Organizations face many threats to their data systems and information. Knowing all of the fundamental elements to cyber safety is the first step to fulfilling these threats.
The reach of cyber protection is broad. The core regions are explained below, and some other fantastic cyber security plan must take all of them into consideration.
Original research from CybelAngel takes a look at how cybercriminals plan healthcare-related fraud, ransomware and other attacks by obtaining stolen credentials, leaked database files and other materials from specialized sources in the cybercrime underground.
Two large phishing attacks, aimed at a combined 10,000 victims, spoofed emails from FedEx and DHL Express in an attempt to steal their targets' business email account credentials.
The Phoenix Suns Arena will install 26 X-ray inspection systems, adding a new layer of protection to attendees against potential threats such as weapons and explosives. It also will help intercept other prohibited items, and reduce hands-on searches.
Local governments, including counties and municipalities, face unique cybersecurity challenges that can too easily disrupt the delivery of mission-critical services. With continuous threats of ransomware and other malicious attacks to derail day-to-day municipality function, like water infrastructure, waste management and more, the security of these entities is of top national priority. Here, we talk to Mike Hamilton, CISO for government cybersecurity firm, CI Security, about the biggest threats to the U.S. critical infrastructure.
There are numerous solutions organizations can implement to mitigate risks associated with employee use of corporate connected devices in the execution of personal business. In this article, we will delve a bit deeper to explain the pros and cons of implementing a few of the more common solutions. It is important to note, that regardless of the solution, an effective awareness and training program for employees is the number one most effective safeguard for your organization.
Joseph LeMire will serve as North Carolina-based Elon University’s Chief of Campus Safety and Police.
Jaguar Racing announced that it has partnered with enterprise software provider Micro Focus, ahead of season seven of the ABB FIA Formula E World Championship. Initially, Micro Focus will provide technology to deliver high-performance advanced analytics and machine learning to ensure the Jaguar team performs at top speed for winning results. Micro Focus will also conduct a cyber resilience assessment workshop to help the team identify any potential risks and gaps in their cybersecurity posture.
Erik Antons, Chief Security Officer of Whirlpool Corporation gives Security his first-hand account of his inspired career in security, including navigating a layoff and coming out on the other side.
A new study finds that one in four consumers admit to using their work email or password to log in to consumer websites and applications such as food delivery apps, online shopping sites and even dating apps.
On Feb. 22, 2021, the “Minnesota Consumer Data Privacy Act” (MCDPA) was introduced in the Minnesota House of Representatives. The MCDPA is now the primary candidate to become Minnesota’s omnibus consumer privacy law. To learn more about the MCDPA and privacy regulations, Security magazine spoke to attorney Nadeem Schwen, from Winthrop & Weinstine, who has been at the forefront of this bill’s creation and leads data privacy work for the firm.
The Department of Homeland Security will allocate $1.8 billion in grants to state and local jurisdictions to protect against terrorism and other disasters, with at least $77 million specifically going toward combatting domestic violent extremism.
With 94% of organizations reporting an identity-related breach at some point, getting a solid Identity Governance and Administration initiative off the ground and scaling it is no longer a nice-to-have, but a need-to-have.
As the global pandemic forces more people to work remotely than ever before, it’s important to take steps to protect both your personal and company data from online threats.
Netskope revealed new research showing that the majority of all malware is now delivered via cloud applications, underscoring how attackers increasingly abuse popular cloud services to evade legacy security defenses putting enterprise data increasingly at risk. The findings are part of the February 2021 Netskope Cloud and Threat Report, which analyzes the most interesting trends on enterprise cloud service and app use, web and cloud-enabled threats, and cloud data migrations and transfers.
Contact center call volumes will vary from industry to industry and from month to month, but the general trend is steeply upward. Adding new agents isn’t the only or even the most efficient way that contact center managers can respond to the great COVID crunch of 2021. A properly deployed Interactive Voice Response system can make workloads manageable for agents while keeping customers from long and frustrating minutes on hold. Still, new options for callers may correspond to new opportunities for attackers.
The International Foundation for Protection Officers (IFPO) is announcing today that funding has been secured for a security research project that will aim to provide comprehensive data on the roles and responsibilities of today's security officers, including insights into their ever-evolving role.
In a report titled, “COVID-19 Vaccine Security Assessment,” analysts at G4S detail the security threats – both physical and cyber – associated with vaccine distribution across the U.S. and around the globe.
The restaurant chain, El Pollo Loco, was looking for a way to cut false alarm costs and deter crime. By switching to a managed service provider for its physical security management, the restaurant chain has been able to save significant money each year in false alarm costs, as well as receiving better overall value from its current systems.
A new study by (ISC)², conducted in 2020, revealed that the cybersecurity profession experienced substantial growth in its global ranks, increasing to 3.5 million individuals currently working in the field, an addition of 700,000 professionals or 25% more than last year’s workforce estimate. The research also indicates a corresponding decrease in the global workforce shortage, now down to 3.12 million from the 4.07 million shortage reported last year. Data suggests that employment in the field now needs to grow by approximately 41% in the U.S. and 89% worldwide in order to fill the talent gap, which remains a top concern of professionals. Security experts, like Sarah Tatsis, VP of Advanced Technology Development Labs at BlackBerry, believe women can help solve the cybersecurity workforce shortage. Here, we speak to Tatsis about why women are needed and valued in the ongoing fight against cybercriminals.
Emergency communications are changing. At the City of Stamford, Conn., Joe Gaudett, Director of Emergency Communications says that his biggest focuses right now are keeping his staff safe and secure; having enough resources; and using technology to continue to function and respond safely and efficiently to serve its citizens. Learn how Gaudett and the city of Stamford have responded to COVID-19 and implemented new technologies to help ensure operational efficiency and increase safety and security.
Each week. Kastle Systems has been monitoring access control data to find out building occupancy among American enterprises and determine which cities remain the most open amid COVID-19 and the work-from-home movement.
As part of an initiative to enhance safety and security as well as support for staff and more than 17,000 students, Trinity College Dublin implemented a technology which helps first responders better pinpoint the location of calls for help, emergencies and other incidents.
A more foundational goal is to make security and compliance part of the development process from the start. This is a transition that requires DevOps to bring along risk, security and compliance teams into the shared responsibility of making the organization resilient to change. But bringing the idea of shared responsibility to fruition can be difficult because there is a natural tension between DevOps and SecOps, as they have different charters and cultures. DevOps can be seen as more of a do culture (Atlassian calls this a “do-ocracy”) and SecOps can be seen as a control culture and they are inherently in conflict. To fulfill the promise of teaming for shared responsibility, DevOps and SecOps should align on three key objectives: collaboration, communication and integration.
Hagerty Consulting, a firm specializing in emergency management and homeland security consulting, announced the addition of Lee Mayfield as the company’s first Director of Response.
Internet usage in 2020 rose sharply compared to pre-pandemic levels. More online activity also drove more consumer consciousness around what happens to their online data; nearly three-quarters (72%) of Americans say they are "very concerned" to "extremely concerned" about their online privacy, according to a new Startpage study.
How can electronic access control solutions and other devices like biometrics technologies be configured to help mitigate unauthorized entry through swing doors and turnstiles? Here, we’ll take a look at swing doors and turnstiles first, then the high security revolving doors and mantrap portals.
In a recent State of DDoS Weapons Report for H2 2020, which covers the second half of 2020, researchers saw an increase of over 12% in the number of potential distributed denial of service weapons available on the internet, with a total of approximately 12.5 million weapons detected. So how can organizations defend against this common and highly damaging type of attack?