The coronavirus pandemic has triggered an unprecedented chain reaction of border closures around the world. This truly is an extraordinary situation, and many countries have also grappled with lack of information, resources and coordination between relevant agents and authorities. These operational issues have raised questions globally about whether border controls are effective in containing such outbreaks, how prepared border agencies were for the emergency and what this will mean for border management in a post-pandemic world.
A thought-leadership report from Raines International and The Lake Forest Group finds that nearly all CSOs they interviewed have had to take on COVID-related response in their organizations. The report also examines the changing role of the CSO in a post-COVID world.
NCS4 is planning its 2020 National Sports Safety and Security Conference for October 12-14, 2020. The virtual event is themed around "The Way Forward" and will include a number of panels and discussions around COVID-19, venue and event management and returning to play and operations safely.
If you've done your job correctly, you will never ask "now what?" when a cyberattack occurs, because you'll already have an incident response plan in place that prescribes exactly what you need to do.
United Kingdom security researchers say it took SonicWall more than two weeks to patch a vulnerability in 1.9 million SonicWall user groups, affecting some 10 million managed devices and 500,000 organizations.
Iowa State University, Duke University, Texas A&M, University of California - LA, University of Florida and more receive grants from the EPA to research and prepare for the impact of natural disasters.
The nonprofit association of certified cybersecurity professionals has published "The Enterprise Guide to Establishing a Cybersecurity Training Program," designed to help companies create cybersecurity training plans.
I was chatting with a chief information security officer (CISO) recently, and we started talking about motivation and the role of love and hate in driving ourselves towards our goals. In cybersecurity, we tend to think about external opponents, most notably white hats vs. black hats, but rarely discuss the internal factors that guide our day-to-day decisions. Humans are dynamic beings that aren’t driven solely by love or hate (despite what the chatter on social media may have you believe). We do, however, have predilections based on our personalities and environment. How we choose to deal with those influences shapes who we become. A good strategy is a combination of love and hate where organizations work towards a grand vision of their future while eliminating things they hate one after the other.
In 2019, Business Email Compromise (BEC) attacks – a long-standing cybersecurity threat – accounted for $1.7 billion in losses, with cybercriminals using new tactics and techniques to carry out existing attacks. As cybercrime spikes in the wake of COVID-19, BEC’s toll is expected to rise this year. The Federal Bureau of Investigation (FBI) recently issued a warning to businesses on the growing threat of BEC attacks using the pandemic as a backdrop for unusual requests like payments to a “new” vendor or a change of account information.