Security Magazine
-
Leveraging device intelligence to outsmart evolving bot threats
Nearly half of all online traffic isn’t human. These automated threats can bypass traditional security measures, compromising data integrity and straining network resources.
-
Video analytics capabilities drive new opportunities
Organizations are deploying more cameras than ever, increasing the amount of available footage to help security teams address incidents.
-
Breaking bad: How bad actors can corrupt the morals of generative AI
It’s now a fairly well-known and accepted fact that artificial intelligence (AI)-generated synthetic media can blur the lines between fact and fiction.
-
45% of cybersecurity leaders are stressed about budget restraints
The stress of cybersecurity professionals was analyzed in a report finding that 38% of organizations are experiencing increased cybersecurity attacks.
-
Balancing cost and protection: Budgeting physical security programs
Budgeting for physical security programs is a strategic balancing act between maximizing the safety of people and assets while keeping costs down and ensuring a good ROI on the program’s budget spend.
-
CISA releases threat response guide for K-12 schools
The CISA has released a new resource to assist K-12 schools establish tailored approaches to threat management.
-
10% of IT professionals have zero visibility measures
A report found that 44% of IT security professionals rely on manual logging for service account visibility, while 10% admit to no visibility measures at all.
-
The deepfake dilemma: The importance of deepfake awareness training
Enterprise security departments face a plethora of risks. One of the most significant threats that has emerged in recent years is that of deepfakes.
-
How to build an effective security team
An efficient security team is a key pillar to any organization's security posture.
-
Security leaders discuss INC ransomware attacks targeting healthcare
Ransomware group Vanilla Tempest, formerly known as DEV-0832, is reportedly targeting healthcare providers in the United States.
-
90% of U.S. companies admit to using AI in some capacity
The use of artificial intelligence (AI) by information technology (IT) professionals in the U.S. was analyzed in a recent report by GetApp.
-
Zero trust: A business imperative for the digital age
What leaders should understand is that the zero trust approach is more than just an IT project. It is a business imperative.
-
58% of organizations have experienced document-based identity fraud
Survey data shows a significant rise in the prevalence of video deepfakes, with a 20% increase in companies reporting incidents compared to 2022.
-
Recognizing National Cybersecurity Awareness Month in 2024
During National Cybersecurity Awareness Month, cybersecurity experts are reflecting on prominent threats and how they can be mitigated.
-
The top challenges CISOs face in identity security
Securitytalks with Alex Bovee about the difficulties CISOs are facing with the modern identity security landscape.
-
How to prepare for the evolution of threats surrounding major events
As we move on from the Paris Olympics, it is important for organizations to assess their preparedness for such events and plan to be even more resilient in the future.
-
Facebook retains consumer data for 180 days post account deletion
A study found that Meta (Facebook, Instagram and Facebook Messenger), YouTube and Discord keep users’ data for 180 days after they have deleted their accounts.
-
Modernizing patch management in an evolving IT security landscape
Today’s IT security landscape is more complex than ever before, and will only continue to evolve.
-
Maximizing business benefits with robust hybrid cloud security
The evolution of containers and hybrid cloud technologies have brought significant benefits to the enterprise.
-
Precious metals in the crime crosshairs: Trends and protection
By taking the same steps they would with other valuable items, organizations can protect precious metals and avoid becoming a victim.
-
Zero trust: The next evolution in cybersecurity
Traditional perimeter-based security models are no longer sufficient in this environment, leading to the adoption of a more comprehensive security framework: zero trust.
-
Proper crisis management is a cornerstone of business continuity
The true test of crisis management is not just how an organization responds to a crisis, but how it emerges from it.
-
Integrated security: AI is a cost-effective path to safer schools
A layered security approach that utilizes emerging technology can serve as a force multiplier for school security personnel.
-
60% of vulnerabilities were leveraged against Microsoft Exchange
A recent threat report reveals that a minimum of 14 million patients in the U.S. have fallen victim to malware breaches in this sector.
-
Combating cyber threats with zero trust and supply chain security
The cyber threat landscape is growing more complex and challenging to contend with, exacerbated by advancements in artificial intelligence and increasingly sophisticated cyber criminals.