As companies think about how to navigate this new landscape of privacy laws and cybersecurity threats, here are a few major trends and predictions to consider:
Publicly available information (PAI) can give your security enterprise actionable data. Often, however, when an enterprise successfully manages the variety, volume and velocity associated with PAI, that intelligence is often processed in silos. Here's how to ensure your organization can overcome the silos and increase situational awareness for the enterprise.
Meet Issak Davidovich, Vice President of Research and Development at C2A Security. According to Davidovich, the implementation of driver assistance technologies and cybersecurity goes hand-in-hand, and the auto industry is taking its first steps on creating in-vehicle security standards. Here, we talk to him about what this means for automotive cybersecurity.
The talent war is real, the strength in numbers favors our opponent, we now have the original digital transformations we were planning pre-COVID, and now we have additional transformations that we have to take on to enable a distributed workforce that was previously never a consideration. There simply are not enough properly equipped resources to meet global demand, and even then, an organization is only as strong as its weakest analyst. The adversary knows that and, leverages the vulnerabilities in human behavior to advance their position in the “infinite game” of cyber warfare.
Nearly two-thirds of workers who have been working remotely during the pandemic would like to continue to do so. While working from home, the boundaries between work and life can decrease or disappear altogether, as employees are using their corporate devices for personal use more than ever before. As we enter the holiday season, IT teams can expect this work/life blend to translate into increased online shopping on corporate devices, which in turn exposes the network to additional cybersecurity threats.
Contact-tracing solutions are often talked about as a COVID-19 response strategy for enterprises as they resume travel and continue business operations. In defining a digital contact tracing strategy, enterprises must decide whether or not they even need one distinct from efforts undertaken by local health authorities. Learn here how to implement a digital contact-tracing strategy, as well as how to sort through the large volume of options when it comes to contact tracing to determine what makes the most sense for your security team and your organization.
Today’s customers rarely bat an eye when they receive a security alert from a company with which they do business. That’s because large tech companies have baked identity confirmation and notifications of suspicious activities into their everyday user experiences.
Domestic critical infrastructure is arguably now more at risk than at any point in living memory, and certainly in a peacetime context. As a consequence of the pandemic, there have been multiple attacks on electricity grids, water systems and energy organizations, election locations, and newly distributed enterprises. What is the best way to go about protecting what is at risk?
COVID-19 has caused havoc on the schools across the U.S. In the spring, school districts did whatever they could to provide the tools to students to get through the end of the school year. As schools are starting up around the country this month and next month, the challenge school IT departments are having is how to secure all of the devices distributed to students. Here, we talk to Jake Kouns, CEO and CISO for Risk Based Security, where he leads the company’s technology strategy and is responsible for product vision and leadership in the security industry.
This article discusses extremism in the United States as we close out 2020 and look to 2021. Security professionals can educate themselves on what extremist groups are out there and where the risks lie.