Monitoring for unusual activity, hardening access privileges and regularly testing backups are among the top strategies to mitigate cyber threats targeting the active directory (AD) of an organization.
Save the date for the top 17 security conferences taking place in 2022, with topics ranging from restaurant loss prevention and fire safety to government security initiatives and international intelligence sharing.
Enterprise security leaders can learn the five types of social media risk and follow these steps to help mitigate it and develop long-term risk management strategies in their organizations.
Security operations center (SOC) employees can be overwhelmed by false alarms. Artificial intelligence (AI)-based access control and monitoring can help security leaders identify credible threats.
Enterprise security leaders are managing the shift to endemic COVID-19 and the prolonged health risks of the pandemic. Here’s how the security industry has shifted over the last nearly two years.
Security chats with James Turgal, Optiv VP of Cyber Risk, Strategy and Transformation, about risk management, business continuity and the importance of succession planning in 2022.
Security leaders looking to mitigate risk of black swan events in their critical infrastructure organizations can follow some steps to emergency-proof their organization, including looking outside their firm for perspective.
Enterprise security executives generally don’t plan for nation-state-level cyberattacks on their businesses. That may change going forward, when analyzing new trends in hacking and cybersecurity.