This month’s entertaining podcast takes place back in-person from a pub in the U.K, with a wide-ranging conversation covering America’s potentially myopic focus on Russia; the Colonial Pipeline hack and ransomware; as well as cryptocurrency and traceability.
John Parlee, Chief Information Security Officer (CISO) at Park Place Technologies, talks to Security magazine about key trends in the network security space, including why analytics are critical to network security and how companies can ensure they have a viable monitoring solution.
Now that there’s momentum to build security controls into your Software-as-a-Service (SaaS) deployment, here are some actions that organizations can take in order to kickstart a SaaS security program.
As travel continues to make its comeback, businesses need to be taking a renewed look at their duty of care policies to provide their road warriors with the adequate — and expected — level of safety and security.
Long-time cyberveteran with the USAF and currently Federal Practice Lead at A-LIGN, Tony Bai and Joe Cortese, Penetration Testing Practice at A-LIGN, navigate the complex future of supply chain security and discuss who should be responsible for supply chain protection.
Many schools are adopting technology solutions, specifically around student engagement, behavioral health, and safety mood monitoring technology to address students’ needs. These tools can help schools improve their ability to properly identify any students that may be struggling, as well as support all students through the process of acclimating to a new routine.
Marnie Wilking joins application-aware workload protection company Virsec as an Advisor and Board Participant. Wilking is a proven thought leader in cybersecurity who currently serves as Global Head of Security and Technology Risk Management at Wayfair.
New consumer privacy laws and innovative fraudsters have given security professionals much to do in a supercharged digital economy. As our digital footprints widen, bad actors are finding increasingly sophisticated ways to access troves of personal information and sensitive data.