Healthcare can — and must — learn from 2024’s devastating cyberattacks

Healthcare can — and must — learn from 2024’s devastating cyberattacks

It was a rough year for cybersecurity in the healthcare industry. Providers remain opportune targets because of relatively limited security budgets, a vulnerability to downtime, valuable patient data, and insufficient monitoring of fast-scaling Internet of Medical Things (IoMT) devices and other network-connected equipment. Ideally, absorbing the lessons of these attacks enables healthcare delivery organizations to move faster: faster to implement sufficient protections that deter attacks with harder targets, and faster to respond when attacks do…

Read More

5 emerging cybersecurity trends to watch in 2025

5 emerging cybersecurity trends to watch in 2025

As we look ahead to 2025, the threat landscape continues to evolve. Increasingly sophisticated cyber threats and the emerging trend of collaboration amongst cybercriminals introduces new challenges that organizations around the world must address now. While many threat actors re-use their strategies, there are a handful of tactics that will be re-imaged in the coming year due to emerging technologies and trends. Below are the top five key cybersecurity trends and tactics that are anticipated…

Read More

Multi-Site Mastery: Strategies for Effective Risk Assessments

Multi-Site Mastery: Strategies for Effective Risk Assessments

In this episode of The Security Podcasts we sit down with Mark Landry, National Accounts Director at AMAROK, to discuss navigating multi-site risk assessment effectively. “In order to approach your risk assessment, especially when you’ve got vast or disparate geographies – meaning you’ve got a location in Portland, Maine and location in Portland, Oregon – you have to be able to accurately convey the risk across both of those locations that have very different risk…

Read More

Proving physical security value across an organization

Proving physical security value across an organization

In this episode of The Security Podcasts we sit down with Thomasina Martin, a Key Account Manager specializing in Energy and Utilities at Genetec, Inc., to talk about proving the value of physical security across an organization. “One of the primary challenges I think a lot of us see, I think it’s universal in the security industry when trying to secure a budget, is that physical security often competes with other critical business units or…

Read More

Learning from leaders across sectors

Learning from leaders across sectors

From implementing effective emergency preparedness to navigating today’s cyber landscape, the role of the enterprise security leader requires a continual education to be apprised of best practices and ensure program success from the top down. In addition to networking, leaders in the security industry can benefit from lessons learned by their peers in a variety of sectors and the security field as whole. In Security magazine’s monthly Solutions by Sector live webinar series, an editorial…

Read More

47% of Organizations Have Dealt With Deepfake Attacks

47% of Organizations Have Dealt With Deepfake Attacks

According to a recent iProov report, the risk of deepfakes is rising with almost half of organizations (47%) having encountered a deepfake and three-quarters of them (70%) believing deepfake attacks which are created using generative AI tools, will have a high impact on their organizations. Sixty-eight percent believe that while it’s impactful at creating cybersecurity threats, more (84%) find it’s instrumental in protecting against them.  While organizations recognize the increased efficiencies that AI can bring,…

Read More

Recognizing National Cybersecurity Awareness Month in 2024

Recognizing National Cybersecurity Awareness Month in 2024

October is National Cybersecurity Awareness Month. Throughout this month, cyber issue awareness is promoted to educate individuals and organizations on the importance of cybersecurity.  This year has seen notable cyber threats, making cyber awareness and preparedness essential. Here, cyber leaders share their thoughts on cybersecurity and the threat landscape.  National Cybersecurity Awareness Month: Security leaders discuss  Karl Holmqvist, Founder and CEO at Lastwall:  “We stand at a pivotal moment in cybersecurity, where we must confront…

Read More

Combating cyber threats with zero trust and supply chain security

Combating cyber threats with zero trust and supply chain security

The cyber threat landscape is growing more complex and challenging to contend with, exacerbated by advancements in artificial intelligence and increasingly sophisticated cyber criminals. The volume and severity of attacks are increasing in tandem; Keeper Security’s 2024 Insight Report revealed that 92% of IT security leaders have seen an increase in cyber attacks year-over-year.  Among the most pervasive threats to enterprises today are software supply chain attacks. The 2024 Verizon Data Breach Investigations Report revealed…

Read More

Balancing Risk and Innovation – A CISO Perspective

Balancing Risk and Innovation – A CISO Perspective

In this episode of The Security Podcasts featuring Jill Knesek, CISO of Blackline, and former FBI Special Agent in the Cyber Crime Squad, we talk about balancing risk & innovation from a CISO’s perspective. “The message I like to give is we can be both innovative and secure.,” Knesek says. “They’re not mutually exclusive, and they shouldn’t be. By shifting left and embedding strong security practices and controls earlier into our development lifecycle, we can…

Read More

Researchers discovered a new phishing kit on the dark web

Researchers discovered a new phishing kit on the dark web

Researchers at SlashNext discovered a new phishing kit on the dark web. This phishing kit, known as FishXProxy Phishing Kit, starts with uniquely generated links that can evade initial suspicion. Cybercriminals on underground forums are advertising this kit as “The Ultimate Powerful Phishing Toolkit” due to the sophisticated tools it provides. Capabilities this phishing kit provides includes: Sophisticated antibot systems that utilize Cloudfare’s CAPTCHA and filter out security measures Redirection abilities that obscure intended destinations Page…

Read More
1 2 3 6