Steven Seiden, president of Acquired Data Solutions (ADS), has been involved in “digital divide issues” for more than 20 years, and he believes broadening inclusion and diversity in the STEM literacy field is one of his purposes. An engineer by trade, Seiden has experienced a shift in the tech world over the years, watching the convergence of technology, IT and IOT and noting the ever-expanding engineering lifecycle that now includes security.
Taking a project management approach to its comprehensive COVID-19 pandemic response, Boeing’s Security & Fire Protection and Health Services business units placed collaboration, communication and actionable data at the forefront to make unified, informed decisions across the enterprise.
Boeing took a project management approach to its comprehensive, unified COVID-19 pandemic response co-led by the organization’s Security & Fire Protection and Health Services business units. Putting communication and actionable data at the forefront, the organization made informed decisions to minimize operational disruption and ensure the safety of its employees including site suspensions, COVID-19 specific protocols, PPE distribution and more.
Thursday, May 6 is World Password Day, a day dedicated to promoting safer password practices. Strong password management has been especially important as cyberattacks have skyrocketed since the onset of the pandemic and the switch to remote work. Here, security executives share their insight and tips on how to create and promote safer password practices in the enterprise and among employees.
Episode three of the Cybersecurity and Geopolitical video podcast is up and ready for viewing! We are also now offering an audio version to listen to anytime, anywhere, including from Apple podcasts.
Many security researchers are now predicting that deepfakes could become a major security threat in the 2021-2022 period. Where is the threat and what can you do about it?
In recent years, there has been a recognition that social engineering plays a huge part in the execution of cybersecurity attacks. The intersection of “non-physical” and “technical” social engineering is where criminals are mostly focused today. Enter deepfake technology, which poses a looming risk over enterprises and their security leaders as they figure out how to prepare for and mitigate such a risk.
Recently, TalentLMS partnered with Kenna Security to survey 1,200 employees on their cybersecurity habits, knowledge of best practices, and ability to recognize security threats. Here are some of the staggering results that offer some explanation as to why cybercrime has grown into such a lucrative business:
As a young boy, Frank Figliuzzi had a sense of right and wrong, good and bad. He was so interested in criminal justice that at the age of 11, he wrote a letter to the head of the Federal Bureau of Investigation (FBI) asking for advice on a career in the field.
Take a look at CISO of DoorDash Justin Grudzien’s career in data privacy and security from building security teams from the ground up at Orbitz to solidifying best practices at DoorDash. Security talks to Grudzien about how he views security roles within the enterprise, how to avoid burnout, and how other security leaders can earn a seat at the C-Suite table.