Those on the cyber threat frontlines may view the entire FireEye-SolarWinds catastrophe through a very different lens. It’s a mile-high view that proves a thesis: why data must be smart and able to protect itself from cybercriminals – no matter where it goes, where it’s stored or who has it.
The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA), NASCAR, the Talladega Superspeedway, state and local first responders, law enforcement officials, and local businesses recently held a tabletop exercise to test response plans around hypothetical public safety incidents on the day of the GEICO 500.
Take a look at CISO of DoorDash Justin Grudzien’s career in data privacy and security from building security teams from the ground up at Orbitz to solidifying best practices at DoorDash. Security talks to Grudzien about how he views security roles within the enterprise, how to avoid burnout, and how other security leaders can earn a seat at the C-Suite table.
Billions of searches take place on the surface web every day. Synonymous with Google, this part of the web is indexed by search engines. Try searching your name and you’ll likely be met with thousands if not millions of results, a few of which are familiar to you – your social media profiles, bio on your employer’s website, mentions in the news. The surface, or “clear” web, is only the tip of the iceberg, as vast as it may seem. In fact, it makes up only 4% of the entire World Wide Web. A much larger chunk of the web, the deep web, lies beneath the surface and is not indexed by search engines – but it is still just as important for security professionals to monitor.
For a loosely connected, globally distributed system with no central governing authority, the Internet is remarkably dependable. Robust enough to cope with the unexpected, it features back-up capabilities ranging from redundant network paths to virtual servers that compensate for physical hardware failures.
COVID-19 has brought countless changes, large and small, to the global workplace. But as time continues forward, the question becomes, what will the economy's "new normal" look like? Managers in the U.S. expect vaccinations to be required and health, safety and security protocols to remain in place post COVID-19.
The impact of the COVID-19 pandemic has been widespread and unprecedented, creating more lone workers than ever. Organizations in charge of protecting lone workers must fulfill their duty of care, taking all steps reasonably possible to ensure the safety, well-being and physical and mental health of their employees, or else, risk leaving critical employees unprotected and at risk.
Today, open-source code is everywhere. In fact, 99% of all codebases contain open-source code, and anywhere from 85% to 97% of enterprise codebases come from open-source. What does that mean, exactly? It means that the vast majority of our applications consist of code we did not write.
We have previously talked about many aspects of how to advance your security career. This includes having a thorough understanding of both soft and operational skills sought after by organizations. The ability to execute on these attributes is valued when companies look for top talent for senior level security roles.
Last month this column looked at how humor can enhance leadership. Inspired by the book "Plato and a Platypus Walk Into a Bar: Understanding Philosophy Through Jokes," this month’s column explains security leadership through jokes.