By implementing a data protection by design approach, both before and during product development, organizations will build more trust with customers and end users, and curtail risk of future privacy-related conflicts.
Security fears linger around the wildly popular, Chinese-owned social media platform TikTok, and discussions are in the works for the platform to potentially be acquired by Microsoft. Should users be concerned in the interim? Will a change of ownership to a U.S.-based company allay security and privacy fears?
Do an image search using the terms “security manager,” “security director,” “CSO” or “security professional,” and the results will be fairly predictable. With its roots in law enforcement, the security industry has long been dominated by men, whether in management, sales, or technical positions.
How does Scott Ashworth, Director of Security, ensure the safety of Atlanta United’s fans, players and assets, while helping create a positive and unique game day experience?
We have some more Good Security News! Learn how the Guerrilla Mask Movement (GMM) provides critical masks directly to healthcare workers in dire need of protection as they deal with COVID-19 patients.
After 14 years of finding last-minute goalies, securing locker room doors, and trying to parcel out equal ice time to the skaters, I recently shed the captain’s “C” from the jersey of my recreational hockey team
When I speak with candidates who are either leaving government roles or actively looking for a new role, I am often asked what programs or courses related to cybersecurity they could take to improve their marketability.
Sun Tzu famously said, “all warfare is based on deception.” He could hardly have anticipated how his words would ultimately be substantiated—particularly in the tactics of today’s cybercriminals.
In recent years, Enterprise Risk Management has become increasingly focused on cybersecurity risks. While this focus on cyber is understandable, the current COVID crisis has demonstrated that the unpredictable nature of cascading risks requires viewing risk through a much wider risk aperture. One way forward to successfully navigate this new risk frontier is the establishment of a Risk Operations Center (ROC). The ROC enables enterprise and technology leaders to have the continuous monitoring they require to proactively mitigate all cyber issues. Additionally, it fully supports the CISO/cybersecurity leader's principal responsibilities identified by the HBR survey.