The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
Fact is, security in the cloud needs improvement. The problem is that cloud service providers treat cloud security as a shared responsibility with their customers. And while cloud purveyors typically hold up their end of the bargain, many customers do not. Human error among cloud customers is rampant.
As travel continues to make its comeback, businesses need to be taking a renewed look at their duty of care policies to provide their road warriors with the adequate — and expected — level of safety and security.
The security and safety hazards for hospitality workers are so diverse, and physical security leaders within the organization need to protect frontline staff with a proactive, comprehensive approach to their well-being.
The ethical issues that exist around the wake of discovered security vulnerabilities are vast and murky. Far too often, the conversation about how and when to disclose security weaknesses shifts from a dialogue to a one-way monologue. What's a security leader to do?
5G, as often happens with new technologies, will likely introduce both digital and business revolution along with a plethora of new threat vectors. In particular with the exposure of new connected devices, industries and services, and sensitive assets will undoubtedly be affected by new cyber threat agents; the EU, however, is ready to mitigate these potential threats.
The fragility of supply chain security in many ways, rests on the shipping container. The incident in the Suez Canal has shed light on vulnerabilities and complexities within the supply chain.
One of many consequences of the COVID-19 pandemic is an increase in cybersecurity risks and in the complexity of implementing effective security to protect organizational information and computing infrastructure. As with pre-COVID security threats, well-proven cybersecurity strategies based on user and device authentication remain effective, and they now are more important than ever.
If security forces are going to perform more functions, which they should...they need additional training. More training for your security teams is an expensive proposition, but an all-important one.
Disaster recovery as a service can potentially save organizations money and resources while ensuring they’re prepared for an incident that could potentially put them out of business. But what is DraaS, how can it be implemented at your organization and what are the benefits?
Repurposing video surveillance and artificial intelligence and analytics traditionally used for security initiatives within the healthcare space can increase positive patient interactions and bring additional value to your current electronic physical security solutions.