Imagine losing your car keys. It would be inconvenient, as you could be stranded for a while and you would need to find and obtain a replacement key. Now imagine losing a set of work keys. How much disruption could this cause your company? Remember the 2014 Sony breach? It was perpetrated by a group who claimed that they were able to access the movie studio's computer systems because Sony failed to lock their physical doors.
In the wake of many cybersecurity breaches, SEC's aggressive agenda demonstrates that cybersecurity management is vital to U.S. public companies and capital markets.
We have been hearing about the “convergence” of physical and cyber security for years, but even today there are still debates about whether it has happened yet (spoiler alert: it hasn’t). Part of the challenge might be that the word convergence itself can apply to more than one kind of activity – for example, some believe it applies to the linkages or integration of IT and security systems, while others believe it applies to IT and security organizational structures and teams.
Do you know who is calling you? In many cases, employees rely on caller ID or a familiar name to allow callers to build trust and potentially exploit them. Vishing (or social engineering) is a practice where verbal communication is used to deceive a potential victim.
New technologies, including cloud computing, the Internet of Things and artificial intelligence, are constantly bringing new opportunities and challenges to attackers and defenders alike. This is not just the age of machines but of machine-scale. As such, IT security analysts need new tools to defend the network.
Forty-two percent of Americans don't have an evacuation plan in the event of severe weather and only 19 percent have a family meet-up plan, says a new survey.
Legislation introduced in Texas would allow unlicensed handgun owners to carry their weapons — openly or concealed — in public for up to a week in any area where a local, state or federal disaster is declared.