Tag: business
-
Survey Surfaces Myriad Small Business Security Challenges
A survey of 1,000 executives of organizations that generate less than $100 million in revenue finds 59% believe the right amount of budget is being allocated to cybersecurity, with 64% noting they also believe their organization is too small to be an attractive target. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/07/survey-surfaces-myriad-small-business-security-challenges/
-
Has CISO become the least desirable role in business?
Tags: advisory, ai, business, cio, ciso, control, corporate, cybersecurity, data, dora, finance, governance, international, jobs, network, office, regulation, resilience, risk, sap, skills, startup, threatGeorge Gerchow, CSO, Bedrock Security George Gerchow / Bedrock Security”I’ll never report to a CTO or CFO again. I have to have seat at the table,” he says emphatically. Otherwise, he says, you become frustrated “because you’re not in control of your own destiny. You’re parsing everything to this other person who’s a leader in…
-
Skills gaps send CISOs in search of managed security providers
Tags: access, awareness, business, ciso, compliance, control, cyber, cybersecurity, detection, governance, group, infrastructure, intelligence, jobs, monitoring, msp, mssp, network, penetration-testing, risk, risk-assessment, service, skills, strategy, threat, tool, training, update, vulnerabilitySecurity operations centers (SOCs)Cloud platform managementSIEM and log monitoringFramework-based cybersecurity management functionsThreat intelligence feeds and analysisVulnerability scanning and patch managementEndpoint detection and response (EDR)Firewall and network security managementCompliance tracking and audit support”MSPs already have the infrastructure and staff in place to deliver these services efficiently, and at scale,” Richard Tubb, who runs the MSP community…
-
EU Pledges ‘No Pause’ Over Enforcement of Bloc’s AI Act
Rejects Business and AI Leaders’ Call for Two-Year Enforcement Moratorium. Expect to see no pause in the EU’s enforcement of new rules governing artificial intelligence, a spokesman for the European Commission said amid intensifying calls for officials to stop the clock over implementing the bloc’s AI Act, in the name of innovation and competition. First…
-
Researchers Discover New Method to Identify Azure Arc in Enterprise Environments and Maintain Persistence
Security researchers have discovered novel ways to identify and take advantage of Microsoft Azure Arc in business settings, which is a major advancement in cybersecurity and may reveal weaknesses in this hybrid management system. Introduced in 2019, Azure Arc extends Azure’s native management capabilities to non-Azure resources, including on-premises servers and Kubernetes clusters, through the…
-
Cybersecurity in the supply chain: strategies for managing fourth-party risks
Tags: access, breach, business, ciso, compliance, control, cyber, cybersecurity, data, exploit, framework, governance, intelligence, ISO-27001, law, mitigation, monitoring, nist, risk, risk-management, saas, service, soc, software, strategy, supply-chain, threat, tool, vulnerabilitySet clear data boundaries: The reality is that any organization consuming third-party software-as-a-service offerings and services has extremely limited control over the partners that their third parties are working with, says Curtis Simpson, CISO at Armis.”This is why it’s critically important to understand the sub-processors involved in the delivery of contracted SaaS offerings and services,…
-
Protecting Your Business Communications: The Critical Role of Secure Email Gateways
Email is still the backbone of how businesses communicate, with more than 300 billion messages sent every day…. First seen on hackread.com Jump to article: hackread.com/protecting-business-communications-secure-email-gateway/
-
CrowdStrike Remains Cybersecurity ‘Gold Standard:’ Analyst
A prominent Wall Street analyst says CrowdStrike is seeing ‘increased momentum’ in its business, suggesting the cybersecurity giant has moved well beyond the global outage of a year ago. First seen on crn.com Jump to article: www.crn.com/news/security/2025/crowdstrike-remains-cybersecurity-gold-standard-analyst
-
Analysis Surfaces Increased Usage of LLMs to Craft BEC Attacks
A Barracuda Networks analysis of unsolicited and malicious emails sent between February 2022 to April 2025 indicates 14% of the business email compromise (BEC) attacks identified were similarly created using a large language model (LLM). First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/07/analysis-surfaces-increased-usage-of-llms-to-craft-bec-attacks/
-
Fine-tuning to deliver business AI value
Foundation AI models offer knowledge that spans the internet, but they generally lack an understanding of proprietary business data and processes First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366627037/Fine-tuning-to-deliver-business-AI-value
-
Beyond Silos: The Power of Internal Collaboration on Transforming Fraud Prevention
By breaking down internal silos, leveraging advanced technology and embracing industrywide cooperation, organizations can shift from reactive to proactive fraud prevention to protect revenue and reputation while supporting sustainable business growth. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/07/beyond-silos-the-power-of-internal-collaboration-on-transforming-fraud-prevention/
-
90% aren’t ready for AI attacks, are you?
As AI reshapes business, 90% of organizations are not adequately prepared to secure their AI-driven future, according to a new report from Accenture. Globally, 63% of … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/03/ai-cyber-defenses/
-
How cybersecurity leaders can defend against the spur of AI-driven NHI
Tags: access, ai, attack, automation, breach, business, ciso, cloud, credentials, cybersecurity, data, data-breach, email, exploit, framework, gartner, governance, group, guide, identity, infrastructure, least-privilege, LLM, login, monitoring, password, phishing, RedTeam, risk, sans, service, software, technology, tool, vulnerabilityVisibility Yageo Group had so many problematic machine identities that information security operations manager Terrick Taylor says he is almost embarrassed to say this, even though the group has now automated the monitoring of both human and non-human identities and has a process for managing identity lifecycles. “Last time I looked at the portal, there…
-
For MSP Owners Looking to Exit the Business, the MSP Owners Group Wants to Help
First seen on scworld.com Jump to article: www.scworld.com/news/for-msp-owners-looking-to-exit-the-business-the-msp-owners-group-wants-to-help
-
ATT deploys new account lock feature to counter SIM swapping
Tags: businessThe feature is available for both consumer and business accounts. First seen on cyberscoop.com Jump to article: cyberscoop.com/att-wireless-account-lock-sim-swapping-protection/
-
How Businesses Can Align Cyber Defenses With Real Threats
Companies that understand the motivations of their attackers and position themselves ahead of the competition will be in the best place to protect their business operations, brand reputation, and their bottom line. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/how-businesses-can-align-cyber-defenses-real-threats
-
50 customers of French bank hit after insider helped SIM swap scammers
French police have arrested a business student interning at the bank Société Générale who is accused of helping SIM-swapping scammers to defraud 50 of its clients. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/50-customers-of-french-bank-hit-after-insider-helped-sim-swap-scammers
-
CISOs must rethink defense playbooks as cybercriminals move faster, smarter
Tags: access, automation, breach, business, cisco, ciso, crowdstrike, cybercrime, cybersecurity, data, defense, finance, incident response, Intruder, okta, ransomware, siem, technology, threatThreat actor containment: Increasingly ‘surgical’ and best with a plan: Even after an intruder has been identified, today’s rapid pace of adversary activity is also straining cybersecurity teams’ ability to contain intruders before they can cause damage.”If I’m a CISO, if I’m responsible for detecting and remediating that incident before it progresses to becoming a…
-
Remcos RAT spread via hijacked school, small business accounts
First seen on scworld.com Jump to article: www.scworld.com/brief/remcos-rat-spread-via-hijacked-school-small-business-accounts
-
AI Tools Transforming Business Operations in 2025
The AI revolution has reached a critical turning point, with 78% of organizations now using AI in at least one business function. This comprehensive guide examines the most impactful AI tools reshaping business in 2025, featuring emerging platforms like LogicBalls that are democratizing access. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/ai-tools-transforming-business-operations-in-2025/
-
How to Chart an Exposure Management Leadership Path for You, Your Boss and Your Organization
Tags: access, attack, automation, breach, business, ciso, cloud, container, cybersecurity, data, defense, exploit, identity, incident response, iot, jobs, kubernetes, ransom, regulation, risk, security-incident, service, soc, threat, tool, vulnerability, vulnerability-managementEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. In this post, we share some tips on how to lead the move to exposure management. You can read the entire Exposure Management Academy series here. For years, organizations poured resources into reactive…
-
AI Boss Fails Spectacularly in Month-Long Business Test
Anthropic Claude Agent Loses Money, Hoards Tungsten, Believes It’s Human. Unleashing an agentic AI on the office vending machine: What could go wrong? Anthropic and AI safety company Andon Labs found out when they turned over management of a small refrigerator that acted as a vending machine to Claude Sonnet 3.7. Researchers described the AI’s…
-
Online hacks to offline heists: crypto leaders on edge amid increasing attacks
Industry figures are seeing beyond the ‘illusion of invisibility’ after series of investor kidnappingsCryptocurrency traders such as Mohammed Arsalan are prepared to watch their online assets expand and explode if they miss the right moment, making or breaking their fortunes in just minutes. All in a day’s work on the internet. Offline, though, they have…
-
Most building management systems exposed to cyber vulnerabilities, experts warn
A study of over 467,000 building management systems across 500 organizations found that 2% of all devices essential to business operations had the highest level of risk exposure.; First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/building-management-systems-cyber-vulnerabilities/751882/

