As infrastructure trends as one of the top national priorities, the IRS leak is an important reminder that we need to prioritize innovation and security in our digital infrastructures.
It is more critical than ever to prioritize fixing vulnerabilities to combat attacks and preserve valuable data by using advanced comprehensive technologies and solutions.
Benefit plan sponsors and plan fiduciaries should take note and act quickly – the Department of Labor (DOL) has issued a new cybersecurity guidance package with far-reaching effects and has already begun including this in its enforcement efforts.
Artificial intelligence (AI)-based technology seems poised to enhance nearly every aspect of our lives. The security industry is no exception where we see AI-based object detection and classification providing analytics with increasingly reliable data. One of the chief benefits is the reduction of false alarms, and the ability to finally reap the benefits analytics have promised for security and business intelligence.
Today, off-the-shelf commercial drone technology poses a significant threat to governments, corporations and the public. While the positive use cases for deploying commercial drones are many, like all technologies, drones have a dark side that security professionals must prepare for.
Sumo Logic research reports that 56% of companies with more than 10,000 employees receive more than 1,000 security alerts every day, and 93% say they cannot address all alerts the same day. Cybercriminals are also aware of alert fatigue and count on IT to ignore many security alerts. So, what can you do?
Security spoke to Kimber Goerres, Security Systems Integration & Project Management Lead at Sony Electronics, who has served diligently in her role, ensuring the company’s error or down rate is nominal and establishing the technical security requirements for Sony offices globally. Here, Goerres speaks about her role, establishing technical security requirements and ensuring improved security levels through risk, vulnerability and audit assessments.
In the past, passwords were the key to accessing systems and platforms, and they held much value as a security measure for businesses. But over time, the threat landscape has evolved, and weaknesses have been discovered in standard encryption methods that have diminished the password’s value.