Criminal cyber activity evolves at an incredible pace. Today’s cybercriminals are constantly on the lookout for security gaps that will give them access to your facilities or a wide range of important, private and sensitive information. In our increasingly interconnected world, the potential avenues of exploitation seem greater than ever.
With the barrage of information coming into a system, separating the noise from the genuine threats can be a difficult process. This is where AI can come in, to help you separate the real risks to your business from normal network noise.
For all the hundreds of firewall rules and network protocols that your security staff may put in place to better safeguard your network, sometimes there’s simply no accounting for the most unpredictable variable of them all: human behavior. Whether it be through social engineering techniques, bad actors within your own organization, or simple human error, hackers around the world are trained on how to take advantage of a company’s employees and staff in order to gain access to a protected network.
The cyber threats facing Industrial Control Systems (ICS) include nation-state attacks, hacktivists, criminals and even trusted insiders. The frequency and ferocity of attacks are growing and continue to pose a major challenge to those ICS practitioners and cybersecurity teams tasked with protecting our critical national infrastructure (CNI).
By 2022, more IP traffic will cross global networks than in all prior “Internet years” combined up to the end of 2016, according to Cisco’s Complete VNI Forecast. In other words, more traffic will be created in 2022 than in the first 32 years of the Internet.
The National Institute of Standards and Technology (NIST) invites comments on Draft NISTIR 8196, Security Analysis of First Responder Mobile and Wearable Devices, a document that reviews the current and potential use cases of mobile and wearable devices by ﬁrst responders and analyzes them from a cybersecurity perspective.
Technology, customer service and new offerings are shaking up the traditional concept of a security officer’s role. Learn about how the guarding industry is shifting to fit enterprise security leaders’ changing expectations in our Annual Guarding Report. Don’t miss our 2018 Top Guarding and Security Officer Firms list in the cover story, as well as articles on outstanding duty of care programs, cloud security responsibilities, and how to cope with mergers and acquisitions.