Advanced security strategies in high-threat environments

Advanced security strategies in high-threat environments

In an increasingly dangerous era of global instability with evolving threats, crisis planning and mitigation is crucial, particularly for government facilities in higher threat locations of the world. Over the years there have been many tragic attacks — and possibly hundreds more unseen attack plots and attempts — on United States government properties that support the U.S. diplomatic mission. The need for comprehensive security strategies will never cease as we navigate complex and volatile environments….

Read More

Mitigating the hidden risks of AI in security and SOCs

Mitigating the hidden risks of AI in security and SOCs

AI is transforming both Security Operations Centers (SOCs) and security as a whole. Yet with new opportunities come new risks. One of the biggest challenges in security today is how to manage AI’s inherent unpredictability, especially for complex tasks. In this article, we’ll take a closer look at the specific hurdles of using AI in security (specifically in your SOC), and how a modular, focused approach can mitigate these risks.   The challenge of AI…

Read More

5 ways intelligence professionals support threat management

5 ways intelligence professionals support threat management

In today’s world, organizations operate in increasingly complex environments with potential threats to their executives, employees, facilities, supply chains, and other assets popping up at unprecedented rates. In 2024, countries across the globe experienced an increase in election-related unrest as dozens of nation-states went to the polls and some contended with unexpected electoral outcomes and sociopolitical tensions. These actions included mass protests in city centers and the temporary shutdowns of major airports and highways. Additionally,…

Read More

Enhance security posture: 4 key approaches to manage vulnerabilities

Enhance security posture: 4 key approaches to manage vulnerabilities

Cloud native application development is surging across businesses, along with the adoption of public cloud infrastructure and services. This progress has led to a growing set of challenges for security: as organizations expand their use of cloud native technologies, the complexity of these environments continues to grow, significantly increasing the attack surface. This added risk has not stopped the adoption but is making scaling and maintenance increasingly difficult, especially as teams have been moving more…

Read More

Cyber incident response in 2025: Rising risks and dynamic challenges

Cyber incident response in 2025: Rising risks and dynamic challenges

For organizations affected by cyber incidents, effective response strategies have become essential for reducing potential damage and restoring operations. An analysis of data breaches in 2024 revealed that while the number of data breaches only increased incrementally, the breaches were more severe in terms of the quantity of personally identifiable information (PII) that was exposed.  Incident response (IR) teams play a crucial role in identifying the scope of an incident, determining what data was compromised,…

Read More

A critical challenge: Understanding and addressing insider threats

A critical challenge: Understanding and addressing insider threats

In today’s hyper-connected world, insider threats have become one of the most pressing challenges for organizations. While external attacks like ransomware and hacking often dominate the headlines, insider threats posed by employees, contractors, or others with internal access are equally, if not more, dangerous. Whether arising from malice, negligence or coercion, insiders have unparalleled access to sensitive systems and data, making their actions potentially catastrophic. The critical insider security issues organizations face and the actionable…

Read More

Panelists to discuss difficult questions many leaders ask themselves

Panelists to discuss difficult questions many leaders ask themselves

Panelists at the “What Keeps Security Leaders Up at Night” panel will discuss what difficult security questions many leaders grapple with. How can security leaders make effective pitches to mitigate organizational security issues they see? Is risk tolerance changing for better or worse? How can security leaders ensure their voices are heard?  The panel discussion will take place in Washington, D.C. on November 18, 2024 as part of the SECURITY 500 Conference, a one-day security…

Read More

Understanding the security risks of outdated software

Understanding the security risks of outdated software

More than 1,000. That’s the average number of applications used by enterprises, according to a 2023 Salesforce report. While more software can help improve operations and streamline staff workloads, more apps can also introduce risk — especially if they’re outdated. This is a perfect storm for malicious actors: Increasing software usage makes it harder for businesses to know what they have and where it’s located while aging apps are harder to patch and protect. Here’s…

Read More

The deepfake dilemma: The importance of deepfake awareness training

The deepfake dilemma: The importance of deepfake awareness training

Enterprise security departments face a plethora of risks. One of the most significant threats that has emerged in recent years is that of deepfakes. These sophisticated artificial intelligence-powered manipulations of audio and video content seem rather innocuous on paper, but their creation and dissemination are exemplars of a broader large-scale organizational threat. As far as security departments are concerned, implementing a comprehensive deepfake awareness training program has become critical for forward-thinking executives managing enterprise risk…

Read More

Lessons from the Snowflake breach: SaaS security needs collaboration

Lessons from the Snowflake breach: SaaS security needs collaboration

The recent Snowflake attack is an important reminder that data remains king when it comes to cyberattacks, and identities are the gateway for threat actors to access this coveted information. While in the event of an attack, service providers typically take the brunt of the blame. In this case, Snowflake reflected that it was actually how the company’s customers — including major companies like Ticketmaster and Advanced Auto Parts — chose to leverage its SaaS…

Read More
1 2 3 8