Skip to content
  • 0 Votes
    1 Posts
    18 Views
    CerberusC

    More and more security leaders are having to communicate generative AI-created malware, and other cyber risks, to the C-suite in their organizations.

    https://www.securitymagazine.com/articles/99911-how-to-communicate-ai-cyber-risk-to-the-c-suite

  • 0 Votes
    1 Posts
    17 Views
    CerberusC

    St. Luke’s Health Systems in Boise, Idaho informed patients of a data breach involving Nuance Communications and MOVEit Transfer software.

    https://www.securitymagazine.com/articles/99910-nuance-communications-announces-data-breach-affecting-healthcare

  • 0 Votes
    1 Posts
    18 Views
    CerberusC

    The DHS released the 2024 Homeland Threat Assessment (HTA), which found that foreign and domestic terrorism posed a high risk for 2024.

    https://www.securitymagazine.com/articles/99908-ai-included-in-dhs-national-security-risks-for-2024

  • 0 Votes
    1 Posts
    21 Views
    CerberusC

    Eric Johnson has been hired as Chief Information Officer at PagerDuty. Johnson will oversee critical IT infrastructure with two decades of experience.

    https://www.securitymagazine.com/articles/99906-eric-johnson-appointed-chief-information-officer-at-pagerduty

  • 0 Votes
    1 Posts
    22 Views
    CerberusC

    Two companies are settling Federal Trade Commission charges claiming that they allowed access to background checks without a permissible purpose.

    https://www.securitymagazine.com/articles/99904-ftc-charges-background-check-companies-for-data-privacy-violations

  • 0 Votes
    1 Posts
    18 Views
    CerberusC

    Security leaders have shared their thoughts and responses to the recent MGM breach, highlighting the need for stronger cybersecurity measures.

    https://www.securitymagazine.com/articles/99903-security-leaders-share-thoughts-on-mgm-cyberattack

  • 0 Votes
    1 Posts
    22 Views
    CerberusC

    Alert fatigue is a significant challenge for security officials in governments and organizations worldwide as it can lead to employee burnout.

    https://www.securitymagazine.com/articles/99899-alert-fatigue-pushes-security-analysts-to-the-limit

  • 0 Votes
    1 Posts
    22 Views
    CerberusC

    Keeping a business secure is a complex task and security personnel, by the very nature of their work, often are placed in precarious situations.

    https://www.securitymagazine.com/articles/99900-four-strategies-for-reducing-security-company-risks

  • 0 Votes
    1 Posts
    19 Views
    CerberusC

    With the rise of smarter camera systems comes a need to monitor video streams more quickly, while making streaming and storage more efficient.

    https://www.securitymagazine.com/articles/99901-video-cameras-can-use-edge-ai-to-create-a-safer-environment

  • 0 Votes
    1 Posts
    20 Views
    CerberusC

    New roadmap articulates how CISA will enable the secure usage of open source software within the federal government.

    https://www.securitymagazine.com/articles/99902-cisa-announces-open-source-software-security-roadmap

  • 0 Votes
    1 Posts
    20 Views
    CerberusC

    Security & cybersecurity practitioners have a major part to play in the overarching priority of advancing digital trust at their organizations.

    https://www.securitymagazine.com/articles/99887-securitys-important-place-in-the-broader-digital-trust-ecosystem

  • 0 Votes
    1 Posts
    21 Views
    CerberusC

    Listen to this episode of The Security Podcasts with Greg Wetmore, VP of Software Development at Entrust, as he discusses quantum computing.

    https://www.securitymagazine.com/articles/99894-how-do-security-leaders-prepare-for-quantum-computing

  • 0 Votes
    1 Posts
    27 Views
    CerberusC

    Anna Brackin has been appointed to Chief Compliance Officer at Regions Bank. Brackin will oversee the company’s compliance risk management program.

    https://www.securitymagazine.com/articles/99898-anna-brackin-appointed-to-chief-compliance-officer-at-regions-bank

  • 0 Votes
    1 Posts
    17 Views
    CerberusC

    Ransomware and the threat landscape were analyzed in a report finding that nearly 60% of respondent organizations report an impact to regulated data.

    https://www.securitymagazine.com/articles/99897-ransomware-in-top-three-threats-for-65-of-organizations

  • 0 Votes
    1 Posts
    23 Views
    CerberusC

    Security leaders need to maintain the bigger picture of their work, assessing risk on an ongoing basis.

    https://www.securitymagazine.com/articles/99885-the-gorilla-in-your-security-plan

  • 0 Votes
    1 Posts
    18 Views
    CerberusC

    The Northwell Health security leadership extends active shooter response training to armed and unarmed officers, ensuring an all-hands approach to violence.

    https://www.securitymagazine.com/articles/99886-the-role-of-unarmed-security-officers-in-active-shooter-response

  • 0 Votes
    1 Posts
    13 Views
    CerberusC

    A recent Beyond Identity survey analyzed how convincing generative artificial intelligence (AI) software ChatGPT was at tricking individuals.

    https://www.securitymagazine.com/articles/99896-49-of-survey-respondents-were-fooled-by-chatgpt

  • 0 Votes
    1 Posts
    19 Views
    CerberusC

    A report found that IT leaders believe cybersecurity concerns are negatively impacting their organization’s willingness to invest in innovative tech.

    https://www.securitymagazine.com/articles/99895-44-of-it-leaders-describe-their-organization-as-secure

  • 0 Votes
    1 Posts
    14 Views
    CerberusC

    As organizations address data privacy & security issues on the expertise needed to use genAI, IT professionals can take steps to prepare for future implementations.

    https://www.securitymagazine.com/articles/99884-generative-ai-in-the-enterprise-4-steps-to-prepare-organizations

  • 0 Votes
    1 Posts
    15 Views
    CerberusC

    Access control can look different for each organization, and security leaders should consider individual needs when picking out access control solutions.

    https://www.securitymagazine.com/articles/99857-the-3-pillars-of-access-control