Security leaders predict that AI will become a more prevalent tool in the tool kit of cybercriminals, potentially powering a range of cyberattacks.
Legislators and others in favor of banning TikTok often cite data security issues, but it’s an invalid argument that will do little in terms of data security protections.
In episode 22 of the Cybersecurity & Geopolitical Discussion, our trio of hosts debate the geopolitical and security dimensions of the current global space industry.
The FTC issues refunds after a settlement with Ring over charges the company allowed employees and contractors to access consumers’ private videos.
For executives and leaders in IT, security and business operations, the widening cybersecurity skills gap poses an urgent dilemma.
https://www.securitymagazine.com/articles/100608-bridging-the-widening-cybersecurity-skills-gap
Many small and medium-sized enterprises lack the resources and abilities to properly handle the large volume security alerts received.
According to a recent study, 80% of cybersecurity decision makers say accelerating AI adoption is critical to their organization’s resilience.
As technology evolves, manufacturers can leverage new tools to reduce costs while improving accuracy, visibility and customer satisfaction.
https://www.securitymagazine.com/articles/100601-automating-a-more-resilient-supply-chain
Research has discovered a vulnerability in an Apache project that could lead to remote code execution inside of the production environment.
According to a recent cybersecurity priorities report, security analysts maintain that up to 57% of their daily tasks could be automated.
With threats looming, here are three considerations for consumers and businesses to protect data privacy in the age of AI.
AI can become the foundation for a future where agencies can proactively identify, understand and address cyber threats before it’s too late.
In a recent report, two-thirds of IT leaders express a lack of confidence in the United States government's ability to defend against cyberwarfare.
The number of victims experiencing ransomware incidents has risen since Q1 of 2023, rising by nearly 20% by Q1 of 2024.
No matter how many systems are running on local devices or connected to the cloud, organizations can bring them all back to a central head end.
https://www.securitymagazine.com/articles/100595-hybrid-cloud-the-best-of-both-worlds
In today’s constantly evolving threat landscape, the ability to quickly detect and respond to security incidents is critical.
With rapid AI adoption happening across varying business units, maintaining the integrity of those systems is a growing concern.
It is possible that cybercriminals will shift from a few large-scale, high-stake ransomware attacks to a broader array of smaller-scale attacks.
A recent report has emphasized the prevalence and importance of pentesting among enterprise security teams.
Without the proper foundation or understanding of how to secure their AI systems and address key security concerns, innovation slows or gets stuck.
The widespread financial burden of cybercrime in the U.S. was recently analyzed by NoDepositRewards using data from the 2023 FBI crime report.
https://www.securitymagazine.com/articles/100587-nevada-loses-the-most-money-to-cybercrime
The adoption of the TLS 1.3 creates a watershed moment for cybersecurity, revolutionizing encryption and data protection standards.
Under heightened national and economic security scrutiny, telecom operators must rise to the challenge.
Explore strategies for individuals, as well as tax preparation organizations, to ensure their data and their clients’ data is protected this tax season.
Adding OSINT-driven threat intelligence to the CISO toolkit can be a game-changer, enabling a proactive approach to cybercrime defenses.
Organizations can use cyber tabletop exercises as a powerful tool to build robust and adaptable cyber defenses.
Explore how preemptive security, from electric fencing to tech integration, is revolutionizing asset and worker safety in today’s automation-driven industrial landscape.
Although cybersecurity is vital to an organization’s financial success, many companies do not have a designated cyber expert.
How to choose which security conferences to attend, exhibit at, or present at depends on many different factors.
https://www.securitymagazine.com/articles/100577-when-solution-providers-host-industry-conferences
Security leaders share the impact mentorship has had on furthering their careers in the industry.
https://www.securitymagazine.com/articles/100578-mentorship-key-in-building-security-careers