The British Standards Institute (BSI) has released the annual Supply Chain Risk Insights report, which analyzes BSI data from the organization's web-based intelligence system, Connect Screen.
Email monitoring, video surveillance and keylogger software are some of the methods employers use to track productivity in the remote work environment. However, a new study from VMware, "The Virtual Floorplan: New Rules for a New Era of Work," has found a higher employee turnover rate in businesses that monitor productivity remotely.
A new survey from Pulse and Hitachi ID reveals that nearly half of all enterprise team members have been approached by cybercriminals to assist a ransomware attack.
An exit strategy is not necessarily top of mind if you are enjoying a successful security career. How do you start planning your exit strategy when you are no longer seeking professional advancement?
One of the insights that this year’s security leaders shared with us was which metrics their security programs and the C-suite find most valuable — and we found some overarching trends in this area.
Foregrounding transparency can go a long way in securing your organization's technology and workforce, according to four cybersecurity experts from Intel. Suzy Greenberg, Vice President of Communications and Incident Response; Maggie Jauregui, Offensive Security Researcher; Katie Noble, Director of Intel's Product Security Incident Response Team (PSIRT) and Bug Bounty; and Amit Elazari, Director of Global Cybersecurity Policy discussed transparency in bug bounty and vulnerability disclosure programs, as well as gender parity in cybersecurity.
Cornell researchers and FreedomPay have partnered to release the "Check Please! How Restaurant, Retail and Hospitality Businesses are Managing Cybersecurity Risks" study, which measures enterprise leaders' perspectives on cybersecurity in the retail and hospitality sector.
Financial institutions must protect themselves from salami attacks, which consist of a sequence of small, fraudulent transactions that can easily bypass detection but, combined, can result in considerable losses.