Despite the heavy reliance on the 20-year-old technology, Active Directory, cybersecurity efforts seem to continuously overlook this obvious and frequent target, which only puts organizations at further risk. Despite cybersecurity advances, Active Directory is still one part of an organization’s environment that gets the least cybersecurity attention. While most security programs have a SIEM solution monitoring logs for anything out of the norm, this is simply not enough.
Michigan State University has chosen Marlon Lynch to serve as the university’s next chief of police. Lynch, an MSU alum who has worked in law enforcement for nearly 25 years, will also hold the title of vice president for public safety.
As we think about adapting our cybersecurity training to be more realistic, applicable, and effective, what are some things you should definitely keep and what are some things you should lose in your current security training?
Cybersecurity threats are getting more sophisticated and intense amid the increasing levels of remote work and dependence on digital devices. Here are 5 that were the most damaging for enterprises in 2020.
William (Bill) P. Crowell has joined the Advisory Board of LookingGlass Cyber Solutions. Crowell served as Deputy Director of Operations at NSA, Chairman of the Director of National Intelligence (DNI) Senior Advisory Group, and as a member of the Department of Homeland Security (DHS) Science and Technology Advisory Board.
A global survey which canvassed the opinions of over 7,000 business leaders, employees and consumers from across the world, found that in a rapidly changing business environment, the role of the CISO has hugely expanded in its scope and responsibilities. With the research also identifying security as the top priority for businesses after coronavirus, CISOs have never been more integral to business operations.
As vaccine distribution continues through 2021, the companies managing the process must proactively think about their current risk level, how they can decrease that risk, and how they can strengthen their security posture moving forward.
File-sharing services, such as Google Drive, DropBox and personal OneDrive folders, also pose significant risk to the corporate network. The additional layering effect of file-sharing service — such as multiple shares of a potentially malicious file through a chain of services — create an additional layer of complexity and risk.
Energy giant Baker Hughes built its Global Intelligence & Travel Security Operations Center from the ground up, proving its value and relevancy to the greater enterprise amidst a global pandemic.
Supporting a goal of empowering regional teams to make the most informed decisions is Baker Hughes’s Global Intelligence & Travel Security Operations Center (GITSOC). When Baker Hughes separated from GE’s oil and gas division in 2019, the event presented a unique opportunity for the Security team to create its own operating model and processes from the ground up to support the organization independently, providing the catalyst for the creation of the GITSOC. Learn about energy giant Baker Hughes’ GITSOC, as well as its value and relevancy to the greater enterprise.