Just as organizations require a show of security and compliance due diligence for their enterprise applications, so should they be doing for their IoT devices. They should also be putting this same pressure on their suppliers.
Regardless of whether employees are on-site or remote, this convenience is now a permanent cyber-risk for businesses. Listed below are the top 5 challenges in this new hybrid environment:
Let's discuss the current state of cybersecurity in the healthcare space, what increased infosecurity technology can do to help mitigate cyberattacks and tips for securing healthcare practices as the hybrid workforce continues.
We talk to Fred Burton, NYT best-selling author, former special agent, counterterrorism expert, and executive director of the Ontic Center for Protective Intelligence, about how protective intelligence can help keep athletes and their fans safe.
Now is the time to take a step back and consider approaches that can help to re-brand the image of your corporate security and resilience departments. This article will share four direct strategies that can help you and your security team transition from being seen as a “cost center” to becoming a value-add to your business’s bottom line.
“Today, your child’s school will have an active shooter drill.” This seemingly simple sentence has become a source of contentious debate across the United States in recent years. Despite the rarity of mass shootings occurring at school, approximately two-thirds of parents of teenagers express worry about a school shooting, according to Pew Research.
Finding efficiencies in supply chain security is as simple as enveloping more of your supply chain. Kirsten Provence has led Boeing’s supply chain security program for nearly a decade; here she explains what has propelled efficiency gains by scaling the program using subsidiaries.
Finding efficiencies in supply chain security is as simple as enveloping more of your supply chain. Kirsten Provence has led Boeing’s supply chain security program for nearly a decade; here she explains what has propelled efficiency gains by scaling the program using subsidiaries.
The past year’s COVID-19 pandemic marked an unparalleled turning point that has completely changed the world as we know it. When businesses and organizations from many industries rushed to establish business continuity from home, hackers took full advantage of the remote work conditions that provided easy targets in unsecure environments. Although people are returning to the office and getting “back to normal,” the idea of evaluating the organization’s cybersecurity posture is becoming more prevalent.