Benjamin Franklin once said, “By failing to prepare, you are preparing to fail.” These sage words unfortunately describe the dilemma many companies are facing on a daily basis with increasing frequency. Whether because of a lack of resources to commit to cybersecurity or the C-suite’s reluctance to do things differently, companies are suffering from a rash of bad actors seeking to profit from cyberattacks and the loss of data because of negligent handling by insiders.
Both disaster recovery and business continuity are answers to what happens when entropy strikes, things fall apart, and business is interrupted. Resilience is strategy using a set of tools and approaches that make it harder for things to fall apart, and easier and faster to put them back together when they do.
The University of West Florida and the Jikei College Group in Japan announced a partnership that aims to enhance global cybersecurity workforce development.
Corporations, universities and other institutions have faced the question of whether to outsource or not to outsource for decades when it comes to physical security and more recently on the cybersecurity side. What is the correct answer to this question?
As you advance your security career into senior and executive levels, occasions may arise where your personal values may conflict with those in the organization. How will you handle ethical challenges that may have career and life-long impacts?
Recent California wildfires have challenged enterprise security professionals who are responsible for protecting and managing emergency evacuations. How can enterprise security professionals leverage their existing security hardware and software investments to better prepare for emergencies?
While access cards still play a strong role in the access control market, some companies are moving toward smartphone Bluetooth-enabled technology to give residents frictionless access through secured doors, elevators and turnstiles.
Why are mid-sized organizations increasingly putting their hope in Managed Detection and Response providers who focus on real-time triage and investigation into data breach signals as they happen?
The Internet of Things (IoT) is living up to the hype. There are more than 20 billion end devices already networked through the Internet, with this number increasing more than three times by the year. In the process, end devices are becoming increasingly more intelligent and efficient, fueled by progress being made in artificial intelligence (AI), machine learning and even 5G, the new mobile phone technology, which creates the required bandwidths for data transfer in the IoT.