With the emergence of major public health issues, or crises, such as COVID-19, grant funding for research and program development will be made available from various government agencies to help with the response. Additionally, foundations such as the Bill & Melinda Gates Foundation or Ford Foundation may provide the precious funds to perform the vital work to battle the at hand issue. If fortunate, those in receipt of funding to pursue the global health issue to be addressed will often utilize technology either developed or custom created and implemented to address the critical response, or in the case of COVID-19, slow the spread or research the creation of vaccines.
Today, securing large venues is a topic enterprise security professionals are grappling with in real-time. Securing these facilities, requires managing occupancy, implementing contact tracing and other solutions, including managing privacy, for the safety of future visitors and fans, but also for the safety and security of venue teams, players and staff.
Spoofed websites are a common avenue for cyberattacks. To better understand the scope of this phenomenon, it’s important for security professionals and organizations to know just how widespread the problem is.
Starting on December 8, Apple will require all third-party developers to detail their app’s privacy information, according to an Apple post. Security experts note that this new update (iOS 14) puts additional focus on user privacy, and in particular gives users better visibility into their personal information that is shared with third parties.
U.S. Secretary of Transportation Elaine L. Chao announced the three-year Unmanned Aircraft Systems (UAS) Integration Pilot Program (IPP) successfully concluded on Oct. 25. Eight of the nine state, local and tribal governments that participated in the program have signed new agreements with the Federal Aviation Administration (FAA) to continue to tackle remaining UAS integration challenges.
Security alerts are imperative for effectively mitigating and preventing cyberattacks. But, a key challenge of modern threat protection solutions is the sheer number of alerts they generate – leading to “alert fatigue.”
To learn more about the dangers of alert fatigue, we talk to Mark Kedgley, CTO at New Net Technologies (NNT).
The Office of the Comptroller of the Currency (OCC) reported the key issues facing the federal banking system and the effects of the COVID-19 pandemic on the federal banking industry in its Semiannual Risk Perspective for Fall 2020.
While the technical root causes are the same, the impact of an IoT botnet attack on consumer versus enterprise and industrial devices is vastly different. An attack on a consumer gadget could be limited to a privacy issue, whereas the effect of a successful breach on a commercial device can have a significant production or safety cost. That’s why it’s more critical than ever for IT and OT security professionals to understand and be prepared to defend against this growing threat.
Despite the ongoing threat of coronavirus, 2020 has been a year of protest. From Minnesota to Belarus, growing social, economic and political change has driven protesters to the streets. However, according to research from the Center of Strategic and International Studies (CSIS), this is no new phenomenom but part of a growing trend. Since 2009, CSIS data shows the number of global mass protests has increased annually by an average of 11.5%.
In order to optimize Security + Operations and integrate it as a strategic function of the business, security teams need to shift their mindset to fully embrace automation. Doing this will require breaking down a few persistent barriers that stand in the way.