Due to cybersecurity concerns, the FBI has asked athletes participating in the February 2022 Beijing Winter Olympics and March 2022 Paralympics to use a temporary phone while at the games.
The Cybersecurity and Infrastructure Security Agency (CISA) has issued best practices around nine cybersecurity goals for control systems in response to the 2021 Presidential Memorandum. Let’s unpack what’s involved in the CISA guidelines, who should be paying attention, and the steps your company may need to take now.
Oiltanking GmbH Group and Mabanaft Group— two companies involved in storing and supplying oil and other materials — have been hit by a cyberattack that has disrupted operations in Germany.
Security sits down with Ara Ghazaryan, Scylla co-founder and Vice President of Artificial Intelligence (AI), to discuss the benefits and limits of AI and the ethical concerns surrounding the technology.
Leaders are facing challenges in hiring, rehiring and retaining security personnel with compounding issues of past furloughs, the COVID-19 pandemic, wages and employee evaluation of risk versus reward. How are enterprise security teams compensating to improve current workforce conditions?
The Puyallup Nation, a tribe with over 5,600 registered members in Washington State, has added a surveillance and analytics system to better improve security around public events.
It’s time to re-evaluate the modern data stack to relieve friction points and ensure both accessibility and compliance. By automating security workflows and controls across data stores and integrating into self-service access, productivity and innovation will thrive.
One challenge for supply chain security practitioners is choosing which of the multitude of guidance documents and best practice frameworks to use when building a cyber supply chain risk management (C-SCRM) program. Let's explore each framework.