What is the best path forward? Should companies upgrade their existing platforms or replace them entirely? What makes the most sense both financially and for the security of your data?
How do you lead a great security team to overall mitigate risks across the entire enterprise? To find out, we talk to Ellen Benaim, Chief Information Security Officer at Templafy. In her role, Benaim is responsible for overseeing company-wide information security and governance program and ensuring the entire organization follows necessary protocols to keep the enterprise secure.
With today’s threat landscape, security and SAM teams need to work together to understand what is installed across network devices and how those are being used for the best asset protection.
By the end of 2020, it is expected that more than 59 zettabytes of data will be generated globally. With access to data from sources such as social media, news and the dark web, encrypted connected security systems, and public and company-proprietary records and communications, physical security and safety professionals are challenged not only with parsing through this “big” data but transforming it into actionable intelligence.
Now more than ever, K-12 leaders are faced with the need to implement security solutions and strategies that adequately protect students, staff and visitors from potential threats. Growing incidents, such as school shootings, unauthorized visitors and disease transmission, can put occupants in harm’s way, making security a persistent need. Schools now have the opportunity to use and expand on existing building technologies to address evolving needs while providing greater protection and peace of mind.
For years, there has been optimistic talk that drones – the popular name for UAVs (unmanned aerial vehicles) – would become ubiquitous and used for security purposes. And now, it’s happening. The drone-industry is becoming an increasingly promising technology-intensive industry, one that will employ far more workers than it does today while enhancing the efficiency and security of a variety of businesses.
Earlier this year, an investigation team hijacked thousands of printers all over the world to show just how vulnerable these devices can be if left unprotected. Too many organizations and individuals do not properly address them when discussing security strategies, physical or cyber, but if left unsecured, these devices can be real vulnerabilities.
In the U.S., critical infrastructure consists of sixteen essential sectors that make daily life possible. National critical functions are the functions of government and the private sector so vital to the U.S. that their disruption, corruption, or dysfunction would have a debilitating effect on security, national economic security, national public health or safety. Here, we talk to Brian Harrell about the importance of protecting critical infrastructure, the threats and hazards that pose the greatest risks to critical infrastructure and more.
The risk of a disinformation attack against an enterprise or large organization is increasingly serious and needs to be included in a company's risk preparedness contingency planning.
One way to achieve higher security in your enterprise is to instill a proper Privileged Access Management (PAM) initiative into the cybersecurity workflow. For a multi-dimensional cybersecurity strategy involving processes, technology, and people to be successful, any such system has to be a part of the entity’s culture. Here’s how to implement PAM at your organization.