It's not the number of moving pieces in your security program that matter; it's how those pieces are making your organization more resilient that truly counts. How do you achieve that goal?
When reporting to the board of directors, the majority of CISOs measure the effectiveness of their program against a proven model. But what exactly should a CISO be measuring and reporting? Here are some top recommendations.
By implementing a data protection by design approach, both before and during product development, organizations will build more trust with customers and end users, and curtail risk of future privacy-related conflicts.
Security fears linger around the wildly popular, Chinese-owned social media platform TikTok, and discussions are in the works for the platform to potentially be acquired by Microsoft. Should users be concerned in the interim? Will a change of ownership to a U.S.-based company allay security and privacy fears?
Do an image search using the terms “security manager,” “security director,” “CSO” or “security professional,” and the results will be fairly predictable. With its roots in law enforcement, the security industry has long been dominated by men, whether in management, sales, or technical positions.
How does Scott Ashworth, Director of Security, ensure the safety of Atlanta United’s fans, players and assets, while helping create a positive and unique game day experience?
We have some more Good Security News! Learn how the Guerrilla Mask Movement (GMM) provides critical masks directly to healthcare workers in dire need of protection as they deal with COVID-19 patients.
After 14 years of finding last-minute goalies, securing locker room doors, and trying to parcel out equal ice time to the skaters, I recently shed the captain’s “C” from the jersey of my recreational hockey team
When I speak with candidates who are either leaving government roles or actively looking for a new role, I am often asked what programs or courses related to cybersecurity they could take to improve their marketability.
Sun Tzu famously said, “all warfare is based on deception.” He could hardly have anticipated how his words would ultimately be substantiated—particularly in the tactics of today’s cybercriminals.