After being exposed to countless traumatic events, first responders often struggle with PTSD and mental health disorders. Beyond extending workers compensation benefits, what more can we do to help first responders?
Meet the global security team at Boston Scientific – five female professionals with diverse background and skills who are ensuring the safety and security of a global enterprise.
Attribution is often regarded as a primary goal within a cybersecurity investigation, but as John McClurg, CISO at Blackberry, explores here, conclusive attribution should at times exist as a secondary consideration - one abandoned if the ROI doesn't justify its expense.
Today's security executive needs to expand their business acumen and develop broad organizational skills and competencies in order to be valued as part of the leadership team.
Is it truly possible to train every single employee—including those working from home and organizations’ third-party partners—to spot a cyber-threat? Or to keep good cybersecurity hygiene when handling sensitive data? Or to refrain from stealing intellectual property when they’re disgruntled and about to resign? While training is a key element to preventing breaches and protecting important corporate data, training alone is not enough.
While increasingly common even before the coronavirus, remote work brings its own unique set of cybersecurity challenges. Here are the ten most common pitfalls and the recommended solutions.