Secured

MarketScale

We will be talking to top security experts, legislature, and school administrators to get an inside look on how parents and school staff can be the two golden components of any successful security plan.

  1. How Is AI Reshaping Trust and Fraud in the Workplace

    4D AGO · BONUS VIDEO

    How Is AI Reshaping Trust and Fraud in the Workplace

    In this Secured clip, Andrew Feigenson, CEO of InformData, explains how AI is fundamentally reshaping trust in the workplace — both by enabling more sophisticated fraud and by strengthening detection. With the rise of AI-generated resumes, fabricated credentials, and synthetic identities, identity fraud is becoming harder to detect and easier to scale. This evolution raises the bar for employers and screening providers, who can no longer rely on traditional verification methods to ensure accuracy. At the same time, AI is equipping organizations with more powerful tools to combat these risks. Machine learning can identify subtle data patterns that signal fraud, detect inconsistencies that human reviewers might overlook, and accelerate verification processes — improving both security and the candidate experience. But Feigenson emphasizes that the most important shift is conceptual. Risk is no longer binary. It’s not simply “cleared” or “not cleared,” nor is it confined to a single moment in time. Instead, trust must be contextual, ongoing, and adaptive. He draws a parallel to cybersecurity: just as one-time security scans are insufficient in a constantly evolving threat landscape, background screening cannot remain a static, check-the-box compliance exercise. It must become part of a broader, continuous trust strategy — one that protects not only the organization, but also its clients, partners, and workforce.

    2 min
  2. Why Are Deepfakes Becoming One of the Biggest Security Threats?

    6D AGO · BONUS VIDEO

    Why Are Deepfakes Becoming One of the Biggest Security Threats?

    In this Secured clip, Jason Crawford, Founder and CEO of Sware, discusses how artificial intelligence is fundamentally reshaping trust in digital media. Today, nearly every industry — from insurance and logistics to healthcare, security, military, and intelligence — relies on digital content to communicate, validate processes, and substantiate decisions. The authenticity of that content has long been assumed. But as AI enables the creation of hyper-realistic synthetic media, that assumption is eroding. Crawford warns that we are entering a world where the burden of proof shifts. Historically, the responsibility was to prove that something was fake. Increasingly, organizations will need to prove that something is real — particularly in high-stakes environments like the legal system, where evidentiary standards will inevitably tighten. Most current efforts focus on defense: forensic analysis designed to detect manipulated media after it circulates. But Crawford argues this approach is unsustainable. As the velocity and sophistication of AI-generated content increases, detection becomes a reactive, unwinnable arms race. Instead, he advocates protecting authenticity at the moment of creation — establishing an independent chain of custody that secures not just the pixels or audio, but the full context: when, where, how, and by whom the content was recorded. By separating security from the asset itself — using cryptographic fingerprints and distributed verification models — organizations can create stronger, tamper-evident proof of authenticity before trust is compromised.

    5 min
  3. What Advice Do You Give Teams to Catch Social Engineering Tactics Early?

    JAN 16 · BONUS VIDEO

    What Advice Do You Give Teams to Catch Social Engineering Tactics Early?

    In this Secured bonus soundbite, Amanda Singleton, Customer Care Manager at Lightcurve, highlights one of the most common—and effective—tactics used in social engineering attacks: urgency. Singleton explains that scammers succeed not because of sophisticated technology, but because they exploit human behavior during busy, distracted moments. By creating a sense of urgency, attackers pressure individuals to act quickly, bypassing normal verification steps and critical thinking. She emphasizes a clear best practice her teams reinforce with customers: legitimate organizations will never request confidential information through unsolicited messages. Any unexpected request for sensitive data should be verified through a trusted, alternate channel—such as calling a known phone number or logging into an official account portal. This guidance is especially important as phishing and impersonation attempts become more convincing and widespread. Attackers are intentionally trying to interrupt routines, trigger emotional reactions, and rush decisions before red flags are noticed. Singleton’s advice aligns closely with a core theme of Secured: strong security isn’t just about tools—it’s about habits. Slowing down, questioning urgency, and validating requests can stop many attacks before they cause harm. In an environment where speed is often rewarded, she reminds organizations that hesitation can be a powerful defensive move.

    1 min
  4. Why Optimism Bias Can Undermine Workplace Safety

    JAN 15 · VIDEO

    Why Optimism Bias Can Undermine Workplace Safety

    In this Secured bonus soundbite, Joshua Sullivan, Chief Operating Officer and Master Instructor of the Alive Active Shooter Survival Training Program, addresses one of the most overlooked gaps in organizational safety: mindset and preparation. Sullivan explains that many organizations remain trapped in “optimism bias”—the belief that violence is unlikely to happen to them—despite clear evidence that workplace violence and political intimidation are occurring across offices, hospitals, schools, and public spaces nationwide. This mental blind spot, he argues, is one of the biggest barriers to effective preparedness. When high-stress incidents occur, people don’t default to logic—they default to training. Without prior preparation, the brain is more likely to freeze in a fight-or-flight response. Sullivan emphasizes that proactive training gives individuals something to fall back on in moments of chaos, increasing the likelihood of decisive, life-saving action. He draws a powerful comparison to fire drills, which most people have practiced since childhood, despite fires being statistically less likely than workplace violence events. The imbalance highlights a critical need for organizations to treat violence preparedness with the same seriousness and repetition. Sullivan’s message reinforces a core theme of Secured: resilience isn’t built during a crisis—it’s built long before one occurs. By confronting bias, investing in accessible training, and normalizing preparedness, organizations can better protect their people in an increasingly unpredictable environment.

    2 min

About

We will be talking to top security experts, legislature, and school administrators to get an inside look on how parents and school staff can be the two golden components of any successful security plan.