This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Research shows a widening of the global cybersecurity workforce gap to nearly three million across North America, Latin America, Asia-Pacific (APAC), and Europe, the Middle East and Africa (EMEA).
Measuring a return on investment (ROI) for security infrastructure is challenging. Most organizations primarily view security investments as a must-have capital expenditure. They know security systems are fundamentally necessary to protect people and assets and keep operations running smoothly. So while these technologies fulfill objectives and successfully help security teams prevent incidents, organizations oftentimes will ask: How can we truly quantify the value of a breach that never occurred?
A Q&A with UL's Gonda Lamberink about Cyberattacks, Video Surveillance, Supply Chains and Upcoming Regulation
October 9, 2018
As each IP camera becomes another endpoint in an enterprise’s digital footprint, they can each potentially open up a backdoor into the network and the business’s mission critical data and services.
By embracing the diverse community of hackers and tapping into their passion, you can significantly reduce your company’s risk profile. Keep reading for some tips, insights and best practices for engaging with the hacker community.
It may happen when you are least able to prevent it – when your executive or his family are alone and most vulnerable. Learning what to expect in the hours and days after an abduction will help you avoid becoming a bystander at a time when your leadership is most needed.
Kick off OSAC Week 2018 with a day of high-level education & networking
October 2, 2018
This year's Security 500 Conference, held November 12 in Arlington, VA, kicking off OSAC Week at the State Department, will feature a keynote address from Michael McGarrity, Assistant Director for the Counterterrorism Division of the FBI.
The threats that face the United States today are the same threats that we faced on 9/11,” says Michael McGarrity, Assistant Director for the Counterterrorism Division of the FBI.
Cisco's Paul Barbosa outlines the key takeaways and surprises from the 2018 SMB Cybersecurity Report
October 1, 2018
More than half of all cyberattacks result in financial damages over $500,000, including lost revenue, customers, opportunities and out-of-pocket costs. That’s enough to put an unprepared small- to mid-sized business out of operation.
To effectively secure organizations and facilities, policies, plans and procedures have to be fluid to address the ever-changing trends of crime, terrorism and active shooter incidents.