Some of the most basic tenets of password account management have failed, leaving us with a dreadful combination of poor user experience and inadequate security.
A cybersecurity career can offer transitioning veterans a chance to meaningful employment, and that field is experiencing a remarkable shortfall that presents organizations with a challenge to find trustworthy qualified applicants.
Striving for consistent, around-the-clock video surveillance means needing to account for dynamic lighting conditions. Here are a few recently released security solutions on the market today.
Contrary to belief, today’s most damaging security threats are not originating from malicious outsiders or malware but from trusted insiders, both malicious insiders and negligent insiders.
In last month’s column I took you though the research process in preparing for the interviews of executives and other key functional leaders in the enterprise. Now that you are ready to start conducting interviews, it is important to have a core list of key questions that you will ask each interviewee, along with specific questions unique to their role or function.
Aside from your good name, what should you bring with you to your new employer? In today’s climate, the answer is adamantly not someone else’s intellectual property.
During a recent Security magazine webinar, the majority of attendees stated that they are looking for mass notification and audio products to improve emergency response during an active shooter incident.
Though there are big benefits to having a BYOD program, including boosting employee productivity and morale, as well as possible cost savings, security risks are a critical concern.