Security Magazine
-
Cybersecurity lessons from the red team: How to prevent a data breach
Default security configurations, weak passwords and human error are the top vectors for cyberattackers targeting enterprise networks. Penetration testers share how to avoid these cyber risks.
-
Data security, surveillance practices to be examined by FTC
The Federal Trade Commission will be exploring rules to crack down on lax data security and harmful commercial surveillance.
-
How to protect cybersecurity budgets
For chief information security officers (CISOs) and their organizations, the question is not if the cybersecurity budget should be cut. It's how much risk they are willing to take.
-
Why it pays to be an early adopter of cybersecurity technology
Chief information security officers (CISOs) must be early adopters and explore emerging cyber technology if they hope to keep ahead of cybercriminals.
-
Maine launches 988 emergency call service
Maine has begun implementing a 988 mental health crisis response line with support from Mission Critical Partners (MCP). Learn more in this case study.
-
Avoid these employee monitoring blunders
Employee monitoring needs to be approached correctly. Too often, poorly constructed plans, bad communication and unreasonable expectations get in the way of a successful implementation.
-
John McMahon named Director of Safety & Risk Management at GSU
Risk management executive Dr. John McMahon has joined Grambling State University (GSU) as the new Director of Safety and Risk Management.
-
How security teams can combat social engineering and insider threats
Understanding how bad actors recruit and develop employees to share information can allow security leaders to harden their organizations against the threat of social engineering.
-
Free toolkit of cybersecurity resources for election security
The Cybersecurity and Infrastructure Security Agency (CISA) released a catalog of free services and tools available for state and local election officials to improve the cybersecurity and resilience of their infrastructure.
-
WKS bolsters security with virtual guard services
WKS Restaurant Group (WKS) relies on remote video monitoring to offer enhanced security for its employees and customers.
-
The top identity-based attacks and how to stop them: Part 2
Let's explore two top identity-based attacks — phishing and third-party accounts — and ways organizations can implement cybersecurity best practices to defend against these.
-
Email cyberattacks increased 48% in first half of 2022
Email security threats are increasing, according to the H2 2022 Email Threat Report from Abnormal Security.
-
Austin Siders named CIO at the University of Southern Indiana
Austin Siders has been named Chief Information Officer (CIO) at the University of Southern Indiana, where he will lead tech and cybersecurity efforts.
-
Fourth-party risk management is essential for software supply chain security
Cybersecurity leaders need to focus on fourth-party risks to their software supply chain. Are your vendors (and their partners) exposing you to risk?
-
Christine Whichard promoted to CISO at SmartBear
Christine Whichard, new Chief Information Security Officer (CISO) at SmartBear, has been an instrumental leader in the company’s cybersecurity plans, including an overhaul of its Information Security program.
-
AMA: Cybersecurity Leadership Edition — Meg West
Security sits down with Meg West, X-Force Cybersecurity Incident Response Consultant at IBM, to answer reader questions about enterprise cybersecurity insights, burnout and more in a new podcast episode.
-
9 security threats in the metaverse
Let's examine nine different categories of threats against the metaverse and inside the metaverse, including cyber-physical crime, financial fraud, legal implications and more, according to Trend Micro.
-
The next evolution of cyber defense: Ransomware-proof object storage
To meet the security issues of today, organizations must now shift to object-based backup storage.
-
Executive protection strategies secure election observation in Lebanon
Election observers from the European Parliament and other international organizations were protected by close protection officers and security technology from G4S during the 2022 Lebanon election.
-
Trust, transparency and reliability are keys to Web3 success
Web3 is coming — what will that mean for enterprise security? This blockchain-based version of the internet may present new cybersecurity challenges.
-
Transforming security from cost center to value add
Investigative techniques can help shift security teams from an organizational cost center to a value add.
-
Reducing cybersecurity risk for franchise businesses
Franchise organizations have different levels of cyber risk to consider when it comes to identity and access management (IAM) practices.
-
Hashed passwords exposed in Slack vulnerability
Office communication platform Slack has admitted to accidentally exposing the hashed passwords of some users.
-
Preventing email phishing attacks this summer with 3 defensive measures
3.4 billion phishing attacks are raining on us every day. With summer now upon us, it seems that everyone is on vacation. Here are three tips to get your business ready for phishing season.
-
New Jersey requires threat assessment teams for all school districts
School districts in New Jersey must implement policies to establish threat assessment teams at each school in the state by the 2023/2024 school year.