Most security executives clearly understand cyber security is in a class by itself, and the risks associated with ignoring it are immeasurable. They are surrounding themselves with IT and technical security professionals instead of traditional security staffing and former law enforcement personnel.
Monitoring emerging trends, customer likes and dislikes, and understanding unmet customer needs can determine how rapid a rate of incline or decline your business experiences. Companies spend millions of dollars conducting surveys of customers, potential customers, industry experts and key opinion leaders to determine if their products or services effectively meet, exceed or miss market expectations.
For well over a decade, CEOs have been relegating the operational, legal, reputational and competitive risks associated with cybersecurity to those responsible for Information Technology.
Cybersecurity is the unsung linchpin of every company that has grown increasingly dependent upon vulnerable technologies, whether to communicate, to store sensitive data, or to manufacture and deliver its products and services.
I used to write stories like this on a typewriter back in the day. My articles turned out to be a mass of White-Outs to counter typing mistakes. It all made me dizzy. Today’s computer technology even auto-corrects my words, which sometimes is not a good thing.
In last month’s column, we explored the Top Five Reasons to Report Computer Intrusions to Law Enforcement. This month’s column will provide you with a sense of what your company, as a victim of a computer intrusion, should expect when working with the Feds.
In a fiercely competitive international business landscape, corporations race to increase profits by taking advantage of lower labor, manufacturing and distribution costs that only emerging markets can offer.
Over the past year big improvements in how to install, configure and operate video analytics were made that will enable the acceleration of growth in adoption of video analytics. As any technology matures, new features are added and capabilities increase.
The role and value of private security officers has always been clear to those in the security business. But “guard jokes,” from cartoons to movies are taking a back seat to reality as Newtown and other (now routine) mass shootings awakened the general public’s consciousness to the value and need for trained, professional security officers.
The two-way Motorola radio has been the cornerstone of real-time communications for the emergency response and security industry for nearly a century, and is soon to be complemented by smartphone technology. However, the smartphone isn’t going to be used for real-time voice, but will instead be a “must have” device for surveillance operations.
The rise in global security incidents, diminished budgets and downsized security programs have left organizations to deal with security risks that are neither well-understood nor consistently addressed. Executives around the world feel confident that they’re winning the high-stakes game of information security despite the growing number of obstacles, according to The Global State of Information Security® Survey2013 by PwC U.S. in conjunction with CIO and CSO magazines.