Cybersecurity threats now come in many different forms. From ransomware and malware to phishing — the list of ways into an organization’s sensitive underbelly is growing.
An app developed by professors at Purdue University allows first responders to monitor social media posts to find people in need of help during disasters.
Last year, no business conversation was complete without someone using the words "digital transformation." This year the essential phrase appears to be "digital trust." But what does digital trust actually mean and how does it affect the cybersecurity landscape?
Security officer services companies and the clients who employ them are trying their best to keep on top of quickly evolving video monitoring technology.
The American Hotel & Lodging Association (AHLA) announced a 230-percent increase in members participating in the 5-Star Promise, which incorporates hotels deploying employee safety devices.
Last September, four mobile carriers (AT&T, Sprint, T-Mobile and Verizon) announced Project Verify, a way to log into apps without making a new account or password by instead relying on smartphones to authenticate identities.
For a long time, it may have seemed like consumers virtually had no power, and that businesses could do anything they want with individuals’ private information with nearly no repercussions – but that time is rapidly expiring. With increased state regulations, it is clear that businesses must step up their security game by pseudonymizing their data, rendering the data unidentifiable, so when that data travels across state lines and organizational boundaries, the data is still protected, as well as the business and its reputation.
Today, the average American leaves the house with a smartphone that has more computing power than the systems that landed humans on the moon. The Internet of Things (IoT) enables refrigerators to tell you that you’re running out of milk and cars to provide assisted driving. The reality is that the knowledge economy is in full swing, and the modern world’s relationship with technology has advanced to a state where nearly all aspects of our daily lives are touched by the internet.
As threats from the cyber and physical realms become increasingly prevalent and complex, enterprise security teams must arm themselves with an integrated approach to security operations—one that incorporates cybersecurity, physical security and advanced technologies such as artificial intelligence (AI) and machine learning.