Tag: business
-
Addressing Our ‘Age of Insecurity’, in Cyber Too
Recent cyber attacks have given a new urgency to business resiliency in the public and private sectors. Let’s explore the problem and some workable answers. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/addressing-our-age-of-insecurity-in-cyber-too/
-
BEC- und FTF-Angriffe größte Cybergefahr in 2024
Betrug bei geschäftlichen E-Mails unter dem Begriff Business Email Compromise (BEC) zusammen gefasst sowie Funds Transfer Fraud (FTF) sind die Cyberbedrohungen, die im Jahr 2024 die größten Schäden verursacht haben. Dies geht aus einem Bericht von KnowBe4 hervor, … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/06/01/bec-und-ftf-angriffe-groesste-cybergefahr-in-2024/
-
Dutch businesses lag behind in cyber resilience as threats escalate
While non-IT business professionals in the middle of their careers face the most disruption from AI, professionals in the IT services sector and their employers must prepare for change First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366624847/Dutch-businesses-lag-behind-in-cyber-resilience-as-threats-escalate
-
Cybersecurity teams show business value amid declining investment, report finds
First seen on scworld.com Jump to article: www.scworld.com/brief/cybersecurity-teams-show-business-value-amid-declining-investment-report-finds
-
New Study Uncovers Multiple Vulnerabilities in WeChat and IM Apps
Instant messaging (IM) applications like WeChat have become indispensable for billions, facilitating not only communication but also payments, business, and personal data exchange. However, their ubiquity and complexity make them prime targets for sophisticated cyberattacks. This article explores how a single WeChat message can be leveraged for persistent client-side attacks, examining the technical mechanisms, real-world…
-
Strategies for Enhancing Your Organization’s Cyber Resilience
Organizations must improve their cyber resilience not just for the sake of business operations, but to maintain customer confidence. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/strategies-for-enhancing-your-organizations-cyber-resilience/
-
Unlocking Powerful Benefits with NHIs
Is Your Organization Realizing the Powerful Benefits of NHIs? Acquiring a deep understanding of Non-Human Identities (NHIs) is pivotal for organizations striving to build solid fortifications around their data and systems. NHIs, also known as machine identities, are the unseen force behind the smooth functioning of a business’s digital environment. Yet, their security management and……
-
From bottleneck to business enabler: making PKI work for digital transformation
Traditional PKI often creates security and agility bottlenecks due to manual processes and poor integration. As enterprises adopt cloud, DevOps, and Zero Trust, automated and scalable certificate management becomes essential. Modern PKI solutions must offer automation, policy enforcement, seamless integration, and broad coverage. Automated Internal PKI provides centralized control and lifecycle automation, enabling secure, efficient…
-
Even $5M a year can’t keep top CISOs happy
Some are unhappy with budgets too: : Not all CISOs working at large enterprises are happy with their six-figure salaries. According to the survey, only 55% of respondents working for $20 billion-plus firms were satisfied with what they were being paid and that group was the least satisfied of all questioned with what they were…
-
CrowdStrike CBO On ‘Embracing AI’ In Security, Next-Gen SIEM ‘Transformation’
In an interview with CRN, CrowdStrike Chief Business Officer Daniel Bernard discusses why embracing AI is now ‘not optional’ in cybersecurity and the massive opportunities from the arrival of Next-Gen SIEM. First seen on crn.com Jump to article: www.crn.com/news/security/2025/crowdstrike-cbo-on-embracing-ai-in-security-next-gen-siem-transformation
-
Cybersecurity Teams Generate Average of $36M in Business Growth
A new EY report found that cybersecurity teams are a major vehicle for business growth, and CISOs should push for a seat at the top table First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cybersecurity-teams-business-growth/
-
Find the Best CIAM Solution for Your Business: A Comprehensive Guide to Modern Customer Identity Management
We’ve reached a point where customers won’t wait even a few seconds for an app to load or a login to work. In this new era of digital impatience, CIAM platforms have become business critical, serving as direct contributors to conversion rates, user retention, and data protection. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/05/find-the-best-ciam-solution-for-your-business-a-comprehensive-guide-to-modern-customer-identity-management/
-
Unternehmen unterschätzen Risiken von Datenverlust bei SaaS-Anwendungen
Jeden Tag verlagern Unternehmen kritische Prozesse in Cloud-basierte Software-as-a-Service (SaaS)-Anwendungen. Gleichzeitig richten Cyberkriminelle ihre Aktivitäten verstärkt auf Cloud-Dienste aus und gefährden damit Unternehmen, wobei SaaS-Anwendungen inzwischen zu den präferierten Zielen der Cyberkriminellen gehören. Im neuen E-Book zeigt Arcserve auf, dass laut Markterhebungen […] First seen on netzpalaver.de Jump to article: netzpalaver.de/2025/05/28/unternehmen-unterschaetzen-risiken-von-datenverlust-bei-saas-anwendungen/
-
‘Secure email’: A losing battle CISOs must give up
End-to-end encryption remains elusive: Email continues to be the dominant electronic communication tool today because it is well understood, relatively easy to use, and relatively inexpensive. By and large, businesses have approved email for sending confidential information, and we often convince ourselves that it is secure, can be secured with third-party tools, or it’s “good…
-
Will AI agent-fueled attacks force CISOs to fast-track passwordless projects?
Tags: access, ai, api, attack, authentication, breach, business, ciso, cloud, credentials, cyber, cybersecurity, data, fido, finance, framework, google, Hardware, identity, login, metric, microsoft, okta, passkey, password, phishing, privacy, risk, risk-management, service, technology, threat, tool, update, zero-trustPasswordless options: In retiring passwords, security leaders will need to consider their options, passkeys, biometrics, and third-party login services, looking for the best technical, usability, and security fit. There are pros and cons for each option, and in many cases CISOs may be guided towards one based on their existing environment.Passkeys, used by Microsoft, Samsung,…
-
Check Point Buys Startup Veriti to Advance Threat Management
Open Garden Strategy, Automated Risk Remediation to Get a Boost With Veriti Buy. Check Point will fold Israeli firm Veriti into its Quantum suite following an acquisition aimed at streamlining automated security response across endpoints, firewalls and cloud environments. Veriti’s patented technology is seen as critical to reducing misconfigurations without business disruption. First seen on…
-
eSkimming Security Driving Bottom Line Results through Fraud Reduction and Revenue Maximization
by Source Defense Even with the PCI DSS 4.0 deadline now behind us, many organizations are still exposed to costly eSkimming threats and compliance gaps. Source Defense recently hosted a webinar to explore how compliance actually drives better business outcomes as seen through the lens of the positive bottom line impacts of implementing PCI First…
-
Windows 11 Notepad Introduces AI-Powered Writing with Copilot Integration
Microsoft’s venerable Notepad, a staple of Windows since the 1980s, is undergoing its most significant transformation yet. With the latest Windows 11 Insider builds, Notepad now features integrated generative AI, turning the once-basic text editor into a creative and technical assistant. The new “Write” feature allows users to summon AI-generated text, ranging from business letters…
-
Microsoft Defender vs Bitdefender: Compare Antivirus Software
Microsoft Defender and Bitdefender are two popular small business security providers with multiple products for small teams. Microsoft Defender can protect your office solutions, like Word and Teams, and business endpoint devices. Bitdefender performs vulnerability scans on your devices and protects your email accounts. I’ve compared both solutions to help you decide which is a…
-
ICYMI: A Look Back at Exposure Management Academy Highlights
Tags: attack, business, ceo, cio, control, cyber, cybersecurity, data, framework, infrastructure, intelligence, office, risk, risk-management, strategy, technology, threat, tool, update, vulnerability, vulnerability-managementEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. This week, we look back on some highlights from the first couple of months of posts, including the broad view exposure management provides, business impact and getting to a single pane of glass.…
-
CISO’s Guide To Web Privacy Validation And Why It’s Important
Are your web privacy controls protecting your users, or just a box-ticking exercise? This CISO’s guide provides a practical roadmap for continuous web privacy validation that’s aligned with real-world practices. Download the full guide here.Web Privacy: From Legal Requirement to Business EssentialAs regulators ramp up enforcement and users grow more privacy-aware, CISOs face a mounting…
-
U.S. Banking Associations Petition SEC to Rescind Cyber Breach Reporting Mandate
Five major banking associations have formally petitioned the U.S. Securities and Exchange Commission (SEC) to repeal a rule that mandates public companies to disclose material cybersecurity incidents within four business days. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/banks-urge-sec-to-end-cyber-disclosure-mandate/
-
The 7 unwritten rules of leading through crisis
Tags: automation, best-practice, business, ceo, cio, cyber, cybersecurity, incident response, intelligence, radius, risk, security-incident, service, software, strategy, tactics, technology, threat, tool, trainingRule 2: A proactive mindset sets the stage for collective learning: Confusion is contagious. “Providing clarity about what’s known, what matters, and what you’re aiming for, stabilizes people and systems,” says Leila Rao, a workplace and executive coaching consultant. “It sets the tone for proactivity instead of reactivity.”Simply treating symptoms will make the problem worse,…
-
A Hyperscaler for Cybersecurity
Tags: access, automation, business, cloud, compliance, computing, control, cybersecurity, data, detection, edr, endpoint, group, infrastructure, intelligence, mssp, network, service, siem, soc, software, threat, tool, updateHyperscalers like AWS and GCP have transformed IT and general tech. Now it’s time for the cybersecurity industry to catch up by shifting to specialized hyperscaler platforms built for security operations (SecOps) at scale. Why the cybersecurity industry needs its own hyperscaler IT hyperscalers evolved to meet the challenges of web-scale computing back in the…

