One of the largest Sea Bass and Bream fish farms in the Mediterranean for sustainable aquaculture, Avramar, wanted to improve the security arrangements of the farms, to ensure that both their assets and their employees were well protected.
Apple announced it will start enforcing a new privacy notification rule that digital advertising firms such as Facebook have warned will hurt their profits.
The Vanderbilt University Public Safety team is reminding students and staff that it exists to keep them as safe as possible and provide a welcoming educational environment.
A new CISCO Talos Intelligence report explores how cybercriminals are increasingly abusing the communications platforms that many organizations use to facilitate employee communications. According to the report, communication platforms have allowed attackers to circumvent perimeter security controls and maximize infection capabilities. Over the past year, adversaries are increasingly relying on these platforms as part of the infection process.
Researchers at Rapid7 evaluated five areas of cybersecurity that are both critical to secure to continue doing business on and across the internet, and are squarely in the power of CISOs, their IT security staffs, and their internal business partners to address, in their new round of Internet Cyber-Exposure Reports (ICERs). These five facets of internet-facing cyber-exposure and risk include:
The National Center for Spectator Sports Safety and Security (NCS4) at The University of Southern Mississippi (USM) recently completed a product operational exercise for an RF-based detection system. The two-part exercise included a demonstration of the technology in the company’s laboratory and observation of it in use at a concert at Ruth Eckerd Hall in Clearwater, Fla.
SAP systems running outdated or misconfigured software are exposed to increased risks of malicious attacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned. SAP applications help organizations manage critical business processes—such as enterprise resource planning, product lifecycle management, customer relationship management, and supply chain management.