This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
From the standpoint of risk analysis, recency bias—that is, an overwhelming focus on events that have happened most recently—is one of the most nefarious psychological blinders.
The Cybersecurity and Infrastructure Security Agency's mission is extensive: to help secure the nation's critical infrastructure from physical and cyber threats, and to create a more secure and resilient infrastructure for the future.
Meet the Department of Homeland Security's newest agency - the Cybersecurity and Infrastructure Security Agency - that will serve as the pinnacle for national risk management for cyber and physical infrastructure.
Enterprises are struggling to find the right talent to safeguard their networks; therefore, they must change their mindsets and begin recruiting talent from non-traditional backgrounds to ensure they have the "right" person on their SOC team.
At an event, Uber CEO Dara Khosrowshahi unveiled a new vision for the rideshare app, which will focus on improving the safety and experience of Uber users and drivers.
As the person in charge of your healthcare organization’s information technology, one of your responsibilities is protecting patients’ and clients’ information. This can be difficult because third-party vendors with whom you contract can unwittingly jeopardize the security of that information. But you can take steps today to help prevent those problems tomorrow.
In March 2017, drivers on a Montreal highway were stuck for more than 12 hours in 15 inches of snow. Because of a lack of coordination and an inability to share information between first responders, various highway authority groups, and the city, more than 300 motorists were stranded in their cars overnight.
Hotels and casinos in Illinois will soon be required to have anti-sexual harassment policies that include, for certain workers, access to a safety button or notification device that alerts security staff.
Compromises of mobile devices can be just as damaging. They have the potential to undermine an organization's customer data, intellectual property and more. How can enterprises take on persistent mobile security threats?