Wednesday, 28 December 2022

Analyzing the top data breaches of 2022

Security's Associate Editor Maria Henriquez analyzes the top data breaches of 2022 and their effects on enterprise cybersecurity and national legislation going forward.




from Cybersecurity News https://ift.tt/0kaWiz4

Monday, 26 December 2022

Security needs a new mindset

Being alert and anticipative – conducting regular cybersecurity drills, for example – is as essential as prioritization, cyber-resilience and adaptiveness in improving the security mindset of an organization. 



from Cybersecurity News https://ift.tt/lXti0LV

Sunday, 25 December 2022

Digital manufacturing is a double-edged sword: How to leverage opportunities while mitigating threats

Manufacturing phases that run on off-site cloud servers come with added security concerns.



from Cybersecurity News https://ift.tt/Q3vLOIw

Friday, 23 December 2022

Growing cybersecurity skills gap necessitates human factor security

The cybersecurity skills gap creates real security challenges for enterprises. Training employees to recognize security risks can increase business resilience.



from Cybersecurity News https://ift.tt/v9a8ucP

Wednesday, 21 December 2022

How are healthcare CISOs reporting & measuring risks?

What are the biggest cybersecurity risk factors for healthcare heading into 2023?



from Cybersecurity News https://ift.tt/lGLVuet

Global security threats in 2022: Looking back to move forward

In Episode 13 of the Cybersecurity and Geopolitical Podcast series, hosts Ian Thornton-Trump and Philip Ingram discuss the geopolitical threat landscape involving Russia, China, Iran and North Korea.



from Cybersecurity News https://ift.tt/WApZMnF

Tuesday, 20 December 2022

How to assess and bolster an organization's level of cybersecurity

Creating cybersecurity assessment reports and awareness programs can help organizations mitigate the risk of data breaches and build a positive reputation.



from Cybersecurity News https://ift.tt/2ZK83Go

18 cybersecurity predictions for 2023

As you build your cybersecurity resilience planning, priorities and roadmap for the year ahead, security leaders offer cybersecurity predictions for 2023.



from Cybersecurity News https://ift.tt/6eLpcmq

Monday, 19 December 2022

5 priorities security leaders need to tackle in 2023

Here are 5 key priorities that organizations must build into their cybersecurity plans for 2023.



from Cybersecurity News https://ift.tt/RTA7Gsx

Building a security operations center (SOC) on a budget

Small and medium-sized businesses should look to build a SOC that meets their needs at a price point that fits within their overall security expenditures.



from Cybersecurity News https://ift.tt/wdlJYiS

Thursday, 15 December 2022

How to make third-party risk management recession-proof in 2023

With this much economic uncertainty, now is the time to invest in making your third-party risk management (TPRM) program recession-proof in 2023.



from Cybersecurity News https://ift.tt/es7XRkB

Getting healthcare security on the road to recovery

The public and private sectors, and the security industry as a whole, need to come together to get healthcare security on the road to recovery.



from Cybersecurity News https://ift.tt/P9BrFAv

The top 10 data breaches of 2022

Get a special look at Security magazine's top 10 data breaches of 2022 annual report. 



from Cybersecurity News https://ift.tt/GWLoNSz

Wednesday, 14 December 2022

Now is the time to prioritize your organization’s security communications strategy

As external stakeholders demand more information and insight into your organization’s security practices and protocols, implementing a comprehensive security communications strategy is a must. 



from Cybersecurity News https://ift.tt/91XCAFh

Addressing the cybersecurity workforce staff shortage

Why does the cybersecurity workforce gap exist? How can organizations best mitigate it? 



from Cybersecurity News https://ift.tt/lceIzaQ

Tuesday, 13 December 2022

How to protect company data & preserve user privacy

Security magazine sits down with Dan Amiga, Chief Technology Officer (CTO) of Island, to discuss how to find a balance between providing end user privacy and protecting company data. 



from Cybersecurity News https://ift.tt/ogUGW64

Data security governance strategies can be a business differentiator

Every organization needs to rethink its approach to security, governance, privacy and compliance by prioritizing the management and protection of data.



from Cybersecurity News https://ift.tt/CS6EVFw

Monday, 12 December 2022

The benefits of unified security tech

How can unified Identity Orchestration (IO) technology effectively tie different systems together for a seamless, proactive threat identification approach?



from Cybersecurity News https://ift.tt/E3ws4JI

Thursday, 8 December 2022

Top security news of 2022

Security magazine highlights ten of the top physical security & cybersecurity news stories from 2022, ranging from emergency response to metaverse cyber threats.



from Cybersecurity News https://ift.tt/5dpgfYj

Protecting the modern cloud environment with cloud email security

When a cloud-native security tool is in place — one that understands identity, context, and risk — organizations are truly protected from both inbound email threats and email platform attacks. 



from Cybersecurity News https://ift.tt/8YuFkZT

Leading cyber risks & trends in 2022

What are some of the leading cyber risks and cybersecurity trends in 2022? 



from Cybersecurity News https://ift.tt/8ETnp7j

Wednesday, 7 December 2022

Security's Editorial Fireside Chat 2022

In this episode of The Security Podcasts, the Security magazine editorial team sits down to reflect on interesting, engaging and diverse stories from the security industry in 2022.



from Cybersecurity News https://ift.tt/jo7XzyW

Understanding SBOMs: A snapshot of your software security

In the midst of conversations about securing the software supply chain, one term consistently rises to the forefront: SBOM. 



from Cybersecurity News https://ift.tt/Ou6IUZ9

Tuesday, 6 December 2022

With OT attacks on rise, organizations weigh cybersecurity trends for 2023

What are six operational technology (OT) cybersecurity trends to watch in 2023? 



from Cybersecurity News https://ift.tt/6DzQLtr

Top 12 physical security, cybersecurity & risk management stories of 2022

Get a special look at Security magazine's top 12 articles of 2022 — all of which cover thought leadership around physical security, cybersecurity, risk management & more. 



from Cybersecurity News https://ift.tt/2uXv6qP

Monday, 5 December 2022

Endpoint detection & response and its cybersecurity benefits

What are the four major cybersecurity capabilities endpoint detection and response (EDR) solutions provide?



from Cybersecurity News https://ift.tt/NlP5grS

Friday, 2 December 2022

Shifting left isn't always right

True DevSecOps requires shifting both left and right, testing in both staging and production environments continuously in real-time.



from Cybersecurity News https://ift.tt/ODEqtFB

WAF is woefully insufficient in today’s container-based applications: Here’s why

In a world where successful exploits may be inevitable, relying on a perimeter WAF for application security leaves entire environments vulnerable unless adequate security tools and policies are implemented.



from Cybersecurity News https://ift.tt/G5mjRvZ

Thursday, 1 December 2022

Clearing the fog: Identifying blind spots in cybersecurity budgeting

Cybersecurity budget management is crucial in increasing a company’s cybersecurity efficiency and eliminating security blind spots.



from Cybersecurity News https://ift.tt/nATOxJw