I often catch articles in my newsfeed that are supposedly about identity governance but upon reading the fine print, they invariably wind up being about access management.
Cybercriminals hope to go unnoticed. They often work in the dark depths of the Internet, but now, they are showing their true colors in the COVID-19 pandemic.
According to the Federal Trade Commission’s Report, from January 1st through April 15th, Americans have reported losing $13.44 million dollars to fraud and they’ve received 18,235 reports related to COVID-19. To avoid coronavirus scams, it’s crucial to understand and identify the red flags and behaviors of “fear scammers.”
Dr. Stacey Hall has been named the new interim Director of The University of Southern Mississippi’s National Center for Spectator Sports Safety and Security (NCS4), following the retirement of the center’s founder, Dr. Lou Marciani.
Why is cybersecurity so often overlooked by Operational Technology engineers? The answer can be traced to four common myths. Here, we explore why these four misconceptions are no longer true in today’s highly interconnected world and discuss the differences between IT and OT networks, and share some best practice guidelines to help your organization successfully overcome these IT-OT differences and transition to IIoT or Industry 4.0 systems.
The human trafficking industry enslaves millions of men, women and children. What does human trafficking look like, and what role does enterprise security play in preventing this crime?
Heading into 2020 no one could have predicted how a then-mysterious new coronavirus would cripple global business, as it is now. The last time a global crisis struck with such force, it was a man-made event – when the subprime mortgage crisis in 2008 caused the worst recession in U.S. history since the Great Depression. What are four different dimensions of risk enterprise security leaders need to assess right now?