecting everything. From unpredictable international supply chains to spikes in local gas prices, organizational leaders are battling the consequences of global conflict daily. If it feels like you’re holding your breath for the next unprecedented upset, you’re not alone. In 2023, the escalation of geopolitical risk was identified as one of the top three…

Read More

Investing in Your Company’s Physical Risk Resilience

Investing in Your Company’s Physical Risk Resilience

While cyber incidents are already a top concern for most business leaders, organizations are simultaneously facing a dramatic uptick in physical incidents that have the potential to impact their people and operations. Leaders in risk, security, and business continuity know all too well that these threats, such as extreme weather events and infrastructure failures, continue to become more frequent and interconnected. Recent research shows that C-level leaders are also beginning to understand these risks, but…

Read More

3 steps to a comprehensive security threat assessment

3 steps to a comprehensive security threat assessment

When there’s an internal or external event on the horizon, physical security is crucial. The best strategy is to conduct a comprehensive physical security threat assessment well before the event to evaluate the threats that face the enterprise and develop contingency plans to secure the organization before, during and after events. “It’s better to have a plan in place that has been created in a non-stressful situation,” says Jack Leskovar, Director of Security and Risk…

Read More
1 2 3 4 168