5 ways intelligence professionals support threat management

5 ways intelligence professionals support threat management

In today’s world, organizations operate in increasingly complex environments with potential threats to their executives, employees, facilities, supply chains, and other assets popping up at unprecedented rates. In 2024, countries across the globe experienced an increase in election-related unrest as dozens of nation-states went to the polls and some contended with unexpected electoral outcomes and sociopolitical tensions. These actions included mass protests in city centers and the temporary shutdowns of major airports and highways. Additionally,…

Read More

Enhance security posture: 4 key approaches to manage vulnerabilities

Enhance security posture: 4 key approaches to manage vulnerabilities

Cloud native application development is surging across businesses, along with the adoption of public cloud infrastructure and services. This progress has led to a growing set of challenges for security: as organizations expand their use of cloud native technologies, the complexity of these environments continues to grow, significantly increasing the attack surface. This added risk has not stopped the adoption but is making scaling and maintenance increasingly difficult, especially as teams have been moving more…

Read More

Cyber incident response in 2025: Rising risks and dynamic challenges

Cyber incident response in 2025: Rising risks and dynamic challenges

For organizations affected by cyber incidents, effective response strategies have become essential for reducing potential damage and restoring operations. An analysis of data breaches in 2024 revealed that while the number of data breaches only increased incrementally, the breaches were more severe in terms of the quantity of personally identifiable information (PII) that was exposed.  Incident response (IR) teams play a crucial role in identifying the scope of an incident, determining what data was compromised,…

Read More

A critical challenge: Understanding and addressing insider threats

A critical challenge: Understanding and addressing insider threats

In today’s hyper-connected world, insider threats have become one of the most pressing challenges for organizations. While external attacks like ransomware and hacking often dominate the headlines, insider threats posed by employees, contractors, or others with internal access are equally, if not more, dangerous. Whether arising from malice, negligence or coercion, insiders have unparalleled access to sensitive systems and data, making their actions potentially catastrophic. The critical insider security issues organizations face and the actionable…

Read More

Panelists to discuss difficult questions many leaders ask themselves

Panelists to discuss difficult questions many leaders ask themselves

Panelists at the “What Keeps Security Leaders Up at Night” panel will discuss what difficult security questions many leaders grapple with. How can security leaders make effective pitches to mitigate organizational security issues they see? Is risk tolerance changing for better or worse? How can security leaders ensure their voices are heard?  The panel discussion will take place in Washington, D.C. on November 18, 2024 as part of the SECURITY 500 Conference, a one-day security…

Read More

Understanding the security risks of outdated software

Understanding the security risks of outdated software

More than 1,000. That’s the average number of applications used by enterprises, according to a 2023 Salesforce report. While more software can help improve operations and streamline staff workloads, more apps can also introduce risk — especially if they’re outdated. This is a perfect storm for malicious actors: Increasing software usage makes it harder for businesses to know what they have and where it’s located while aging apps are harder to patch and protect. Here’s…

Read More

The deepfake dilemma: The importance of deepfake awareness training

The deepfake dilemma: The importance of deepfake awareness training

Enterprise security departments face a plethora of risks. One of the most significant threats that has emerged in recent years is that of deepfakes. These sophisticated artificial intelligence-powered manipulations of audio and video content seem rather innocuous on paper, but their creation and dissemination are exemplars of a broader large-scale organizational threat. As far as security departments are concerned, implementing a comprehensive deepfake awareness training program has become critical for forward-thinking executives managing enterprise risk…

Read More

Lessons from the Snowflake breach: SaaS security needs collaboration

Lessons from the Snowflake breach: SaaS security needs collaboration

The recent Snowflake attack is an important reminder that data remains king when it comes to cyberattacks, and identities are the gateway for threat actors to access this coveted information. While in the event of an attack, service providers typically take the brunt of the blame. In this case, Snowflake reflected that it was actually how the company’s customers — including major companies like Ticketmaster and Advanced Auto Parts — chose to leverage its SaaS…

Read More

How to transform the defender’s dilemma into the defender’s advantage

How to transform the defender’s dilemma into the defender’s advantage

The notion that cybersecurity defenders are at an inherent disadvantage — the so-called defender’s dilemma — is incorrect and counterproductive. Instead of focusing solely on how we respond to attackers’ tactics, we can identify and use the advantages inherent in our position as defenders. This article explains what a defender-oriented mindset entails and how it can help you strengthen your security program. What’s the defender’s dilemma? For many years, security professionals have used the “defender’s…

Read More

Unleashing the potential of investigative techniques

Unleashing the potential of investigative techniques

In the realm of executive protection, the necessity to expect and defuse potential threats is paramount. Whether tasked with safeguarding high-profile individuals, corporate leaders or dignitaries, professionals in this field must possess a versatile skill set that transcends mere physical security measures. Among the array of skills they carry, the skill to conduct thorough investigations emerges as a cornerstone in optimizing executive protection. Drawing inspiration from the realm of investigative work and armed with resources…

Read More
1 2 3 8