Part of any good cybersecurity program rests on spreading good habits and inculcating employees with best practices around handling data and using network resources. In this cybersecurity is as much a behavioral challenge as it as a technological one. That’s precisely why the recent coronavirus outbreak, or COVID-19, is so potentially harmful to a company’s cybersecurity efforts.
Women face unique entry barriers in the security industry, discouraging many from pursuing careers in the industry in the first place. This trickledown effect, combined with a lack of recruiting and mentorship opportunities, means the security workforce is drastically lacking in gender diversity. When companies prioritize female leadership development and break the stigma, they create diversity of thought in the process, driving their own success.
Becoming a new CISO brings new exciting opportunities and responsibilities but also new challenges and pressure. In the past few years, the role of the CISO has become increasingly complex as it evolves from a predominately technical role to a more strategic, advisory capacity.
Human resources departments (HR) handing out information sheets is not going to curb the spread of the Coronavirus (COVID-19). Training has to be conducted in concert and in person to all by the security department, as, it is a security threat. Here are some protocols and policy management procedures your enterprise and security department should consider to mitigate the spread of Coronavirus.
Richard Amburgey was recently named Chief Security Officer for the Bureau of Labor Statistics (BLS). It’s the first time that the agency has had someone within the CSO role. What is his main focus in his new role and what are his initial priorities over the next six months?
This series is focused on a step-by-step approach for security leaders to design, implement and measure a physical security program that supports organizational priorities and operates with buy-in from organization’s leadership team. Here, we'll explore the steps necessary for developing a risk mitigation strategy.
University and college campuses are changing. The increase in ride-share and food delivery services means that there are more unauthorized and unidentified people accessing these spaces than ever before. While these services provide tremendous benefits to the university population, they can also raise security concerns.
As we look ahead to the rest of 2020, securing identity access will once again be everywhere, but we are predicting that with the help of artificial intelligence and machine learning (AIML), there will be a more positive narrative to creating and managing an immutable digital identity.
By 2021, cybercrime will cost about 6 trillion dollars a year. With an ever-increasing amount of ways to connect to your network, IT security teams must be able to secure and mitigate this risk by prioritizing security concerns at earlier stages of the software development life cycle.