Ernie Anderson, Head of Professional Services at Kudelski Security, speaks to Security about the importance of a deputy chief information security officer (CISO) and why this position is critical to addressing security risk management.
With the proliferation of ransomware attacks, every business feels the pressure—and often a sense of futility—in defending against cybercriminals. But companies can regain control by focusing on one of the most common attack vectors: Active Directory.
It’s challenging to find feasible solutions to an ongoing risk of flight attendants and frontline transportation workers being subject to workplace violence or physical altercations with customers or the public. Risk professionals should ensure these employees have access to self-defense training and others tools, as well as look to implement a zero-tolerance policy for passenger disruptions.
Security spoke to Bill Wright, Director of Federal Government Affairs at Splunk, for a deeper dive into strategies federal organizations can use to facilitate expedited zero trust adoption.
Today’s technological advancements have made it possible for merchants to strike an effective balance between minimizing fraud and maximizing customer satisfaction. The following three tips can help companies balance strong payment fraud prevention while providing an exceptional shopping experience.
Finance teams within the enterprise are vulnerable to unique and specific risks, fraud and security challenges. Learn how security professionals can mitigate risk among teams responsible for accounting, payments, audits and everything in between.
As the vaccine rollout continues and organizations are planning their hybrid work plans, they must ensure this return to a physical office, even if it’s partial, doesn’t open them up to cybersecurity threats. Here, Rick McElroy, Principal Cybersecurity Strategist at VMware, discusses what chief information security officers should keep in mind as we get closer to returning to physical offices.
Zero trust has become the latest buzzword in the security industry. It’s helpful to analyze the model from the attacker’s perspective to identify assumptions or actions that could provide a foothold for cybercriminals.
Dr. Tommy Gardner, Chief Technology Officer of HP Federal, believes a proactive mindset that bridges the digital divide, recruits top talent and implements the right policies is needed for the U.S. to achieve success and remain competitive on a global scale. Here, he discusses how a national strategy for critical technologies can shape the industries of the future as well as address national security and global challenges.