General

Three key strategies for organisations to protect themselves from deepfakes

While AI holds the potential to be a powerful tool for positive change, it can also be weaponised by bad actors, amplifying risks we have never encountered before. One of the most alarming threats is the rise of deepfakes; videos or audio created using AI to imitate real people.

Membership Required

You must be a member to access this content.

View Membership Levels

Already a member? Log in here
Read more...

The Defender’s Dilemma: Navigating the Evolving Landscape of Threat Detection

Security teams today face a perplexing reality: their growing confidence in their own team’s defensive skills is overshadowed by an increasing struggle to keep pace with the rising tide of cyber-attacks. Vectra AI's 2024 State of Threat Detection Report, based on a survey of 2,000 security professionals globally, reveals a complex landscape where tool proliferation, alert fatigue, and vendor distrust collide with the promise of AI-driven solutions.

Membership Required

You must be a member to access this content.

View Membership Levels

Already a member? Log in here
Read more...

NIS2 – how SMEs can get to grips with the new requirements for digital supply chain security

The deadline for EU Member States to transpose the NIS2 directive, which provides for numerous measures to increase cyber security, was in October. One focus is on improving digital supply chain security - through the implementation and optimization of Third-Party Risk Management (TPRM).

Membership Required

You must be a member to access this content.

View Membership Levels

Already a member? Log in here
Read more...

Poor marketing endangers society

n the past few weeks, as various security companies have published multiple studies about the state of cybersecurity, a common theme has arisen: Executives running the companies that purchase security tools and services are not sure their purchases have made them any safer. This widespread position in the market confirms results of a months’ long investigation by Cyber Protection Magazine that marketing practices in the industry are failing to do the job and, in the process, making society less safe.

While every report skews data to convincing customers to add their company’s tools and services to their budgets. However, every report also reports that between 60 and 90 percent of managers have significant concerns and doubts that the tools they have, and the tools they are considering, will not do the job that needs doing. The reasons for that lack of confidence are three-fold.

Three reasons for lack of trust

First, stuff is moving fast. Governments are legislating controls and protections faster than normal. Sometimes this rules don’t make sense and many in the industry think they are holding back innovation and adoption. Criminals and nation states are stepping up attacks that bypass established protections, and lawsuits for negligence are growing. Second, while understanding the need for security best practices is at an all-time high, that’s mainly because weaknesses due to work-from-home, generative AI and news about data breaches is also high. That means while understanding of the need is high, inexperience and ignorance is creating new opportunities for attacks.

“Many executives may not exactly understand how (the tools) work,” said Cache Merrill, founder of software outsourcing company, Zibtek. “. When there is a concern on the functionality of the tools or when attention is on what the tech teams understand without listening to them, anxiety is experienced. To put it simply, if they cannot see it, they will not put faith in it.”

Carl DePrado, an SMB IT consultant based in New York, aid, “The sheer number of cybersecurity products and services can be overwhelming. This contributes to a sense of vulnerability, as they may not feel confident that they have covered all their bases.”

Membership Required

You must be a member to access this content.

View Membership Levels

Already a member? Log in here
Read more...

Exploring Vertical Versus Horizontal Cybersecurity Integration

Every business faces the constant challenge of safeguarding its data and digital systems against various threats. To achieve this, various security solutions tackle specific aspects of the security puzzle. Vertical and horizontal security integration are two prevalent approaches, each with benefits and drawbacks.

Membership Required

You must be a member to access this content.

View Membership Levels

Already a member? Log in here
Read more...

Old Tricks, New Threats: How Social Engineering Drives Cyber Attacks

In a rapidly evolving world of cybersecurity, there’s an unsettling constant: no matter how advanced our defenses become, social engineering remains at the core of many devastating cyberattacks. From infostealers to credential theft and cryptocurrency hacks, today’s most cutting-edge threats are still built on manipulating human behavior. The more things change, the more they stay the same.

Membership Required

You must be a member to access this content.

View Membership Levels

Already a member? Log in here
Read more...