A new VIAVI study revealed that 73 percent of respondents said security professionals need comprehensive visibility into network infrastructure to enhance cybersecurity efforts and speed remediation.
The current COVID-19 pandemic is changing the business landscape. The most immediate being the sudden increase in the amount of people working from home. It is no surprise that this change has significantly increased the attack surface, forcing companies to strengthen their cybersecurity measures to ensure they do not become the next victim of cybercriminals.
In a ground-breaking opinion issued today, the Court of Justice of the European Union invalidated the EU-US Privacy Shield Decision as a method for transferring personal data from the EU to the US. In short, the Decision was invalidated over Privacy Shield’s failure to adequately address US government surveillance activities.
What are some steps Security Operations Center (SOC) teams and security professionals can take to improve the performance of their Intrusion Detection Systems (IDS) tools, and lower the noise?
Beyond the essential functions of security monitoring and recording, IP video surveillance offers myriad video analytic behaviors that can help retail businesses during the ongoing coronavirus pandemic.
Evacuations and lockdowns are two events no organization wants to face, but every organization should be prepared for. They often happen in response to particularly dangerous situations that pose an immediate threat to people and property. It can be difficult to know how and when to make the decision to lockdown or evacuate, and it can be even more difficult to manage once the decision has been made. In either case, it requires organizations plan, test and have the right tools in place to reach all of their people quickly with information on what actions they should take to stay safe.
With a myriad of employees and contractors given ubiquitous access to business data, one thing is clear; identity has become the new security perimeter. Ensuring ERP data security, privacy, and compliance can no longer rely solely on network threat monitoring but requires using a layered identity defense to limit access to and within mission-critical applications.
With the second anniversary of GDPR on the horizon, the topic of data security is as pertinent as ever. Despite the proliferation of connected devices and the personal information and sensitive data they harbor, many consumers are unaware of just how susceptible their pocket-sized computers are to cyberattack.
The Black Lives Matter movement is spurring record-breaking fundraising online. In fact, the Minnesota Freedom Fund pulled in more than $30 million in donations alone following the death of George Floyd. The outpouring of financial support is great for these grassroots movements; however, large numbers like these often catch the eye of opportunistic scammers, unfortunately. While Black Lives Matter supporters are advocating on the street for a cause, scammers are capitalizing on their movement for their own gain.