Emergency communications are changing. At the City of Stamford, Conn., Joe Gaudett, Director of Emergency Communications says that his biggest focuses right now are keeping his staff safe and secure; having enough resources; and using technology to continue to function and respond safely and efficiently to serve its citizens. Learn how Gaudett and the city of Stamford have responded to COVID-19 and implemented new technologies to help ensure operational efficiency and increase safety and security.
Biometric security solutions and AI-powered fraud prevention technologies have, for several years now, been transforming the ways in which organizations protect their business, their customers, and their employees. In fact, some industry estimates reveal that AI and biometrics have combined to prevent billions of dollars in losses from fraud—already.
While COVID-19 has slowed the hospitality industry, security plays a more pivotal role than ever and the ongoing pandemic is challenging security professionals to adjust and adapt to new rules and procedures.
While COVID-19 has slowed the hospitality industry, security plays a more pivotal role than ever and the ongoing pandemic is challenging security professionals to adjust and adapt to new rules and procedures. And yet, as the pandemic and challenging economy continues, security departments within the hospitality industry are increasingly tasked to do more with less.
While many organizations understand the need for a security executive, organizations that have taken a holistic approach, have added the chief risk officer (CRO) position to evaluate all organizational risk. So, what is a chief risk officer, who makes a good candidate, where does the CRO stand organizationally within an enterprise, and what value does one add? Here are all your CRO questions answered.
McKinsey & Company reports that most risk managers at large organizations are flying blind when it comes to evaluating their cyber resilience due to bloated reporting processes and overly complicated reporting tools. Here's how organizations can implement a risk-based approach to their cybersecurity controls.
The modern workplace will likely remain partially remote long term, so a robust remote cybersecurity program is now a critical element of your cybersecurity program, which may require a larger IT staff or assistance from a managed IT provider.
The daunting threats and attack techniques from 2020 are expected to continue into this year. And while 2021 offers a fresh start, cybercriminals will continue to become increasingly savvy, deploying a wide range of techniques to extort, disrupt, and infiltrate organizations. Now more than ever, government and corporate leaders and consumers must become engaged in ensuring effective cybersecurity strategies are in place. Here are eight steps organizations can implement to heighten cybersecurity governance:
Despite the heavy reliance on the 20-year-old technology, Active Directory, cybersecurity efforts seem to continuously overlook this obvious and frequent target, which only puts organizations at further risk. Despite cybersecurity advances, Active Directory is still one part of an organization’s environment that gets the least cybersecurity attention. While most security programs have a SIEM solution monitoring logs for anything out of the norm, this is simply not enough.
As we think about adapting our cybersecurity training to be more realistic, applicable, and effective, what are some things you should definitely keep and what are some things you should lose in your current security training?
Cybersecurity threats are getting more sophisticated and intense amid the increasing levels of remote work and dependence on digital devices. Here are 5 that were the most damaging for enterprises in 2020.