The Campbell University College of Arts and Sciences has announced the formation of a new academic department, the Department of Security and Computing, which will house cybersecurity, homeland security and ITS programs.
Bob Olsen, Senior Managing Director, has been appointed Global Head of Cybersecurity and Privacy at Ankura, global business advisory services firm. Based in Baltimore, Olsen will be responsible for supporting the continued expansion and growth of the firm’s cybersecurity and privacy practices in both existing and developing markets.
What are seven concrete steps you can put in place to address visitor management in this crisis situation and during your recovery phase for re-entry to the office?
As a future of remote work comes into focus, IT and security professionals are becoming increasingly aware that employees could unknowingly leave a door open to fraud, cybercrime and more.
Mount Sinai Health System has appointed Kristin Myers, MPH, as Executive Vice President, Chief Information Officer, and Dean for Information Technology (IT). Myers most recently served as Senior Vice President for Technology.
A new report by researchers at the Massachusetts Institute of Technology (MIT) and University of Michigan discusses the cybersecurity vulnerabilities associated with OmniBallot, a web-based system for blank ballot delivery, ballot marking and (optionally) online voting.
Fifty-six (56) percent of employees are using their personal computers as their company’s go remote in response to COVID-19 according to the Work-from-Home (WFH) Employee Cybersecurity Threat Index released by Morphisec.
Security awareness training is no longer a “nice-to-have” for organizations. End users have become a critical component of effective security postures. Employees must have a strong understanding of cybersecurity best practices and learn how to detect and defend against targeted attacks. This shift in priority is needed to address an ongoing trend in the larger threat landscape. Cybercriminals have moved away from complicated, time-consuming technical exploits to concentrate on end users, a large and frequently vulnerable attack surface. Small or large, nearly every attack now begins in the same way: by relentlessly targeting people through email, social networks, and/or cloud and mobile applications.