March 30, 2021 By Megan Crouse 2 min read

This month in digital security, scam text messages may seem like an easy attack to dodge, but they’re getting smarter. Meanwhile, chief information security officers are wearing lots of hats. And, is it really possible to ‘future proof’ anything? The World Economic Forum says the way we look at it now isn’t working.

Here’s your look at some of the most important security conversations happening this month.

Quick Briefs: Top Insights From March

3-Minute Read 🕒

What You Need to Know About Scam Text Messages in 2021

Scam calls are almost as old as the telephone. But today’s text phishing campaigns are far from quaint: they can be subtle and use personal data. From messages that say they’re coming from your bank to fake package delivery alerts, text scams are getting smarter (And, we’re working from home, so package arrival day is a big deal.) Check out threat actors’ techniques for today and how to avoid them.

3-Minute Read 🕒

How a CISO’s Executive Role Has Changed

If you’re a chief information security officer, you might have seen a lot of changes in the last few years. That’s because the role itself is changing, shifting spots in the C-suite and being involved in different decisions. Read how you can use this to your advantage to get a better spot at the table.

2-Minute Read 🕒

‘Clear and Present Danger’: Why Cybersecurity Risk Management Needs to Keep Evolving

Risk management can sometimes feel like peering into a crystal ball; it’s hard to predict the future. But one thing’s for sure: the world of connected devices is growing, and cybersecurity experts and threat actors are leap-frogging to get ahead of one another. Take a look at why it’s important to pivot with new threats when it comes to risk management.

Worth Your While: In-Depth Coverage To Sharpen Your Skills & Tighten Security

6-Minute Read 🕒

Developers vs. Security: Who is Responsible for Application Security?

Developers surveyed disagree on whose jobs it is to take the onus for apps. This fascinating interview with Deloitte’s Vikram Kunchala lays out why this is thorny and how workflows can be improved to make securing apps less troublesome for everyone. Ditch the blame game and organize.

5-Minute Read 🕒

Top 10 Cybersecurity Vulnerabilities of 2020

Know what to watch out for when it comes to the vulnerabilities open to attackers, now. This detailed list specifies today’s problems in Citrix applications, PHP code, Apache Struts and more. We’ve also outlined some general plans for how to prevent common vulnerabilities and put a robust patch management program in place.

5-Minute Read 🕒

The Next-Gen Cyber Range: Bringing Incident Response Exercises to the Cloud

Working with today’s environments often means working cloud-native. But, what does that mean? And, how can your security operations center prepare for it? IBM brings a cloud-native version of cyber range to put your teams to the test, looking at all the moving parts, whether you’re setting up a tricky (AWS) S3 storage system or want to put your current systems to the test.

March’s Expert Insight: The Rapid Evolution of Ransomware

Want to keep up with today’s cybersecurity news and best practices? Watch this space for the Security Intelligence newsletter.

More from CISO

Making smart cybersecurity spending decisions in 2025

4 min read - December is a month of numbers, from holiday countdowns to RSVPs for parties. But for business leaders, the most important numbers this month are the budget numbers for 2025. With cybersecurity a top focus for many businesses in 2025, it is likely to be a top-line item on many budgets heading into the New Year.Gartner expects that cybersecurity spending is expected to increase 15% in 2025, from $183.9 billion to $212 billion. Security services lead the way for the segment…

On holiday: Most important policies for reduced staff

4 min read - On Christmas Eve, 2023, the Ohio State Lottery had to shut down some of its systems because of a cyberattack. Around the same time, the Dark Web had a “Leaksmas” event, where cyber criminals shared stolen information for free as a holiday gift. In fact, the month of December 2023 saw more than 2 billion records breached and 1,351 disclosed security incidents, according to research from IT Governance — an increase of 332% and 187%, respectively, over the month of…

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today