The same Russian nation-state actor behind the cyberattacks targeting SolarWinds customers in 2020, Nobelium, has targeted organizations integral to the global IT supply chain.
A multi-use commercial and residential building will be secured by an access control and visitor management system from AMAG Technology and West Fire Systems. Read more about the tools used in this security case study.
By focusing on the three V’s — volume, velocity and visibility — of Software as a Service (SaaS) security, organizations can streamline and improve their security team’s efficiency, reducing their workload and increasing protection for the company against any potential exposure or data breach.
Business leaders need security solutions that adapt to their environment and build off of the foundations they’ve set. New research from Johnson Controls highlights key areas of change that security executives can monitor.
Healthcare is disproportionately targeted: 34% of all data breaches in the U.S. involve a healthcare organization. Yes, healthcare is a large industry, but we’re not that large. Here’s why security is such an issue for our critically important but increasingly fragile industry.
Cyber insurance can still play a critical role in protecting a business during the interruption of a ransomware attack, as well as help cover potential ransom payments and/or associated legal fees.
The International Foundation for Protection Officers (IFPO) has released "The Competence of Frontline
Security Professionals
and What They Say About
Their Work," a research project about security officers' roles and perceptions of their experiences in the industry.
Employees and non-employee contractors continue representing the most critical weak link in the IT chain. Too many employees, and vendors using corporate networks, are still falling for phishing attacks. Enhanced worker training on cyber risks helps, but training coupled with stronger systems offers the best protection against cyber threats.
Effectively securing an organization’s resources and data requires making user and device identity and access management the new focal point of security. Organizations will need to reconsider their security strategy once again to accommodate staff as they return to the office.
By being an organization of change, executives can not only diversify the talent within security, cybersecurity and IT teams, but they can improve the quality of their hires and set their enterprise organizations up to thrive in the future.