Panelists to discuss difficult questions many leaders ask themselves

Panelists to discuss difficult questions many leaders ask themselves

Panelists at the “What Keeps Security Leaders Up at Night” panel will discuss what difficult security questions many leaders grapple with. How can security leaders make effective pitches to mitigate organizational security issues they see? Is risk tolerance changing for better or worse? How can security leaders ensure their voices are heard?  The panel discussion will take place in Washington, D.C. on November 18, 2024 as part of the SECURITY 500 Conference, a one-day security…

Read More

Understanding the security risks of outdated software

Understanding the security risks of outdated software

More than 1,000. That’s the average number of applications used by enterprises, according to a 2023 Salesforce report. While more software can help improve operations and streamline staff workloads, more apps can also introduce risk — especially if they’re outdated. This is a perfect storm for malicious actors: Increasing software usage makes it harder for businesses to know what they have and where it’s located while aging apps are harder to patch and protect. Here’s…

Read More

The deepfake dilemma: The importance of deepfake awareness training

The deepfake dilemma: The importance of deepfake awareness training

Enterprise security departments face a plethora of risks. One of the most significant threats that has emerged in recent years is that of deepfakes. These sophisticated artificial intelligence-powered manipulations of audio and video content seem rather innocuous on paper, but their creation and dissemination are exemplars of a broader large-scale organizational threat. As far as security departments are concerned, implementing a comprehensive deepfake awareness training program has become critical for forward-thinking executives managing enterprise risk…

Read More

Lessons from the Snowflake breach: SaaS security needs collaboration

Lessons from the Snowflake breach: SaaS security needs collaboration

The recent Snowflake attack is an important reminder that data remains king when it comes to cyberattacks, and identities are the gateway for threat actors to access this coveted information. While in the event of an attack, service providers typically take the brunt of the blame. In this case, Snowflake reflected that it was actually how the company’s customers — including major companies like Ticketmaster and Advanced Auto Parts — chose to leverage its SaaS…

Read More

How to transform the defender’s dilemma into the defender’s advantage

How to transform the defender’s dilemma into the defender’s advantage

The notion that cybersecurity defenders are at an inherent disadvantage — the so-called defender’s dilemma — is incorrect and counterproductive. Instead of focusing solely on how we respond to attackers’ tactics, we can identify and use the advantages inherent in our position as defenders. This article explains what a defender-oriented mindset entails and how it can help you strengthen your security program. What’s the defender’s dilemma? For many years, security professionals have used the “defender’s…

Read More

Unleashing the potential of investigative techniques

Unleashing the potential of investigative techniques

In the realm of executive protection, the necessity to expect and defuse potential threats is paramount. Whether tasked with safeguarding high-profile individuals, corporate leaders or dignitaries, professionals in this field must possess a versatile skill set that transcends mere physical security measures. Among the array of skills they carry, the skill to conduct thorough investigations emerges as a cornerstone in optimizing executive protection. Drawing inspiration from the realm of investigative work and armed with resources…

Read More

Ava Turner Leone | Women in Security 2024

Ava Turner Leone | Women in Security 2024

Thriving in security When Ava Turner Leone first entered the workforce as an officer manager for an import customs brokerage firm, she couldn’t have imagined where her career would take her over the next 26 years. “Early on my career really was happenstance, it was completely kind of unplanned in terms of what direction that I was going, I didn’t know what I wanted to do or where I was headed,” Turner Leone says. Her…

Read More

Understand candidate screening data sources

Understand candidate screening data sources

Recent high-profile events in the United Kingdom have brought vividly to life the critical importance of organizations thoroughly checking candidate credentials before making a hire. They range from the abduction, rape and murder of Sarah Everard by an off-duty Metropolitan Police officer to the disturbing vetting scandal which saw an investigative reporter managing to infiltrate the U.K. prison service. What’s really frightening is that these incidents are likely to be just the tip of a…

Read More

Challenges and opportunities that AI presents CISOs

Challenges and opportunities that AI presents CISOs

The artificial intelligence (AI) landscape is constantly shifting. To maintain pace with these evolving technologies, CISOs must prepare for additional complexity in their security strategies.  While AI presents a challenge for CISOs, it also offers an opportunity. Here, we talk with Jadee Hanson, Chief Information Security Officer at Vanta to discuss the risks and benefits of AI.  Security magazine: Tell us about your title and background. Hanson: I serve as Chief Information Security Officer at…

Read More

Unveiling common ransomware attack methods to secure your organization

Unveiling common ransomware attack methods to secure your organization

With ransomware payments hitting a record $1.1 billion last year, it’s no wonder why it’s top of mind for most business leaders. Instead of wondering whether or not they’ll be hit with a ransomware attack, leaders need to be building a strategy for what to do when an attack is attempted on their business. The question isn’t “Will I get hit with ransomware?” it is “What will I do when it happens?” For years, the…

Read More
1 2 3 8