There are strategies for avoiding the downsides of typical micromanagement, however, by following the path of enlightened micromanagement. Here are a few tips.
Here are seven questions to ask vendors to guide your organization's evaluation of enterprise resource planning (ERP) application security, risk and compliance solutions.
Make your list and check it twice: by prioritizing authentication, eliminating passwords, deploying MFA and focusing on user experience, retail enterprise security leaders can ensure that hackers only get a lump of coal in their stockings.
Organizations looking to reduce their risk of being impacted by a severe weather incident may consider conducting a tabletop drill, an emergency management tool designed to increase business resilience.
The Chief Information Security Officer (CISO) role has evolved greatly since its inception in 1995. Review the pros and cons of different CISO reporting models when it comes to business resilience and cybersecurity.
The International Foundation for Protection Officers (IFPO)'s new report, "The Competence of Frontline Workers and What They Say About Their Work," explores the typical responsibilities, skills and perceptions of the dynamic security officer role.
As the year ends, Security magazine spotlights the security industry’s latest solutions below. Innovative products, services and technologies not only help security leaders thrive in their roles, but also keep people and assets safe to create more secure, efficient and intelligent organizations.