Multiple cyber-attacks and compromise of personal information of millions of people globally show that the complexity and intensity of cybersecurity attacks are on the rise, and it could have broader political and economic ramifications. As cybercrimes become more lucrative and cybercriminals become smarter, cybersecurity too will have to be intelligence driven, enabling a swift response to the advanced attacks.
BetterCloud released its first insider threats report: “State of Insider Threats in the Digital Workplace 2019.” The report found that 91 percent of IT and security professionals surveyed feel vulnerable to insider threats, and 75 percent believe the biggest risks lie in cloud applications like popular file storage and email solutions such as Google Drive, Gmail, Dropbox and more.
Many physical security infrastructures were developed and implemented without considering cybersecurity for our IoT driven world. Network and communication protocols for remote control and management had assumed closed, non-public networks. However, these systems evolved to be highly interconnected systems with open, public networks.
What is the cloud’s role in commercial physical security? If you are in charge of security for your company, here’s what you need to know to ensure you use the latest technology to prevent physical security breaches.
A podcast exploring the processes and payoffs of transitioning to a cloud-based physical security solution.
March 19, 2019
Listen to this podcast featuring David Stratton, Security Manager of a well-known national distributor of automotive products with 150+ locations, as we explore the processes and payoffs of the transition to a cloud-based physical security solution.
Organizations are doing some fancy footwork with security these days in order to simultaneously protect users yet empower them to perform various tasks online. As application workloads and activities move to one or more cloud environments, organizations have also begun to ask what they should do to ensure proper cloud security.
A new report from The Bunker has highlighted that senior executives are still often the weakest link in the corporate cybersecurity chain and that cybercriminals target this vulnerability to commit serious data breaches.
Our May issue cover article features “How SOCS Help in Training Security Professionals”.
Also in May, license plate reader technology is on the rise. How can LPR technology secure perimeters and lessen cybersecurity threats? And discover "How to meet the Growing Demand for Cybersecurity Professionals".