We’ve all used different types of entrances as we move about in the world: swing doors, sliding doors, revolving doors, gates and turnstiles. Aside from providing access into buildings, how many people consider that certain types of entrances can reduce costs and sometimes create opportunities to make money?
Essentially, one-third of analysts’ time is being spent on processing alerts that have unknowingly already been processed, and at present SOC teams are left with little ability to make this distinction resulting in massive manpower drain.
Cyber criminals are now using sophisticated social engineering techniques to target employees and trick them into handing over funds and divulging sensitive corporate data. Luckily there are a number of steps organizations can take to protect themselves and their employees from this increasingly popular and successful form of threat.
Recently I had a conversation with a CSO who discussed the disconnect between a technology vendor’s (manufacturer) product roadmap and his organization’s needs. “I go to these conferences and it seems they are creating solutions without any understanding of how we are organized, our organizational measures of performance, or our challenges with risk and resilience,” he said.
Between illnesses, family tension and medical bills, hospitals are already harbors for stress, and nothing escalates a stressful situation into a dangerous one faster and more unnecessarily than poor customer service, says Jim Sawyer, Director of Security Services for Seattle Children’s Hospital.
Social media is transforming corporate security in fundamental ways. Here are five trends that chief security officers, intelligence analysts and others need to consider when building a social media strategy.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!