We’ve all used different types of entrances as we move about in the world: swing doors, sliding doors, revolving doors, gates and turnstiles. Aside from providing access into buildings, how many people consider that certain types of entrances can reduce costs and sometimes create opportunities to make money?
Essentially, one-third of analysts’ time is being spent on processing alerts that have unknowingly already been processed, and at present SOC teams are left with little ability to make this distinction resulting in massive manpower drain.
Cyber criminals are now using sophisticated social engineering techniques to target employees and trick them into handing over funds and divulging sensitive corporate data. Luckily there are a number of steps organizations can take to protect themselves and their employees from this increasingly popular and successful form of threat.
Recently I had a conversation with a CSO who discussed the disconnect between a technology vendor’s (manufacturer) product roadmap and his organization’s needs. “I go to these conferences and it seems they are creating solutions without any understanding of how we are organized, our organizational measures of performance, or our challenges with risk and resilience,” he said.
Between illnesses, family tension and medical bills, hospitals are already harbors for stress, and nothing escalates a stressful situation into a dangerous one faster and more unnecessarily than poor customer service, says Jim Sawyer, Director of Security Services for Seattle Children’s Hospital.
Terrorism is changing. The Center for Cyber & Homeland Security at George Washington University is striving to bring science to the art of security decision-making. What can their research into cyberattacks, terrorism and the evolving threat environment do to help your enterprise? Read about this, sports security, security culture and awareness and more in the July issue.