Torsten George
@torsten_george
Followers
341
Following
290
Media
6
Statuses
856
Cyber Security Evangelist; Marketing Executive (Software, SaaS, Network Equipment); Product and Channel Marketing, MarCom, PR, Social Media, BizDev
Silicon Valley, CA, USA
Joined July 2010
SIM Swaps Expose a Critical Flaw in Identity Security -
securityweek.com
SIM swap attacks exploit misplaced trust in phone numbers and human processes to bypass authentication controls and seize high-value accounts.
0
0
0
Why Identity Security Must Move Beyond MFA via @SecurityWeek via @torsten_george -
securityweek.com
By integrating identity threat detection with MFA, organizations can protect sensitive data, maintain operational continuity, and reduce risk exposure.
0
1
3
Five Cybersecurity Predictions for 2026: Identity, AI, and the Collapse of Perimeter Thinking -
securityweek.com
The perimeter is gone. Credentials are no longer sufficient. And security can no longer rely on static controls in a dynamic threat environment.
1
0
0
Welcome to Cybersecurity Awareness Month 2025. This October offers organizations a critical opportunity to reassess their defenses, modernize identity protections, and enhance resilience. Check out https://t.co/4RPXJLesYl via @torsten_george via @SecurityWeek to learn more.
securityweek.com
This year’s theme focuses on government entities and small and medium-sized businesses that are vital to protecting the systems and services that keep our communities running.
0
1
2
Cybersecurity Awareness Month 2025: Prioritizing Identity to Safeguard Critical Infrastructure -
securityweek.com
This year’s theme focuses on government entities and small and medium-sized businesses that are vital to protecting the systems and services that keep our communities running.
0
0
0
As attackers target help desks and identity systems, traditional security perimeters are proving insufficient against agile, socially-engineered threats. Check out this article via @torsten_george via @SecurityWeek to learn how to minimize risk exposure:
securityweek.com
As attackers target help desks and identity systems, traditional security perimeters are proving insufficient against agile, socially-engineered threats.
0
1
1
Help Desk at Risk: Scattered Spider Shines Light on Overlook Threat Vector via @torsten_george via @SecurityWeek
securityweek.com
As attackers target help desks and identity systems, traditional security perimeters are proving insufficient against agile, socially-engineered threats.
1
2
1
Identity Is the New Perimeter: Why Proofing and Verification Are Business Imperatives via @torsten_george via @SecurityWeek -
securityweek.com
The future of secure digital engagement depends on continuous identity verification and proofing that can scale with risk.
0
1
3
Cybersecurity isn’t just about collecting data — it’s about proving your defenses work. That’s where KPIs come in. Read https://t.co/cTqQOhnzTl via @torsten_george via @SecurityWeek to learn how to put cybersecurity KPIs into action.
securityweek.com
In the end, cybersecurity isn’t just about collecting data. It’s about proving that your defenses actually work.
1
1
5
Security Theater or Real Defense? The KPIs That Tell the Truth -
securityweek.com
In the end, cybersecurity isn’t just about collecting data. It’s about proving that your defenses actually work.
0
0
0
Demystifying Security Posture Management -
securityweek.com
While the Security Posture Management buzz is real, its long-term viability depends on whether it can deliver measurable outcomes without adding more complexity.
0
0
0
A Guide to Security Investments: The Anatomy of a Cyberattack -
securityweek.com
Organizations must recognize that security is not about the number of tools deployed, it is about ensuring those tools effectively disrupt the attack chain at every stage.
0
0
1
If you gave DeepSeek a spin, did you consider #security and #privacy risks beforehand? Nice #securitytips @torsten_george
https://t.co/gnT3KQqOPO
#infosec #cybersecurity #SMBs #startups #securityaware
securityweek.com
Millions of uninformed users have flocked to DeepSeek and share personal information without considering security or privacy risks.
0
1
1
DeepSeek Exposes Major Cybersecurity Blind Spot -
securityweek.com
Millions of uninformed users have flocked to DeepSeek and share personal information without considering security or privacy risks.
0
0
0
Phishing: The Silent Precursor to Data Breaches -
securityweek.com
Phishing is more than a mere nuisance—it is a formidable precursor to destructive data breaches.
0
0
0
The Biggest Inhibitor of Cybersecurity: The Human Element -
securityweek.com
Essential steps such as security awareness training, MFA, and Zero Trust identity management help organizations reduce the human element and stay ahead in the cybersecurity curve.
0
0
0
Are you curious to how to safeguard against supply chain cyberattacks? Check out this article via @torsten_george via @SecurityWeek -
securityweek.com
As organizations have fortified their defenses against direct network attacks, hackers have shifted their focus to exploiting vulnerabilities in the supply chain to gain backdoor access to systems.
0
1
2
Unlocking the Power of AI in Cybersecurity -
securityweek.com
As adversaries increasingly exploit AI, security practitioners must not fall behind. What does it take to unlock the full potential of AI in cybersecurity?
0
0
0
It’s Time to Reassess Your Cybersecurity Priorities - Torsten George marks his 100th column for @SecurityWeek over a ten-year span. Congratulations and thank you @torsten_george for being part of this journey!
securityweek.com
A cyber resilience strategy is vital for business continuity and can provide a range of benefits before, during, and after a cyberattack.
1
2
3