Disaster recovery solutions make it easy for administrators to prevent data loss caused by failure events or ransomware, even when they cannot be on-site.
The journey to hybrid cloud
Identity and Access Management follows a four-step process that will increase a business’ speed, agility and efficiency while providing the flexibility to support unique requirements every step along the way.
Tony Bryson, Chief Information Security Officer for the Town of Gilbert, Ariz.,
scaled the town's cybersecurity defenses by adopting a preventative solution through a third-party security company to help to mitigate the risks associated with supply chain attacks.
Disinformation, long used to spread and advance political ideologies, is now being used to damage Western corporations and economies, as reported by a new Network Contagion Research Institute study.
As the gravity of COVID-19 was recognized and expanded in the United States, Niyazi Ekici and Dean C. Alexander, professors at Western Illinois University’s School of Law Enforcement and Justice Administration, commenced a research project to gauge the impact of the pandemic on law enforcement agencies. Here's what they found.
Every successful terrorist attack is a failure of terrorism risk management. To maximize chances of success, security leaders need assessment methods driven by systematic data-driven analysis.
Artificial intelligence offers enhanced public safety solutions, improves research speeds and can be a key asset for businesses, governments and individuals during these unprecedented times.
Security industry leaders must be relentless in their quest for innovation. In order to self-disrupt their organizations, they should seek ideation, brainstorming and problem-solving, as the catalyzers for radical change.
Applying the Sun Tzu approach to cybersecurity gives organizations the awareness of what to look for, what vulnerabilities create the most risk and how to implement the appropriate incident response procedures.
In this special episode of The Security Podcasts, our multimedia specialist Layan Dahhan sits down with Fred Burton to reflect on the 20 years since 9/11 and how enterprise security has changed for this special episode of The Security Podcasts.