After decades of building security operation centers (SOCs) and developing enterprise cybersecurity programs, Sumo Logic Chief Security Officer (CSO) George Gerchow reflects on how best to instill a security-minded culture in an organization in the latest The Security Podcasts episode.
Elias Oxendine has been named Chief Information Security Officer (CISO) at Yum! Brands, a fast food provider operating Pizza Hut, Taco Bell and other restaurants around the globe.
The 2022 Insight Intelligent Technology Report found that security is a top priority for IT leaders in multiple facets of their work, including taking on new responsibilities and integrating cloud technology.
A new survey on how information technology (IT) employees perceived their work environment revealed that 72% of IT professionals are considering leaving their jobs an looking for other opportunities within the next twelve months. Find out why here.
The city will upgrade its IT department security with cloud support and end-user protections for its employees, many of whom work remotely due to the COVID-19 pandemic.
Back away from the snooze button. This is a $29 million wake-up call you can’t afford to miss. In January 2019, Yahoo’s board agreed to pay the enormous $29 million settlement to its shareholders as the result of cyberattacks that compromised three billion Yahoo user accounts. It was the first time shareholders had successfully held a company responsible for data breaches. And it is a loud warning to corporate boards that they must start paying attention to cyber risks. But are they?
Widespread adoption of IP network-based solutions within the physical security industry is creating an increasing interdependency upon an infrastructure, which in most cases is owned and operated by a department outside of physical security. This mirrors current and historical trends within video conferencing and voice communication systems. The challenge for these systems, and security executives overseeing them, is to understand the choke points, the quality of service requirements and the backup operations that are in place.