Michigan Governor Gretchen Whitmer announced the "Futures for Frontliners” program to provide a tuition-free pathway to college or a technical certificate to essential workers who don’t have a college degree.
The McLean Group announced that Marc Gruzenski has joined the firm as Senior Managing Director. Gruzenski will lead the firm’s Security Practice focused on the cybersecurity, physical security and security risk management sectors.
What are some key areas to consider when you are constructing a strategy to address your successor and the replacement of other positions within your direct and functional organization?
In the video surveillance world, data is growing rapidly due to the proliferation of surveillance cameras in both public and private spaces, the increased use of police body cameras and dash cams, and ever higher-resolution on all of these. In the U.S. alone, the surveillance marketplace is expected to grow to $68 billion by 2023.
A John Jay College of Criminal Justice project on cyber-terrorism is one of 13 selected by the Department of Homeland Security as part of the National Counterterrorism Innovation, Technology, and Education (NCITE) Center, a new DHS Center of Excellence. The project will be housed at the University of Nebraska at Omaha.
Traction Guest, a leader in cloud-based solutions for enterprise visitor management systems (VMS), announced Brian Phillips as director of Global Security Strategy.
Ransomware is costing businesses—in ransom, yes, but also in downtime, the cost of which is typically 23 times greater than the ransom requested. The attacks are affecting large organizations and cities including Atlanta and Baltimore. Cybercriminals aren’t just attacking end-users; MSPs are the latest on the hit list.
While employees are the key to identifying cybersecurity vulnerabilities quickly, many companies have failed to create a welcoming environment for whistleblowers. During COVID-19, how can you safely blow the whistle?
To detect and contain breaches faster, it’s become increasingly important to go beyond the typical malware detection capabilities and invest in the ability to detect and react to lateral movement within the environment. Lateral movement is a core piece of an attacker’s strategy once he’s gained a foothold within the environment. What three steps can you take to help stop lateral movement focus on security measures that minimize dwell time?