March 30, 2021 By Megan Crouse 2 min read

This month in digital security, scam text messages may seem like an easy attack to dodge, but they’re getting smarter. Meanwhile, chief information security officers are wearing lots of hats. And, is it really possible to ‘future proof’ anything? The World Economic Forum says the way we look at it now isn’t working.

Here’s your look at some of the most important security conversations happening this month.

Quick Briefs: Top Insights From March

3-Minute Read 🕒

What You Need to Know About Scam Text Messages in 2021

Scam calls are almost as old as the telephone. But today’s text phishing campaigns are far from quaint: they can be subtle and use personal data. From messages that say they’re coming from your bank to fake package delivery alerts, text scams are getting smarter (And, we’re working from home, so package arrival day is a big deal.) Check out threat actors’ techniques for today and how to avoid them.

3-Minute Read 🕒

How a CISO’s Executive Role Has Changed

If you’re a chief information security officer, you might have seen a lot of changes in the last few years. That’s because the role itself is changing, shifting spots in the C-suite and being involved in different decisions. Read how you can use this to your advantage to get a better spot at the table.

2-Minute Read 🕒

‘Clear and Present Danger’: Why Cybersecurity Risk Management Needs to Keep Evolving

Risk management can sometimes feel like peering into a crystal ball; it’s hard to predict the future. But one thing’s for sure: the world of connected devices is growing, and cybersecurity experts and threat actors are leap-frogging to get ahead of one another. Take a look at why it’s important to pivot with new threats when it comes to risk management.

Worth Your While: In-Depth Coverage To Sharpen Your Skills & Tighten Security

6-Minute Read 🕒

Developers vs. Security: Who is Responsible for Application Security?

Developers surveyed disagree on whose jobs it is to take the onus for apps. This fascinating interview with Deloitte’s Vikram Kunchala lays out why this is thorny and how workflows can be improved to make securing apps less troublesome for everyone. Ditch the blame game and organize.

5-Minute Read 🕒

Top 10 Cybersecurity Vulnerabilities of 2020

Know what to watch out for when it comes to the vulnerabilities open to attackers, now. This detailed list specifies today’s problems in Citrix applications, PHP code, Apache Struts and more. We’ve also outlined some general plans for how to prevent common vulnerabilities and put a robust patch management program in place.

5-Minute Read 🕒

The Next-Gen Cyber Range: Bringing Incident Response Exercises to the Cloud

Working with today’s environments often means working cloud-native. But, what does that mean? And, how can your security operations center prepare for it? IBM brings a cloud-native version of cyber range to put your teams to the test, looking at all the moving parts, whether you’re setting up a tricky (AWS) S3 storage system or want to put your current systems to the test.

March’s Expert Insight: The Rapid Evolution of Ransomware

Want to keep up with today’s cybersecurity news and best practices? Watch this space for the Security Intelligence newsletter.

More from CISO

Why security orchestration, automation and response (SOAR) is fundamental to a security platform

3 min read - Security teams today are facing increased challenges due to the remote and hybrid workforce expansion in the wake of COVID-19. Teams that were already struggling with too many tools and too much data are finding it even more difficult to collaborate and communicate as employees have moved to a virtual security operations center (SOC) model while addressing an increasing number of threats.  Disconnected teams accelerate the need for an open and connected platform approach to security . Adopting this type of…

The evolution of a CISO: How the role has changed

3 min read - In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027.With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today