To start off Security's Women in Security month, we have a very special podcast! C.C. Meadows, Law Enforcement Director at the Fort Worth Independent School District talks with Editor Maggie Shein about her journey in security, along with the importance of training both security and non-security staff for emergency response.
Privacy and security become further inextricably linked as consumers’ expectations rise. With this understanding, how should businesses organize to fulfill the privacy and security promises that today’s customers expect? Dell's Chief Security Officer, John Scimone, believes that a converged operational model is the most effective and efficient approach for the majority of organizations to achieve these outcomes.
Over the last two years, ransomware has been, without a doubt, the hottest topic in cybersecurity discussions in both the cybersecurity community and the general population. Major attacks like the one on SolarWinds and against Colonial Pipeline have dominated headlines — and for good reasons.
It’s tempting to file the term “security research” with the likes of “jumbo shrimp” and “somewhat unique” under the heading of oxymorons. Compared to such business disciplines as law, economics, marketing, engineering, data science — and, now, even cybersecurity — business and corporate security lag behind.
Interviews have long been sources of angst for job seekers. Adding even more stress to an already stressful situation, the pandemic caused many organizations to move almost exclusively into virtually screening candidates. Candidates now need to prepare for their 15 minutes of (on screen) fame in addition to a possible in-person interview.
Threat intelligence is only one piece of the puzzle when it comes to improving supply chain security. As part of protecting the supply chain and reducing third-party risk, here's how your organization should get started.
Fact is, security in the cloud needs improvement. The problem is that cloud service providers treat cloud security as a shared responsibility with their customers. And while cloud purveyors typically hold up their end of the bargain, many customers do not. Human error among cloud customers is rampant.
The insider threat is not a new risk for security teams. And, in the wake of COVID-19 and the newly remote workforce, there has never been a greater need for organizations to better balance their efforts to defend against both external and internal threats.
Mira LaCous, Chief Technology Officer of the biometrics-led identity access management provider, BIO-key International, talks to Security magazine about current trends in biometric security.