Dr. Stacey Hall has been named the new interim Director of The University of Southern Mississippi’s National Center for Spectator Sports Safety and Security (NCS4), following the retirement of the center’s founder, Dr. Lou Marciani.
Why is cybersecurity so often overlooked by Operational Technology engineers? The answer can be traced to four common myths. Here, we explore why these four misconceptions are no longer true in today’s highly interconnected world and discuss the differences between IT and OT networks, and share some best practice guidelines to help your organization successfully overcome these IT-OT differences and transition to IIoT or Industry 4.0 systems.
The human trafficking industry enslaves millions of men, women and children. What does human trafficking look like, and what role does enterprise security play in preventing this crime?
Heading into 2020 no one could have predicted how a then-mysterious new coronavirus would cripple global business, as it is now. The last time a global crisis struck with such force, it was a man-made event – when the subprime mortgage crisis in 2008 caused the worst recession in U.S. history since the Great Depression. What are four different dimensions of risk enterprise security leaders need to assess right now?
Though anticipating and preparing for the future is always smart business, there are some industries which take it a step beyond the norm. In cybersecurity, the concept of “future proofing” is essentially the modus operandi everyone adheres to considering just how quickly a massive breach can turn the tide on our collective defenses. By their very nature, security professionals are constantly preparing to head off new threats by diagnosing them and creating an active defense model that makes it nearly impossible - and absurdly expensive - for hackers to get at their data.
The legalized marijuana industry is one of the fastest-growing industries in the U.S. Here are some solutions available to cannabis growers and dispensaries that may help comply with security and surveillance requirements.
To prevent damage from phishing attacks, organizations need to take a few simple but important steps to improve their email security posture. Follow these six strategies, and your email infrastructure will be far safer from phishing and business email compromise (BEC).
As companies throughout the world turn to teleworking as a way of continuing operations in the face of COVID-19, employees and security teams alike have understandably faced growing pains in adjusting to this new reality. Here are five easy-to-follow tips that remote employees can follow to mitigate the risk of digital surveillance while working from home.
(ISC)² announced that the Certified Information Systems Security Professional (CISSP) certification has been found comparable to Level 7 of the Regulated Qualifications Framework (RQF) in the UK, denoting that the certification is comparable to Masters degree standard.