Bullies poison their work environment with low morale, fear, anger, gossip and depression. The employer pays for this in lost efficiency, absenteeism, high staff turnover, severance packages and lawsuits.
Today’s center of gravity in cybersecurity is shifting, pulling the skills and experience of cyber defenders in new directions. In most companies, this situation has led to a convergence of responsibilities between physical security, information security and cybersecurity teams, and an increased commitment to “staffing-up” of dedicated “cyber defenders.”
An inexplicable rise in organized retail crime during the past couple of years, perhaps due to police passivity, has major retailers looking to upgrade their equipment, technology, policies and procedures, and training for employees to combat loss prevention.
Mike Tyson notably said, “Everyone has a plan ‘till they get punched in the mouth.” So, how do you ensure the same doesn’t hold true for your company’s incident response plan when a real breach occurs? Enter the NIST Framework category titled Mitigation.
It’s February. We all know you aren’t going to the gym and eating a salad every day, so let’s stop pretending you’re keeping any of your other new year’s resolutions. But instead of beating yourself up, let’s talk about the resolutions you should have made – the ones that are actually going to stick and make your life easier. They might even impress your boss.
Frontex, the European Border and Coast Guard Agency, has begun collecting personal data of persons suspected of people smuggling, terrorism and other cross-border crimes collected as part of its operation in Greece.
The new Donald Trump administration will attempt to manage many challenges, but cannot eliminate them. After all, these forms of political violence have existed since time immemorial and will continue for generations.
A lack of skilled staff remains the top security concern for organizations, according to the State of Security Operations Report. One way organizations can mitigate this challenge is to hire security consultants. These professionals work closely with their clients to help solve issues, implement best practices, and provide guidance.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!