While offering incredible conveniences, mobile apps are also a vehicle for malicious hackers to obtain sensitive data and personal information. But before we dive into the work of hackers, it is important to understand user privacy.
While the appeal of taking action against an attacker is easy to see, private sector hack back is a very bad idea. We encourage organizations to employ active defense techniques, but limit these to assets you own or operate. Hack back raises a number of concerns, as detailed here..
Inova Health System began a Behavioral Health Officer program several years ago with the goal of creating a specialized group of security personnel to reduce workplace violence incidents. Since then, the program has grown, evolved and proven its value to the organization many times over.
Inova Health System began a Behavioral Health Officer program several years ago with the goal of creating a specialized group of security personnel to reduce workplace violence incidents. Since then, the program has grown, evolved and proven its value to the organization many times over.
Mobile Access solutions and Visionline technology provide guests with a secure environment at the two recently opened Residence Inn by Marriott locations. The security solution by ASSA ABLOY Global Solutions foregrounds access control with radio frequency identification (RFID) locks.
Decision-makers need to strike a balance when it comes to spending on cybersecurity technology in a way that still enables corporate growth without leaving the organization overly vulnerable to an attack. Invest too little, and there could be gaps in your cyber defenses. Invest too much, and there could be a false sense of security.
Let's dive into what spear phishing is and how security teams can effectively tackle this very targeted method of digital attack, especially now that hackers are picking up their pace.
For the first installation of Security’s Leader to Leader column — for which I will interview security leaders across industries on their careers, their challenges and their views of risk and resilience every few months — I was fortunate to spend time with Shelley Benoliel, Head of Physical Security & Business Resilience at Zoom Communications, to talk about her career and her approach to the security industry.
5G is here and redefining network architecture. Taking responsibility for its advancement in a secure manner has never been more important. Who ultimately is responsible for its associated security?
As a security leader, do you better support the industry and serve your employer by attending in person events or do you play it safe and attend virtually, forgoing the in-person conversations, random encounters, and charged environment that bring so much value to these conferences? Risk professionals needs to weigh look at the data, look at the advice, and weigh the pros and cons of these situations, to maintain their status as a leader within the organization.
A resume or CV is an important component for any job search tool kit. However, there are other, newer ways to enhance or present your qualifications that you may not have previously considered. Taken together, you will have a multitude of options available to showcase your talents to potential employees.