Cyber incident response in 2025: Rising risks and dynamic challenges

Cyber incident response in 2025: Rising risks and dynamic challenges

For organizations affected by cyber incidents, effective response strategies have become essential for reducing potential damage and restoring operations. An analysis of data breaches in 2024 revealed that while the number of data breaches only increased incrementally, the breaches were more severe in terms of the quantity of personally identifiable information (PII) that was exposed.  Incident response (IR) teams play a crucial role in identifying the scope of an incident, determining what data was compromised,…

Read More

A critical challenge: Understanding and addressing insider threats

A critical challenge: Understanding and addressing insider threats

In today’s hyper-connected world, insider threats have become one of the most pressing challenges for organizations. While external attacks like ransomware and hacking often dominate the headlines, insider threats posed by employees, contractors, or others with internal access are equally, if not more, dangerous. Whether arising from malice, negligence or coercion, insiders have unparalleled access to sensitive systems and data, making their actions potentially catastrophic. The critical insider security issues organizations face and the actionable…

Read More

Panelists to discuss difficult questions many leaders ask themselves

Panelists to discuss difficult questions many leaders ask themselves

Panelists at the “What Keeps Security Leaders Up at Night” panel will discuss what difficult security questions many leaders grapple with. How can security leaders make effective pitches to mitigate organizational security issues they see? Is risk tolerance changing for better or worse? How can security leaders ensure their voices are heard?  The panel discussion will take place in Washington, D.C. on November 18, 2024 as part of the SECURITY 500 Conference, a one-day security…

Read More

Understanding the security risks of outdated software

Understanding the security risks of outdated software

More than 1,000. That’s the average number of applications used by enterprises, according to a 2023 Salesforce report. While more software can help improve operations and streamline staff workloads, more apps can also introduce risk — especially if they’re outdated. This is a perfect storm for malicious actors: Increasing software usage makes it harder for businesses to know what they have and where it’s located while aging apps are harder to patch and protect. Here’s…

Read More

The deepfake dilemma: The importance of deepfake awareness training

The deepfake dilemma: The importance of deepfake awareness training

Enterprise security departments face a plethora of risks. One of the most significant threats that has emerged in recent years is that of deepfakes. These sophisticated artificial intelligence-powered manipulations of audio and video content seem rather innocuous on paper, but their creation and dissemination are exemplars of a broader large-scale organizational threat. As far as security departments are concerned, implementing a comprehensive deepfake awareness training program has become critical for forward-thinking executives managing enterprise risk…

Read More

Lessons from the Snowflake breach: SaaS security needs collaboration

Lessons from the Snowflake breach: SaaS security needs collaboration

The recent Snowflake attack is an important reminder that data remains king when it comes to cyberattacks, and identities are the gateway for threat actors to access this coveted information. While in the event of an attack, service providers typically take the brunt of the blame. In this case, Snowflake reflected that it was actually how the company’s customers — including major companies like Ticketmaster and Advanced Auto Parts — chose to leverage its SaaS…

Read More

How to transform the defender’s dilemma into the defender’s advantage

How to transform the defender’s dilemma into the defender’s advantage

The notion that cybersecurity defenders are at an inherent disadvantage — the so-called defender’s dilemma — is incorrect and counterproductive. Instead of focusing solely on how we respond to attackers’ tactics, we can identify and use the advantages inherent in our position as defenders. This article explains what a defender-oriented mindset entails and how it can help you strengthen your security program. What’s the defender’s dilemma? For many years, security professionals have used the “defender’s…

Read More

Unleashing the potential of investigative techniques

Unleashing the potential of investigative techniques

In the realm of executive protection, the necessity to expect and defuse potential threats is paramount. Whether tasked with safeguarding high-profile individuals, corporate leaders or dignitaries, professionals in this field must possess a versatile skill set that transcends mere physical security measures. Among the array of skills they carry, the skill to conduct thorough investigations emerges as a cornerstone in optimizing executive protection. Drawing inspiration from the realm of investigative work and armed with resources…

Read More

Ava Turner Leone | Women in Security 2024

Ava Turner Leone | Women in Security 2024

Thriving in security When Ava Turner Leone first entered the workforce as an officer manager for an import customs brokerage firm, she couldn’t have imagined where her career would take her over the next 26 years. “Early on my career really was happenstance, it was completely kind of unplanned in terms of what direction that I was going, I didn’t know what I wanted to do or where I was headed,” Turner Leone says. Her…

Read More

Understand candidate screening data sources

Understand candidate screening data sources

Recent high-profile events in the United Kingdom have brought vividly to life the critical importance of organizations thoroughly checking candidate credentials before making a hire. They range from the abduction, rape and murder of Sarah Everard by an off-duty Metropolitan Police officer to the disturbing vetting scandal which saw an investigative reporter managing to infiltrate the U.K. prison service. What’s really frightening is that these incidents are likely to be just the tip of a…

Read More
1 2 3 8