Yes, you need one. But who do you turn to? Inept ransomware negotiators have left companies in worse shape than they found them in by inciting threat actors to do even more damage. The best approach is to engage a ransomware negotiator before you’re attacked, so they can work with you to create a sound crisis response plan. What should you look for when hiring a ransomware expert to drive crisis planning and response at your enterprise?
It is certainly important to bring awareness to the industry-wide stress that hinders our security workforce, but in order to tackle this issue head on, leaders must make employee wellbeing the priority. Changes made during these times will have lasting beneficial effects on employees and the industry no matter where their career takes them.
With more Americans expected to do their holiday shopping online during the COVID-19 pandemic, US agencies and cybersecurity leaders are urging all consumers to be on alert for holiday shopping scams and cyber threats, which historically spike during the holiday season. Here, we talk to Michael Rezek, Vice President of Business Development and Cybersecurity Strategy at Accedian, about the technologies retailers need to adopt to ensure a smooth holiday shopping season, how to see the warning signs for bad actors, how to proactively manage them and what to do to prevent them in the first place.
How can you create a secure infrastructure for the sensitive data being managed by your enterprise? Encryption key management is more important than ever.
Security operations centers need to solve the detection puzzle, creating human experience that is less tedious and more productive. The overall solution must give security professionals and the enterprise a consistent view of security preparedness, and the necessary implementations to keep their coverage high and their alerts rich. So where do you start?
As the international cyber landscape continues to evolve, we will never hire enough talent - that is why it is so important for us to all create talent for cybersecurity. Because of this dire and growing need, enterprise security leaders must invest in future cyber talent, while also taking the appropriate steps to train their existing workforce and new hires in both offensive and defensive cyber skills.
Recent data from Risk Based Security revealed that the number of records exposed has increased to a staggering 36 billion in 2020. There were 2,935 publicly reported breaches in the first three quarters of 2020, with the three months of Q3 adding an additional 8.3 billion records to what was already the “worst year on record.” Here, we bring you our list of the top 10 data breaches of 2020.
Security professionals in higher education can implement a number of strategies to ensure safety and security without hindering the learning environment.
Security professionals in higher education can implement a number of strategies to ensure safety and security without hindering the learning environment.
William Boelcke spent the years 1998 to 2000 with the U.S. Air Force. He’d spend the next 18-plus years battling mental health issues and substance abuse. Two years ago, in a treatment facility in Rockford, Ill., Boelcke was introduced to BraveHearts and its equine-assisted therapy program. The non-profit organization based in Illinois has been working with veterans, providing free equine-assisted therapy and a place of calm and acceptance, since 2007.