An emerging challenge facing security leaders involves governance related to the collection, storage and transmission of personal information and the ethical utilization of it. While there are compliance programs currently in place that govern the protection of individual medical and financial data, there are clearly additional challenges on the horizon.
Enterprises are struggling to find the right talent to safeguard their networks; therefore, they must change their mindsets and begin recruiting talent from non-traditional backgrounds to ensure they have the "right" person on their SOC team.
The 2019 Travelers Risk Index has found that cyber risks are the top concern among businesses of all sizes for the first time since the survey began in 2014,
Transportation Security Administration (TSA) Administrator David P. Pekoske announced the current Aviation Security Advisory Committee (ASAC), including the appointment of two new members and the reappointment of 12 members. ASAC provides recommendations for improving aviation security methods, equipment and procedures.
One in five Americans has left a job in the past five years due to a “toxic workplace culture” with the turnover costing employers an estimated $223 billion during that time.
It’s one thing to ensure that all of the possible threat entry points are covered by an organization’s security infrastructure, it’s another to ensure proactive protection.
Vice President Mike Pence, Congressman John Joyce (R-PA) and Cybersecurity and Infrastructure Security Agency (CISA) Assistant Director Brian Harrell joined several faith-based community leaders for a Faith-Based Safety and Security Symposium at the White House.
American universities are breeding grounds for innovation and research for students from across the globe. They are also a primary target of IP theft and cyber-attacks by some of these very students and their governments. America’s universities, supported by industry and by the U.S. federal and state governments, must be ready to protect the billions of U.S. dollars invested by the U.S. government and corporations to develop new technologies.
As the person in charge of your healthcare organization’s information technology, one of your responsibilities is protecting patients’ and clients’ information. This can be difficult because third-party vendors with whom you contract can unwittingly jeopardize the security of that information. But you can take steps today to help prevent those problems tomorrow.
In March 2017, drivers on a Montreal highway were stuck for more than 12 hours in 15 inches of snow. Because of a lack of coordination and an inability to share information between first responders, various highway authority groups, and the city, more than 300 motorists were stranded in their cars overnight.