The FIDO Alliance will host its first Authenicate virtual conference for identity and security professionals around the world, virtually November 9-19, 2020.
Security professionals can incorporate a few simple items to make the remote experience safer, more secure and more productive. Here’s the “shopping list” that should be on every CSO's desk right now and translates across higher education institutions, corporations and more.
A 30-minute movie, inspired by true events, called “The Nevernight Connection," details the fictional account of a former U.S. Intelligence Community official targeted by foreign intelligence service via a fake profile on a professional networking site and recruited to turn over classified information.
Nearly one third of federal cybersecurity executives surveyed in a recent global survey indicated that they employ a series of best practices to bolster cyber resilience in their agencies – and they do so without increasing their spending. This doesn't come without challenges, however. Fortunately, there are solutions that security executives can employ to stay protected.
In the security industry, technology is moving at lightspeed. New devices, automation, custom software, and robot and drone technology is constantly being developed, improved upon, and employed to help security guards perform routine tasks. However, to reap the benefits of rapid development and deliver exceptional results, the security industry needs to embrace all of these technological changes and be able to spot trends in order to protect an organization's data and to ensure the safety and wellbeing of its security workforce.
The Retail Loss Prevention and Security Association will be hosting its THINK Tank II summit virtually on October 22. The association also launched a new website that coincides with the summit.
YEG Disaster Dash aims to raise money to support Black and Indigenous students in their first year of Northern Alberta Institute of Technology's disaster and emergency management program. The 5K is scheduled to be a virtual event on October 15, 2020.
Security professionals want functionality like data encryption and VPN to be permanently enabled. Some have taken the approach of completely disabling the insertion of USB devices. This needs to be supported with more fine-grained control. What is the path forward?