Reporter Jeffrey Decker takes Security readers through the physical security at this year’s 2021 Presidential Inauguration, as well as comparing and contrasting the security measures with previous inaugurations.
As Joe Biden takes office, Justin Crump – CEO of the global risk and intelligence consultancy Sibylline, takes stock of the challenges the new administration will face
As Joe Biden takes office, Justin Crump – CEO of the global risk and intelligence consultancy Sibylline, takes stock of the challenges the new administration will face and a reminder that we all need to think widely and openly about possibilities in a volatile, uncertain, complex, and ambiguous world.
In the past year, COVID-19 has had a larger impact on work habits and security environments than any other health emergency in memory. That combined with technological advances such as 5G has led to several trends we expect to see in this New Year. Here then are our top ten:
As the headlines showed, ransomware continued to be the weapon of choice in 2020, and extortionware is on the rise. While ransomware has become a tried and true method at this point, extortionware tactics are raising the stakes by threatening to expose sensitive information if the ransom is not paid.
Cybercriminals can take advantage of human weaknesses in one place and use them in other places where they can get financial or other gains. Email addresses, real names, real addresses, phone numbers, date of birth, etc., all are valuable information for cybercriminals. They can build their database with this personal information and use them in future attacks. This is why practicing good cybersecurity habits as users and as administrators is critical for all of us for all systems we use.
The recent breakthroughs in analytics, machine learning and AI have changed the way cybersecurity professionals can mitigate risks within the enterprise. There are several things to keep in mind, however, as cybersecurity team begins creating and building out a threat intelligence capability. Here’s how to make threat data relevant, actionable and effective for your organization.
In spite of the fact that mobile apps live on IoT-enabled devices, collect user data, and continuously loop communication between Internet, cloud services and companies (even when not “in use”), there is a limited view that they are different entities altogether. We see this particularly when it comes to security – or lack-there-of – regarding security standards in place to continuously protect users from detrimental application hacks.
In 2021, as enterprise security leaders look to better understand and tackle their organization’s risks as it relates to the COVID-19 pandemic, following this model can be helpful: designate a dedicated response team; analyze how risks have changed and what new types of risks there are; consider the appetite for taking risks and prioritize them. Here's how.